Skip to Main Content

Share your product feedback

Status Future consideration
Created by Dave Ball
Created on Dec 5, 2025

Support Additional MFA Providers

What is the challenge?

Aha! currently supports Duo for two-factor authentication (2FA). However, many organizations standardize on other MFA providers such as Microsoft Authenticator, Okta Verify, or Google Authenticator. Relying solely on Duo creates:

  • Additional friction for users who must adopt a separate authenticator app just for Aha!

  • Misalignment with established corporate security policies and identity platforms.

  • Increased support overhead for IT/security teams managing multiple MFA methods.

  • DUO Subscription costs

What is the impact?

High for organizations standardizing on Microsoft 365, Okta, or other identity platforms. Medium effort depending on the integration approach chosen.

Describe your idea

Introduce support for additional time-based one-time password (TOTP) or push-based MFA providers, specifically:

  • Microsoft Authenticator

  • Okta Verify

  • (Optionally) Google Authenticator, 1Password, and other TOTP-compatible apps.

This could be delivered through:

  1. Native support for multiple MFA apps

  2. Standards-based MFA integration (e.g., TOTP RFC 6238, WebAuthn, or SAML/SCIM extensions)

  3. Admin-configurable MFA policy, allowing organizations to choose which authentication methods users can enrol in.

Expected Benefits

  • Aligns Aha! with enterprise security ecosystems and identity management solutions.

  • Reduces onboarding friction by allowing users to continue using their existing authenticator apps.

  • Supports broader compliance needs for organizations with strict MFA policies.

  • Improves user satisfaction by offering flexibility and reducing dependency on a single vendor.

Success Metrics

  • Increased adoption of MFA within customer accounts.

  • Reduced support tickets related to Duo setup and MFA access.

  • Positive customer feedback on authentication flexibility.

  • Attach files
  • George Smyth
    Mar 24, 2026

    Support for a free authenticator such as Microsoft Authenticator, or even better a support Time-based One-Time Passcodes (TOTP) so it can work with all/most authenticator apps.

    This is particularly important in the UK as a cloud application that has an option for MFA must use MFA to meet UK cyber security rules for businesses (Cyber Essentials).

  • +2
3 MERGED

Standards-compliant open 2FA support

Merged
If I search Big Ideas, I can find multiple ideas relating to 2FA - including requests for Yubikey support and Google Authenticator without SSO. I want to dial it back a notch... today, in 2021, I am unable to turn on 2FA to protect our Aha! creden...
Daniel Viney over 4 years ago in Account settings 1 Future consideration