1. Home
  2. iOS Docs
  3. Two-Factor Authentication

Two-Factor Authentication

Fusion SecureLink’s Two-Factor Authentication (2FA) feature enhances security by enabling OTP bypass, managing authentication configurations, sending notifications, and controlling device access. The system includes a comprehensive dashboard for configuration, monitoring, analytics, and AI-powered insights.

Web Dashboard

Image 2

The 2FA Dashboard provides a centralized view of authentication activity across your application, helping teams monitor usage, detect failures, and take corrective actions quickly.
The dashboard displays:

  • Authentications: Shows the total number of authentication attempts, along with today’s and yesterday’s counts.
  • Authentication Insights: A time-based graph showing the number of authentication events over time, enabling teams to detect spikes, drops, or unusual behavior.
  • Failures Breakdown: A visual breakdown of authentication failures by type, such as:
    • Timeout
    • Failed
    • Blocked
    This helps teams understand the primary reasons behind authentication issues.
  • Device Authentication Log:
    Image 2
    The Device Authentication Log provides a detailed, device-level view of authentication activity.From this section, you can view detailed information including:
    • Device ID
    • Device Model
    • OS
    • User Identifier
    • Number of authentication events
  • Block/Unblock Devices: Toggle the access button next to each device to immediately allow or restrict access.
    Image 2
    Image 2

2FA AI Agent

The 2FA dashboard includes an AI Agent, accessible via the Ask AI button at the top right of the screen.

Image 2

This AI agent analyzes authentication data and transforms complex metrics into clear, actionable insights. Once opened, the AI assistant allows you to interactively explore authentication performance using natural language.

Image 2

Using Fusion AI, you can:

  • Get Failure Insights: Understand what is causing authentication failures, such as OTP timeouts, OS-specific issues, or journey-related problems.
    Image 2
  • Graph Analysis: Ask the AI to explain the Authentication Insights and Failures Breakdown graphs. The AI highlights spikes, trends, and underlying causes in simple, readable summaries.
  • Device Risk Identification: Identify devices with repeated or abnormal authentication failures. The AI categorizes devices into risk levels (for example, high-risk or medium-risk) based on detected patterns.
  • Suggested Fixes: Receive AI-recommended corrective actions, such as increasing OTP timeout duration, improving retry handling for slow networks, or reviewing backend response times during peak usage.
    Image 2
    This AI-driven analysis helps teams proactively reduce authentication failures and improve overall security without manual investigation.

Configuring 2FA for Your App

You can configure Two-Factor Authentication differently based on your application type.

For Public Applications
  • Step 1: On the top right of the dashboard, select Configuration.
    Image 2
  • Step 2: Choose the Public Application option.
    Image 2
  • Step 3: Paste your Firebase Project Key Code.
    Image 2
  • Step 4: Select how many users are allowed on a single device.
    Image 2
  • Step 5: Save the configuration. A confirmation notification will appear, and Two-Factor Authentication (2FA) will now be enabled for your mobile app.
    Image 2
For Non-Public Applications
  • Step 1: On the dashboard, select Configuration.
    Image 2
  • Step 2: Choose the Non-Public Application option.
    Image 2
  • Step 3: Select whether the app OS supports Google Play Services.
    • If supported: Paste your Firebase Keys.
    • Image 2
    • If not supported: Paste the Application SHA.
    • Image 2
  • Step 4: Select the app’s Access Policy and choose whether to enforce User Bio Content.
  • Step 5: Save the configuration.
    Image 2
For Smart POS Devices
  • Step 1: On the dashboard, select Configuration.
    Image 2
  • Step 2: Choose the Smart POS option.
    Image 2
  • Step 3: If Google Play Services are not supported, paste the Application SHA.
    Image 2
  • Step 4: Select the Access Policy.
  • Step 5: Save the configuration.
    Image 2
OTP Bypass

The OTP Bypass feature streamlines authentication by:

  • Identifying the SIM in the device via USSD Code or ICCID/IMSI.
  • Recording OTP analytics such as:
    • Number of API calls
    • Verification time
    • App version info
    • Device network state
    • Android usage
    • Geolocation
  • Tracking the number of OTPs saved.
  • Showing daily, weekly, and monthly OTP usage trends.
  • Listing features that use OTP bypass.

Device Blocking

From the dashboard, you can block a device by its Device ID.

  • Once blocked, the mobile app will not work on that device.
  • The user will be notified of the block.

Additionally, Fusion AI helps identify devices that may require blocking by detecting repeated or abnormal authentication failure patterns, allowing teams to take proactive action before security or usability is impacted.