Two-Factor Authentication (2FA)
Last updated: April 18, 2026
Two-factor authentication adds an extra layer of security to your Wevion account by requiring a second verification step beyond your password.
Prerequisites
- An active Wevion account
- An authenticator app installed on your phone (Google Authenticator, Authy, Microsoft Authenticator, or similar)
How It Works
Wevion uses Logto as its identity provider for authentication. Two-factor authentication is managed through Logto's security settings, which means 2FA configuration happens within the Logto authentication flow rather than inside the Wevion application itself.
When 2FA is enabled, logging in to Wevion requires:
- Your password — something you know
- A time-based one-time password (TOTP) — something you have (generated by your authenticator app)
This makes it significantly harder for unauthorized users to access your account, even if your password is compromised.
Step-by-Step Guide
Enabling 2FA
- Log in to Wevion
- Navigate to your Profile settings
- Look for the Security section
- Click Enable Two-Factor Authentication
- You'll be shown a QR code
- Open your authenticator app and scan the QR code
- Enter the 6-digit code displayed in your authenticator app to verify
- Save the backup/recovery codes in a secure location — you'll need these if you lose access to your authenticator app
- 2FA is now active on your account
Logging In with 2FA Enabled
- Go to wevion.ai and click Login
- Enter your email and password as usual
- You'll be prompted for a verification code
- Open your authenticator app and enter the current 6-digit code
- Click Verify to complete the login
Disabling 2FA
- Navigate to your Profile settings
- Go to the Security section
- Click Disable Two-Factor Authentication
- You may be asked to enter a TOTP code to confirm
- 2FA is now removed from your account
Recovery — Lost Access to Authenticator App
If you've lost your phone or can't access your authenticator app:
- Use one of the backup codes provided during setup
- Each backup code can only be used once
- After logging in with a backup code, immediately set up 2FA again with a new device
If you've also lost your backup codes:
- Contact Wevion support at support@wevion.ai
- You'll need to verify your identity (registered email, account details)
- The support team can assist with resetting 2FA on your account
Options and Configuration
| Option | Description |
|---|---|
| TOTP via authenticator app | The primary 2FA method — time-based 6-digit codes |
| Backup codes | One-time-use recovery codes generated during setup |
Best Practices
- Always save backup codes when enabling 2FA. Store them in a password manager or a secure physical location.
- Use a trusted authenticator app such as Google Authenticator, Authy, or Microsoft Authenticator.
- Enable 2FA on all accounts — especially your Meta/Facebook account and email, since they're connected to your Wevion workspace.
- Don't share TOTP codes with anyone. Each code expires after 30 seconds.
- If you get a new phone, set up the authenticator app on the new device before wiping the old one, or use backup codes to regain access.
FAQ
Is 2FA required? 2FA is not currently required by default, but it is strongly recommended for all users, especially Owners managing teams and billing.
Which authenticator apps are supported? Any app that supports the TOTP standard, including Google Authenticator, Authy, Microsoft Authenticator, 1Password, and Bitwarden.
What if I enter the wrong code? You'll be prompted to try again. After multiple failed attempts, your account may be temporarily locked for security. Wait a few minutes and try again with the correct code.
Can I use SMS-based 2FA? SMS-based 2FA is not currently available. TOTP via an authenticator app is the standard method. Email-based OTP is available as a fallback.
Does 2FA protect against all threats? 2FA significantly reduces risk from password breaches, phishing, and credential stuffing. However, it does not protect against malware on your device or social engineering attacks. Combine 2FA with strong passwords and secure browsing habits.