Skip to content

Mideye MFA: 11 Authentication Methods

Mideye Server supports eleven authentication types, each combining a static password with a different second-factor method. This page explains what each type does, when to use it, and how they relate to each other.


#TypeSecond factorChallenge-response?Internet required?Fallback chain
1PasswordNone (single factor)NoNo
2MobileSMS OTP or Mideye+ push OTPYesYesPlus (5)
3TokenHardware token OTP (YubiKey, HID)YesYes (Yubicloud)
4ConcatenatedHID Mini Token OTP (appended to password)NoYes (Yubicloud)
5PlusManual OTP from Mideye+ appYesNo (generated locally)
6TouchPush notification → approve/rejectNoYesMagic Link SMS
7Touch-PlusPush → Plus → On-prem TOTPNoYes (degrades gracefully)Plus (5) or On-prem (11)
8Touch-MobilePush → encrypted SMS → Plus/On-premNoYes (degrades gracefully)Mobile (2), Plus (5), On-prem (11)
9Assisted LoginApprover push notificationNoYesMagic Link SMS to approver
10Shared AccountUser-provided phone/token for OTPYesYes
11On-premTOTP/HOTP from authenticator app or hardware tokenYesNo

The user is authenticated with a static password only. No second factor.

This is single-factor authentication — not MFA. Use it only for low-risk scenarios or as a temporary configuration during initial deployment. Most compliance frameworks (NIS2, GDPR, PCI DSS) require a second factor for remote access.


Password plus a one-time password delivered in real-time. Users with the Mideye+ app receive OTPs via data push (mobile data or Wi-Fi). Users without Mideye+ receive OTPs via SMS. Falls back to Plus (type 5) if the phone is unreachable.

Requires RADIUS challenge-response support on the VPN/firewall.

Password plus a one-time password from a hardware token (YubiKey or HID Mini Token). The password and OTP are entered in two separate steps via RADIUS challenge-response.

Password plus a hardware token OTP entered as a single string — the OTP is appended directly to the password. For example, if the password is Sd43Erg7 and the OTP is 28592434, the user enters Sd43Erg728592434.

Only supported with HID Mini Token. Does not require challenge-response support — useful for VPNs that don’t support two-step RADIUS dialogues.

Password plus a manually generated OTP from the Mideye+ app. The user signs a challenge displayed on screen by opening the Mideye+ app and reading the resulting code. Requires Mideye+ activation.

Primarily used as a fallback from Touch (type 6) and Touch-Plus (type 7) when push delivery fails. Can also be used as a standalone type. Requires challenge-response support.

Password plus a TOTP or HOTP code from an authenticator app (Mideye+, Google Authenticator, Microsoft Authenticator, etc.) or a TOTP/HOTP hardware token. The code is validated entirely on the local Mideye Server — no internet connection required.

TOTP seeds are distributed via QR code in the Web Admin GUI or the Self-Service Portal. Requires challenge-response support.


Password plus a push notification sent to the Mideye+ app. The user taps Approve or Reject — no code entry needed. Does not require challenge-response support on the VPN/firewall.

Users without Mideye+ activated receive a Magic Link via SMS instead, letting them approve the login by clicking a link.

Uses Touch (type 6) as the primary method, with automatic fallback:

  1. Touch push → if the phone is reachable via data push
  2. On-prem TOTP → if the user has an on-premise token registered
  3. Plus → manual OTP from Mideye+ app

This provides the best combination of user experience and resilience. If internet connectivity is lost, authentication degrades gracefully to locally-validated TOTP codes.

Uses Touch (type 6) as the primary method, with a deeper fallback chain:

  1. Touch push → if the phone is reachable via data push
  2. Encrypted SMS to Mideye+ app → if push fails but the network is available
  3. On-prem TOTP → if the user has an on-premise token registered
  4. Plus → manual OTP from Mideye+ app

Touch-Mobile is designed for environments where maximum delivery reliability matters.


Password plus approval from a designated person. After the user’s password is validated, Mideye sends a push notification to the approver’s Mideye+ app. The approver reviews and taps Accept or Reject.

Used for shared workstations, help desk scenarios, and dual-control environments. See Assisted Login for details.

Password plus a second factor tied to a phone number or token that the user provides at login time. After entering their password, the user is prompted for a phone number or token serial number. Mideye looks up the pre-registered number in the directory (otherMobile in AD, Mobile in other LDAP repositories) and uses it for OTP delivery.

Used for shared or generic accounts where multiple people authenticate with the same username but different phones or tokens.


ScenarioRecommended type
Standard VPN/remote accessTouch-Plus (7) — push with TOTP fallback
Maximum delivery reliabilityTouch-Mobile (8) — push → SMS → TOTP
Air-gapped / no internetOn-prem (11) — local TOTP only
VPN doesn’t support challenge-responseTouch (6) — push, no challenge-response needed
Hardware tokens onlyToken (3) or Concatenated (4)
Supervised/shared workstationsAssisted Login (9) — approver-based
Shared/generic accountsShared Account (10) — per-login phone/token
Legacy SMS-onlyMobile (2) — SMS OTP
Temporary/low-riskPassword (1) — single factor (not recommended)

Authentication types are assigned per user or per directory group. You can mix types across your user base — different groups can use different methods concurrently.