Getting Started with Mideye — Install & First MFA Login
This guide takes you from a fresh environment to a working MFA login. Most deployments reach a first test authentication in under an hour once prerequisites are ready.
Before you begin
Section titled “Before you begin”Make sure you have:
- A supported operating system (RHEL 8+, Debian 11+, Ubuntu 22.04+, or Windows Server 2019+)
- A database (SQL Server or MySQL)
- Network access to your target systems (VPN, RDS, or application)
- An identity source (Active Directory, LDAP, or local users)
Full prerequisites checklist Detailed requirements including ports, certificates, and connectivity.
Installation steps
Section titled “Installation steps”-
Install the server
Choose your platform:
- RHEL / Rocky / CentOS — RPM package with systemd
- Debian / Ubuntu — DEB package with apt
- Windows Server — MSI installer
-
Complete initial setup
Open the web interface and run through the configuration wizard:
- Create admin account
- Configure database connection
- Set up delivery services (SMS/push)
-
Connect your identity source
Link users from:
- Active Directory / LDAP
- Microsoft Entra ID
- Or use local user accounts
-
Add your first protected system
Configure a RADIUS client for your VPN or server:
-
Enable an MFA method
Choose how users will authenticate:
- SMS OTP — no app required
- Push via Mideye+ app — one-tap approval
- TOTP — works offline with any authenticator app
- All authentication types
-
Test and verify
Perform a test login and confirm it appears in authentication logs.
Quick reference
Section titled “Quick reference”| Task | Documentation |
|---|---|
| Server requirements | Pre-install checklist |
| Database setup | Database configuration |
| Firewall rules | Networking requirements |
| Certificate setup | Certificate management |
| Troubleshooting | Installation troubleshooting |
Upgrading from v5?
Section titled “Upgrading from v5?”If you’re migrating from Mideye Server v5, see Migration from v5 for database migration steps and side-by-side installation options.
Next steps
Section titled “Next steps”After your first successful authentication:
Add more integrations Protect additional VPNs, servers, and applications.
Enable Mideye Shield Protect against brute-force and MFA fatigue attacks.
Configure backup Set up automated backups of configuration and data.