Inner Range News

Read our other news stories here

Monday, 17 May 2021

Integriti Version 21 - 2 Factor Authentication (2FA)


Integriti V21 - 2 Factor Authentication (2FA)

Two Factor Authentication (2FA) can be the difference between keeping security and access control systems, accounting systems and HR information secure, or not. If a cyber attack wipes out this data, could your business recover?

Businesses who use Integriti will be more secure than ever with the inclusion of 2FA in the latest Integriti Version 21 software release. Statistics show 1 in every ten people fall victim to cyber criminals. 2FA is a powerful tool that helps prevent attacks and protects your systems and information.

"No matter how safe somebody is with protecting their password, or how complex the password is, cyber criminals have numerous ways to access it"

  • Statistically, 1 out of every ten employees will have their username and password breached.
  • 2FA means that access is denied even if login details have been compromised.
  • Initial enrollment in 2FA within Integriti is as easy as scanning a QR code.
  • Systems administrators can assist operators with single use login tokens if their 2FA device is unavailable.

Most common hacking methods

Credential Stuffing Zoom in April 2020

When a cyber criminal gains access to usernames and passwords for one online service then uses them to attempt to login to other services.

Phishing Attack  Australian Taxation Office in May 2021

Where an unsuspecting person receives an email or other message that directs them to login to a malicious cloned website and records their username and password.

Malware Flubot on Android Phones and Tablets in April 2021

Malicious software which records access details by keylogging, screen captures or by reading contents of files where passwords are stored.

What is 2FA

2FA is an additional layer of security used to make sure that only an authorised person has access to an online account. A username and password is required, followed by the additional step of utilising something you are or something you know. 

Something you know
Something You Know

Personal information such as a username, password or a secret question.

Something you are
Bootstrap Image Preview

Such as fingerprints, iris scan, voice print or facial recognition.

Something you have
Bootstrap Image Preview

This group consists of devices like an app on a mobile device, portable authenticators or smart cards.

2FA in Integriti

The implementation of 2FA within Integriti ensures the high level of security offered by 2FA is accessible to all customers. The initial setup for company-wide use can be completed within a few minutes. Creating a smooth experience for operators was an essential part of the implementation of 2FA within Integriti. Operators will be asked to enroll in 2FA at their next login and the enrollment process takes less than 1 minute. The time taken to login on a daily basis when using 2FA adds only seconds.

If the authenticator has ran out of battery or been left at home, help is available. An operator can contact the system administrator to generate a single-use code to allow the operator to login.

Activating 2FA within Integriti

Activating 2FA within Integriti is as easy as ticking a box

Adding 2FA to Security Policy

Once 2FA is enabled it can be added to a security policy to make 2FA a requirement for any operators who are covered by that security policy. The operator will then be prompted to enroll for 2FA on their next login.

Operator enrolling in 2FA

After logging in with a username and password, the operator is prompted to scan a QR code using a compatible authenticator app. Once scanned, the operator enters the displayed 6 digit code, clicks OK and the enrollment process is completed.

Operator logging in with 2FA

After enrollment, an operator needs to enter the code from the authenticator to login to the system. The authenticator-generated code times out after 30 seconds to ensure maximum security.      Your systems and information are more secure with 2FA.


My Website

Inner Range is a manufacturer of integrated electronic security software and systems. Australian based, world-leading.

Copyright 2023 by Inner Range Australia