Multi-factor authentication (also known as "MFA", "two-factor authentication", or "2FA") is a verification system that uses something you have to help protect your account. Instrumentl supports MFA using the Time-Based One-Time Password algorithm (TOTP).*
Using two-factor authentication to log into Instrumentl significantly enhances your account's security compared to signing in with a password alone. By entering a one-time passcode upon every login, you're proactively protecting both yourself and your account from potential phishing attacks and reducing vulnerability concerns.
*Learn more about TOTP:
You may refer to technical documentation about the Time-Based One-Time Password algorithm as specified in RFC 6238.
Instrumentl currently prioritizes 2FA configuration using TOTP via an authenticator app to your benefit.
Why? An app-based MFA authentication method that use a form of OTP affords more security and is more robust compared to the more common, weaker form of SMS/Voice authentication (sending a code to a user's phone or email).
Setting up MFA
Currently, 2FA is available to all users on an opt-in basis at the user-level. I.e., when a user decides to enable 2FA, it does not automatically enable the setting for other team members, and it is not compulsory for all users on the account.
To log in using MFA:
First, log into your Instrumentl account.
Navigate to your Settings page via Account > Settings at the bottom left of your screen.
Scroll down to the "Security" section and click the Enable button to the right of the option "Multi-Factor Authentication (MFA)".
Next, scan the provided QR code using an authentication application of your choice (consider reputable options such as Google Authenticator, Authy, 1Password, or Microsoft Authenticator). Instrumentl is neither formally affiliated nor sponsored by these apps.
Once MFA is enabled, you'll be prompted to enter a six-digit code from your authenticator app each time you log in.
Currently, Instrumentl's 2FA login configuration is only available via an authenticator app and does not yet support SMS/Voice authentication.
When it comes to protection against cybersecurity threats, the U.S. Cybersecurity & Infrastructure Security Agency ranks SMS/Voice MFA authentication as the weakest form of MFA (Dept. of Homeland Security; 2022).
Managing MFA Status
While Instrumentl account owners & designed admins cannot enforce Core Users to enable MFA or set it at the account level, they can view whether their teammates have configured 2FA login under the "Security" column on the account's Team page:
Note: If you cannot access your authenticator app and are locked out of your account, please contact Instrumentl Support for assistance at hello@instrumentl.com.
Consider adding 2FA to create an extra layer of protection for your data, time, safety, and energy. When you add multi-factor authentication, it takes just a few extra seconds for one additional verification step to bolster both your account's security and your longterm peace of mind.
Interested in using Single Sign-on (SSO) to easily log into Instrumentl? Learn more about our convenient SSO options here!
Contact Us 
Have any questions about MFA / 2FA or running into issues accessing your account? Message our Customer Support team via the chat bubble when logged in, or email us at hello@instrumentl.com.