Overview
Two-factor authentication requires users to provide both their password and a time-based code from an authenticator app when logging in.Benefits
Enhanced Security
Protects against password compromise and unauthorized access
TOTP Standard
Compatible with all standard authenticator apps
User Control
Each user manages their own 2FA settings
Recovery Options
Can be disabled with password verification
Enabling 2FA
Users can enable 2FA from their profile settings:Navigate to Profile
Click your user menu in the top right and select “My Profile” or navigate to
/me.Scan QR Code
A QR code appears on screen. Scan it with your authenticator app:Recommended Apps:
- Google Authenticator (iOS/Android)
- Microsoft Authenticator (iOS/Android)
- Authy (iOS/Android/Desktop)
- 1Password (iOS/Android/Desktop)
- Bitwarden (iOS/Android/Desktop)
Save Backup Key
Write down or securely store the displayed backup key. This allows manual entry if QR scanning fails.
After enabling 2FA, you’ll be required to enter a code from your authenticator app every time you log in.
Setting Up Authenticator Apps
Detailed setup instructions for popular authenticator apps:- Google Authenticator
- Microsoft Authenticator
- Authy
- Manual Entry
Install the App
Download Google Authenticator:
- iOS: App Store
- Android: Google Play
Logging In with 2FA
Once 2FA is enabled, the login process requires an additional step:Enter 6-Digit Code
Type the current 6-digit code into the 2FA field.
The code refreshes every 30 seconds. If it’s about to expire, wait for the new code to avoid timing issues.
Remember Me Option
The “Remember Me” checkbox on the login page:- Extends session duration
- Still requires 2FA code on first login
- Reduces frequency of re-authentication
- Device-specific (doesn’t affect other devices)
Even with “Remember Me” enabled, 2FA is required for the initial login. Subsequent logins on the same device may not require a code until the session expires.
Disabling 2FA
Users can disable two-factor authentication from their profile:Enter Current Password
For security, you must verify your identity by entering your current password.
Troubleshooting 2FA
Code Not Accepted
Time Synchronization Issues
Time Synchronization Issues
Problem: TOTP codes are time-sensitive. Clock drift causes invalid codes.Solution:
- Ensure your device time is set to automatic
- Verify the server time is correct
- Check timezone settings on both devices
- Use NTP to synchronize server clock
Code Already Used
Code Already Used
Problem: Each code can only be used once.Solution:
- Wait for the next code (codes refresh every 30 seconds)
- Don’t submit the same code multiple times
- Ensure browser/app isn’t auto-retrying
Wrong Account
Wrong Account
Problem: Using code from a different account or service.Solution:
- Verify you’re using the correct entry in your authenticator app
- Check the account name matches your WireGuard Easy server
- Delete and re-setup if you have duplicate entries
QR Code Setup Failed
QR Code Setup Failed
Problem: QR code scan didn’t properly register.Solution:
- Disable and re-enable 2FA to get a new QR code
- Try manual entry with the secret key
- Use a different authenticator app
- Check for app updates
Lost Access to Authenticator
Scenarios and Solutions:- Device Lost or Broken
- App Uninstalled
- New Phone
If you have backup codes:
- Use the backup code to log in
- Disable 2FA
- Re-enable with a new device
- Contact your administrator
- Admin can disable 2FA for your account
- Re-enable 2FA after regaining access
Admin: Resetting User 2FA
Administrators can disable 2FA for locked-out users:Security Best Practices
Choosing an Authenticator
Cloud Backup
Apps: Authy, 1Password, BitwardenPros: Recovery if device is lostCons: Depends on provider security
Local Only
Apps: Google Authenticator (without transfer)Pros: No cloud exposureCons: Difficult recovery
Multi-Device
Apps: 1Password, Bitwarden, AuthyPros: Access from multiple devicesCons: More devices to secure
Encrypted Vault
Apps: 1Password, BitwardenPros: Strong encryption, password protectedCons: Requires separate app subscription
Backup and Recovery
Save Backup Codes
When enabling 2FA, securely store the displayed secret key:
- Write it down on paper
- Store in a password manager
- Keep in a safe or secure location
- Never store in plain text on devices
Multiple Authenticators
For critical access, set up the same account in multiple apps:
- Primary device authenticator
- Backup device authenticator
- Password manager with TOTP support
Test Before Logging Out
After enabling 2FA:
- Open an incognito/private window
- Test the login process
- Verify codes work
- Only close original session after confirming
Technical Details
TOTP Algorithm
WireGuard Easy implements standard TOTP (RFC 6238):QR Code Format
The generated QR code contains a TOTP URI:otpauth://totp/: Protocol and typeWireGuardEasy: Issuer nameusername: User identifiersecret=SECRET: Base32-encoded secret keyissuer=WireGuardEasy: Issuer parameter
API Endpoints
Setup 2FA:FAQ
Can I use SMS instead of an app?
Can I use SMS instead of an app?
No, WireGuard Easy only supports TOTP-based authentication through authenticator apps. SMS 2FA is considered less secure and is not implemented.
Do all users need to enable 2FA?
Do all users need to enable 2FA?
2FA is optional for each user. Administrators can encourage or require it through policy, but the system doesn’t enforce it by default.
What happens if I change my password?
What happens if I change my password?
Changing your password does not affect your 2FA setup. The same authenticator codes continue to work.
Can I have multiple devices with the same 2FA?
Can I have multiple devices with the same 2FA?
Yes! You can scan the QR code with multiple authenticator apps during initial setup. All apps generate the same valid codes.
How secure is TOTP compared to other methods?
How secure is TOTP compared to other methods?
TOTP is more secure than SMS 2FA and provides strong protection against:
- Password-only attacks
- Phishing (unless attacker performs real-time MITM)
- Credential stuffing
- Brute force attempts