Mandatory two-factor authentication for accounts
Starting December 11 2024, two-factor authentication (2FA) via email will be enabled by default for all new and existing Sigma users that use password-based authentication.
This change is being implemented to protect against security threats. 2FA enhances security by adding an extra layer of protection to customer accounts.
As this is a mandatory requirement, you cannot apply for an exception to 2FA. After 2FA is enabled, it cannot be disabled.
There is no additional cost associated with enabling 2FA.
When will this change take place?
The mandatory 2FA via email for password-based users will be enforced starting December 11, 2024.
Who is affected by this change?
All customers currently using password-based authentication will be affected. Users with SAML or OAuth authentication methods are not affected.
Sigma will automatically enable 2FA via email for all users with password-based accounts. During the sign in process, after entering their existing password, users will receive a 2FA code sent to their registered email address. This code must be entered to complete the sign in process.
For password-based users, the mandatory 2FA process will only be available through email, and not through other modes such as SMS or an authentication app.
Organizations using SAML or OAuth may have other 2FA options available, depending on their organization infrastructure. If you want to switch from password-based authentication to SAML or OAuth, your organization's IT team must configure and enable SAML or OAuth in your environment. See Manage authentication for more information. Contact Sigma Support for additional assistance.
Are guest and embed users affected?
Embed users will not be affected as they cannot to sign in to Sigma (the secure embed URLs use client ID and client secret for access).
If your organization has enabled guest users, they will be required to sign in with 2FA. To access your authentication settings, see Manage authentication method and options.
Effects on organizations using SAML or OAuth
Authentication methods using SAML or OAuth only are not affected by this change. Any user account configured with a password option (such as SAML or Password and OAuth or Password) will have 2FA enabled by default. If using the password option during sign-in, you will need to complete the email 2FA process.
Sigma encourages the use of stronger authentication mechanisms, such as SAML and OAuth, but they are not required at this time.
How will this change affect the user experience and API access?
For users who continue using password-based authentication, the only change will be the need to enter a 2FA code sent via email. For organizations using SAML or OAuth, there will be no change in the login experience.
This change will not impact API access. The authentication process for our public API does not include 2FA.
Troubleshooting
What if users forget their 2FA email or are locked out?
For further assistance, contact Sigma Support or your dedicated Sigma Account Executive.
Who can I contact for support or additional questions?
For further assistance, please reach out to Sigma’s support team or your dedicated Sigma account representative.
How will 2FA affect browser-based automation accounts (such as Cypress or Selenium testing accounts)?
These accounts may not be able to complete the 2FA process required to access Sigma. For automated testing, we recommend using the Sigma REST API.
Updated about 13 hours ago