Skip to main content

Strengthen your account security: activate two-step verification

Activate two-step verification (2FA) and add an extra layer of protection that safeguards your account against unauthorized access.

Written by Lisa
Updated over 4 months ago

An extra layer of protection for your account

Two-step verification (2FA) is a key tool for ensuring account security and preventing unauthorized access. Implementing it adds an additional layer of protection by requiring a second authentication factor, minimizing the risks associated with compromised passwords.


Key definitions

  • Trusted IP address: a record identifying authorized access from a specific location.

  • Authentication app: a mobile application that generates unique security codes to validate access.


What is two-step verification?

2FA strengthens account security against unauthorized login attempts. Its goal is to reduce the risks of compromised passwords by requiring a second authentication factor when logging in from a new IP address.

This method immediately neutralizes risks associated with leaked passwords, as users must confirm their identity with a unique code whenever their IP changes.

An IP address is registered as trusted in the following cases:

  • When 2FA is configured: it’s done once, and the IP is saved.

  • When the verification code is correctly entered.

How to activate it

The two-step verification setup is available in the VRMS panel: Configuration → Company.

  1. Click Edit.

  2. In the section Security level of your company, select one of the two levels:

    • Low level: two-step verification is optional for all users (including Owners and Suppliers).

    • High level (recommended): two-step verification will be mandatory. Users will have five days to configure it in their accounts.

  3. In the Users section, choose which groups the selected security level will apply to (Administrators, Company users, Owners, or Suppliers).

Attention to detail

  • Only users with Administrator permissions can modify the security level.

  • In high level mode, users who have not configured 2FA will have five days to do so. After that, they will not be able to access their account until it is completed.

Step-by-step configuration

  1. Log in with your username and password.

  2. If this is your first login, a pop-up window will appear for configuration.

  3. If you already have an active account but haven’t configured 2FA yet, you’ll see an icon next to the message “Protect your account” in the bottom-right corner of the screen.

  4. Download an authentication app on your mobile device. The most common ones are Google Authenticator, Microsoft Authenticator, Twilio, or Duo.

  5. Open the app and follow the instructions to add your Avantio account.

  6. Scan the QR code displayed on the screen or enter the accompanying manual code.

  7. If the code expires or is incorrect, the system will notify you and allow you to try again.

  8. Once validated, you’ll receive a confirmation message, and your account will be protected.

Useful tip

Verification codes expire quickly. If one expires, generate a new code from your authentication app and re-enter it in the system.

Other identity validations

For users who haven’t configured 2FA, each time they log in from a new device or IP address, an email notification will be sent. They must confirm it before proceeding with access.

This applies to all profiles: internal users, Owners, and Suppliers.

Two-step verification is an essential mechanism for protecting account security. Proper configuration and use ensure that only authorized users can access the system—reinforcing trust and platform integrity.


Frequently asked questions

Why is it important to activate 2FA?

Because it provides an additional layer of security that protects account access, even if the password is compromised.

What happens if I don’t configure 2FA under the high level?

If your Company has enabled the high level, you’ll have five days to configure it. After that, you won’t be able to access your account until setup is complete.

Which app should I use for 2FA?

You can use Google Authenticator, Microsoft Authenticator, Twilio, or Duo. All serve the same purpose of generating verification codes.

What happens if my code expires?

You’ll need to generate a new one in your authentication app and re-enter it into the system.

Did this answer your question?