Multi-Factor Authentication
- Last Updated: December 4, 2025
- 2 minute read
- MOVEit Transfer
- Version 2024.1
- Version 2024
- Documentation
To verify user identity, MOVEit Transfer gives users private access to a uniquely-generated verification code (made available by email or mobile app). This additional verification step ensures user sign on is genuine.
Allow Multi-Factor Authentication... Enables
MFA, organization-wide. (Check this box to reveal the full set of MFA administrator
controls)
(MFA Administrator Controls Panel)
- Available Methods. View and select verification methods available to users.
- Remember this Device. Enable users to bypass MFA from a device that was verified.
- Enforce Multi-Factor Authentication. Implement MFA as policy across an entire user class. (For other classes it will be optional.)
- Exempt a user. Decouple users from multi-factor authentication requirements altogether.
Best Practices for Applying MFA to Your Organization
Typical administrator tasks for 'roll-out' of multi-factor authentication follow:
|
1. |
Check your site's data requirements. |
|
|
2. |
|
|
|
3. |
Add Available Methods. |
Required. You must select at least one method. |
|
4. |
Enable Remember this Device. |
|
|
5. |
Enforce Multi-Factor Authentication. (As policy) |
|
How Does MFA Affect My Users?
Multi-factor authentication in MOVEit Transfer is:
- Available to registered user classes. (Guest unregistered user classes have no MOVEit Transfer account and only package-level access.)
- Optional to all when enabled, unless a MOVEit Transfer system administrator requires it as policy.
- Never required for user sessions initiated on the same machine or virtual machine where MOVEit Transfer runs.
- Never required for users leveraging SAML. Tip: Multi-factor authentication adds another step in the MOVEit Transfer user sign-on sequence. Users can eliminate this step by adding the current device to a list of trusted clients by selecting the "Remember this device" option at sign on.