Multi-Factor Authentication (MFA): Setup and Troubleshooting

Last updated: January 15, 2026

Multi-Factor Authentication (MFA) adds an additional layer of security to Cyrisma accounts by requiring a second verification step during login.

MFA behavior depends on where users sign in. MFA can be configured at two levels: MSP and instance.


MFA Configuration Scenarios

MSP sign-in

MFA can be enabled in the MSP portal by users with the Administrator role.

To configure MFA in the MSP portal:

  • Sign in to msp.cyrisma.com

  • Navigate to the Organization Details page for the organization

  • Select Update

  • Set the MFA method

Available options include:

  • None

  • MFA using Email Code

  • MFA using Authenticator Code

When an organization’s MFA method is set in msp.cyrisma.com, it applies to all users signing in through msp.cyrisma.com for that organization.


Instance sign-in

Administrators can configure MFA for an individual instance.

Instance access can occur in two ways:

  • Users may sign in directly to the instance at ccxxxxxx.cyrisma.com

  • Users may access the instance from msp.cyrisma.com using single sign-on

To configure MFA at the instance level:

  • Access the instance UI

  • Navigate to Admin > System Config

  • Set the Two-Factor Authentication option

Available options include:

  • Disabled

  • MFA using Email Code

  • MFA using Authenticator Code

The instance-level MFA setting applies only to users who sign in directly to the instance.


Common MFA Issues and Resolutions

Email-based MFA: One-time passcode not received

  • Check spam or junk folders

  • Verify company email filters are not blocking Cyrisma notifications

Authenticator app: Invalid token or code not accepted

This issue is commonly caused by the device generating the MFA code having an incorrect system time.

MFA passcodes are time-based and are generated using a shared MFA secret stored in the authenticator application. If the device clock is not accurately synchronized, even a time difference of 30 seconds can cause the generated passcode to be rejected.


Resolution steps

  • On the device generating the MFA passcode (mobile phone or PC), verify that the system time is set automatically and synchronized with an internet time source.

  • Visit https://time.is on the same device to confirm whether the device time is accurately synced.

  • If the time is not synchronized, enable automatic time synchronization in the device’s operating system settings.

  • Once the device time is corrected, retry the MFA login.


If the issue persists

  • The MFA secret may be out of sync and require a reset.

  • MFA must be reset through the MSP platform.

  • After reset, reconfigure the authenticator application.


When to Contact Support

Contact Cyrisma Support if:

  • MFA issues persist after verifying device time synchronization and reconfiguring the authenticator application

  • The MFA device is lost or unavailable and cannot be recovered