Two-factor authentication is a common requirement for protecting ERP access, especially when your team is working across production, accounting, and customer-facing workflows. If logins are shared, reused, or exposed, it can put business data and day-to-day execution at risk.
Cetec ERP supports two-factor authentication per user, and it also supports enforcing multifactor authentication for all users through a single configuration setting. The steps below cover both.
Enable Two-Factor Authentication for a Single User
To set up two-factor authentication for your own account, open your user profile and select TWO FACTOR in the left-hand menu. Cetec ERP will display a QR code. Scan it with your phone’s authenticator app and complete the setup prompts.
Each user can enable two-factor authentication for their own login, so you can roll it out gradually or start with specific roles first.
Require Multifactor Authentication for All Users
If you need to enforce multifactor authentication across your account, you can do that with a configuration setting. Go to Admin > Config settings > Config settings and search for Require Multifactor Authentication. After you enable it, all users will be required to set up multifactor authentication before continuing normal use.
As a decision point, enable the global requirement when you need consistent controls across the organization (for example, when you have shared terminals, broader user access, or audit expectations). Leave it user-driven when you are piloting MFA or rolling it out by team.
Key Takeaways
- Users can enable two-factor authentication from their profile under TWO FACTOR.
- Setup uses a QR code scanned into an authenticator app on a phone.
- Admins can require multifactor authentication for all users via the Require Multifactor Authentication config setting.
- Enforcement is the right approach when you need consistent access control across the whole organization.
Conclusion
Two-factor authentication is a straightforward control that materially reduces the risk of unauthorized access. Whether you enable it per user or require it globally, the goal is the same: keep ERP access tied to the right people so your system remains trustworthy day to day.