burger
infomaniak
infomaniak
cloud-computing-logo
Cloud Computing
web-domain-logo
Web & Domains
event-marketing-logo
Events & Marketing
  • Our products
    • Collaborative tools icon chevron
    • Web & Domains icon chevron
    • Cloud Computing icon chevron
    • Events & Marketing icon chevron
    • Streaming icon chevron

      ksuiteCollaborative suite

      Discover the collaborative suite → Discover →
    • kSuite Professional email, sovereign cloud and AI for sustainable performance
    • kSuite The suite for secure communication, storage and sharing
    • kdrive
      kDrive Store, collaborate and share your files
    • mail service
      Mail Service Create your email addresses with your domain
    • kChat
      kChat Communicate live with your teams
    • kmeet
      kMeet Organise your meetings online in complete security
    • swisstransfer
      SwissTransfer Send your files up to 50 GB free of charge.
    • kpaste
      kPaste Share and encrypt your sensitive information
    • ksuite
      Custom Brand Control the brand image of your products
    • kChat
      Chk Link reducer & QR code generator
      Find the web hosting solution you need
    • Domain name
      Domain name Reserve your domain name at the best price
    • Site Creator
      Site Creator Create your website with ease
    • web hosting
      Web Hosting Create your website with over 100 CMS
    • web hosting
      Wordpress Hosting Create your WordPress website easily
    • Cloud Server
      Cloud Server Power up your sites with guaranteed resources
    • SSL Certificat
      SSL certificates Secure your websites with an EV or DV certificate
    • Options
    • Domain privacy
      Domain Privacy Protect your domains’ private data
    • DNS Fast Anycast
      FastAnycast DNS Speed up your site access times
    • Dyn DNS
      DynDNS Access your devices remotely
    • Dyn DNS
      Renewal Warranty Secure your domains against loss and theft
      Find the right Cloud Computing solution

      Cloud services

    • public cloud
      Public Cloud (IaaS) Create your projects in a high-end, ultra-competitive Cloud
    • Cloud Server
      VPS Cloud Create a Windows / Linux server
    • Kubernetes service Deploy your containerised apps on a large scale.
    • VPS Lite
      VPS Lite Create a Windows/Linux server at a low cost
    • Database Service Manage your databases with a managed solution
    • jelastic cloud
      Jelastic Cloud (PaaS) Create your own customised environments
    • Other services

    • llm api
      AI Tools Boost your productivity with our sovereign AI
    • swiss backup
      Swiss Backup Back up your devices in the Cloud
    • nas synology
      NAS Synology Rent a NAS in our secure data centers
    • High availibility
      Very High Availability Create a multi-data center infrastructure with customised SLAs
    • Housing
      Housing Install your servers in our data centers
    • Auth Add a privacy-friendly login method to your apps
      Infomaniak Events, the independent local events portal
      Online ticketing service with a wide choice of concerts, shows and events.
    • online shop
      Ticketing Create your ticketing service and sell tickets
    • kdrive
      Access Control Control access to your events with ease
    • kdrive
      Guest manager Automate your event invitations
    • kdrive
      Newsletter Send your newsletters at competitive prices
    • Streaming radio
      Streaming radio Create and broadcast your own live radio station online
    • streaming video
      Video-Streaming Create and broadcast live events and TV online
    • VOD and AOD
      VOD & AOD service Host and broadcast your recordings without limits
  • Resources
    documentation icon Documentation
    Guides & tutorials
    API documentation
    special offers icon Special offers
    Get started for free
    Student programme
    Become an affiliate
    partner program icon Partner programme
    Find a partner
    Become a partner
    support icon Support & contact
    Contact Support
    Premium support - 24/7
    Contact our sales department
    Hiring an expert
    Migrate to Infomaniak
  • About us
    forest
    icon Ecological commitment
    We pollute. But we are taking action to reduce the footprint of our services and infrastructure
    Discover our commitment →
    icon About Infomaniak
    Our vision, our values
    Our teams
    Infomaniak is recruiting
    Press and communication
    Blog and news
    icon Security
    Data confidentiality
    Bug Bounty Programme
  • Get started for free
    Sign in
  • search-icon
    close-icon
      icon

      Would your needs exceed our solutions? To find out, contact us so that we can advise you personally.

      Our flagship products:
  • search-icon
  • Get started for free
    Sign in
Price Price
Knowledge base

1000 FAQs, 500 tutorials and explanatory videos. Here, there are only solutions!

Knowledge base Enable two-step verification (Acronis backup)

    Enable two-step verification (Acronis backup)

    This guide explains how to enable two-factor authentication, also known as two-factor authentication (2FA) or two-step verification for logging into the Acronis application used with Swiss Backup.

     

    Setting up two-factor authentication

    Two-factor authentication (2FA) is a type of multi-factor authentication that verifies a user's identity by using a combination of two different factors:

    • something the user knows (a PIN code or a password)
    • something that a user possesses (a token)
    • something that is part of the user (biometrics)

    Two-factor authentication provides additional protection against unauthorized access to your account.

    The platform is compatible with authentication by time-based one-time password (TOTP). If TOTP authentication is enabled in the system, users must enter their usual password as well as the unique TOTP code to access the system. In other words, a user provides the password (first factor) and the TOTP code (second factor). The TOTP code is generated in the authentication application of the device that applies the second factor, based on the current time and the secret code (QR code or alphanumeric code) provided by the platform.

     

    How it works

    How 2FA works:

    1. You enable two-factor authentication at the organizational level.
    2. All organization users must install an authentication app on the device that applies the second factor (mobile phone, laptop or desktop, or tablet) and that will be used to generate unique TOTP codes, for example:
      • Google Authenticator iOS / Android
      • Microsoft Authenticator iOS / Android
    3. Users must ensure that the time displayed on the device where the authentication application is installed is correctly set and accurately reflects the current time.
    4. The users in your organization must log back into the system.
    5. After entering their username and password, they will be prompted to set up two-factor authentication for their user account.
    6. They must scan the QR code using their authentication app. If they are unable to scan the QR code, they can use the TOTP secret code displayed below and add it manually to the authentication app:
      • It is strongly recommended to record it (print the QR code, write down the TOTP secret code, use the application compatible with code backup in a Cloud). You will need the TOTP secret code to reset two-factor authentication if you lose the device that applies the second factor.
    7. The unique TOTP code will be generated in the authentication application. It is automatically regenerated every 30 seconds.
    8. On the «Set up two-factor authentication» screen, users must enter the TOTP code after entering their password.
    9. As a result, two-factor authentication will be set up for users.

    From now on, when users log in to the system, they will be prompted to enter the username and password, then the unique TOTP code generated in the authentication application. Users can indicate that the browser is a trusted browser when they log in to the system. The TOTP code will not be requested during subsequent logins made with this browser.

     

    Two-factor authentication

    Two-factor authentication provides additional protection against unauthorized access to your account. When two-factor authentication is set up, you must enter your password (first factor) and a unique code (second factor) to log in to the service console. The unique code is generated by a special application that must be installed on your mobile phone or another device you own. Even if someone discovers your username and password, they still won't be able to log in without accessing the device that applies the second factor.

    The unique code to set up two-factor authentication for your account is generated based on the current time of the device, as well as the secret code provided by the service Cyber Protection in the form of a QR code or an alphanumeric code. When you first log in, you must enter this secret code into the authentication application.

    Set up two-factor authentication for your account

    You can and should set up two-factor authentication for your account when two-factor authentication has been enabled by an administrator for your organization. If two-factor authentication was enabled while you were logged into the service console Cyber Protection, you will need to set it up at the end of your current session.

    Prerequisites

    • Two-factor authentication must be enabled for your organization.
    • You must be logged out of the Cyber Protection service console.

    Next:

    1. Choose a device for the second factor. This is often a smartphone, but you can also use a tablet, laptop, or desktop computer.
    2. Make sure the time displayed on the device is correctly set and reflects the current time, and that the device locks itself after a period of inactivity.
    3. Install the authentication app on the device. Possible apps include Google Authenticator, Authy, etc.
    4. Go to the login page of the service console Cyber Protection and set your password. The service console displays the QR code and the alphanumeric code.
    5. Save the QR code and the alphanumeric code in a convenient way (e.g., print the screen, write down the code or save the screenshot in the Cloud storage). If you lose the device that applies the second factor, you will be able to reset the two-factor authentication using these codes.
    6. Open the authentication app, then perform one of the following actions:
      • scan the QR code
      • Enter the alphanumeric code manually into the application (the authentication application generates a unique code; a new code will be generated every 30 seconds).
    7. Go back to the service console login page and enter the generated code. A unique code is valid for 30 seconds. If you wait more than 30 seconds, use the code generated just after.

    On your next login, you can select the box Trust this browser… In this case, the unique code will not be required for your login with this browser on this machine.

     

    What if...

    … I have lost the device that applies the second factor?

    If you have a trusted browser, you can log in using it. However, when you get a new device, repeat steps 1 to 3 and 6 to 7 of the procedure above using the new device and the stored QR code or alphanumeric code.

    If you did not record the code, ask your administrator or support Infomaniak to reset two-factor authentication for your account, then repeat steps 1 to 3, and 6 and 7 of the procedure above using the new device.

    … I want to change the device that applies the second factor?

    When logging in, click on the link Reset two-factor authentication‍, confirm the operation by entering the unique code, then repeat the procedure above using the new device.



    Link to this FAQ:
    Has this FAQ been helpful?
    Thank you for your feedback. Improve this FAQ?
    Please do not ask any questions through this form, it is only used to improve our FAQ.
    Please use our contact form for any question.
    Your message has been sent. Thank you for suggesting an improvement to this FAQ.
    Display all FAQs for this product
    logo infomaniak
    Prices do not include VAT
    facebook
    twitter
    linkedin
    instagram

    Infomaniak

    About Infomaniak The team Infomaniak is recruiting Press space Infomaniak blog All certificates Products and offers Clients' opinions

    Support

    Assistance 7/7 FAQ and guides Premium Support Sales contact API REST Report abuse WHOIS Statuts Public Cloud Service status

    Partnerships

    Become a reseller Affiliate programme Directory of partners Requests for quotes

    Ecology

    Green hosting Certificates & awards

    Follow our development

    The email entered is invalid
    earth icon
    • EN
      • EN
      • DE
      • ES
      • FR
      • IT
    ©2025 Infomaniak - Legal documents - Legal notice - Data Protection - Privacy Policy - Site map - Manage your cookies
    icann-logo
    swiss
    new-iso
    swiss-hosting
    logo infomaniak
    Prices do not include VAT

    Infomaniak

    About Infomaniak The team Infomaniak is recruiting Press and media Infomaniak blog All certificates Products and offers Clients' opinions

    Support

    Assistance 7/7 FAQ and guides Premium Support offer Sales contact API REST Report abuse WHOIS Statuts Public Cloud Service status

    Partnerships

    Become a reseller Affiliate programme Directory of partners Requests for quotes

    Ecology

    Green hosting Certificates & awards

    Follow our development

    The email entered is invalid
    icann-logo
    swiss
    new-iso
    swiss-hosting

    facebook
    twitter
    linkedin
    instagram
    ©2025 Infomaniak
    Contracts - Legal notice - Data Protection - Privacy Policy - Site map - Manage your cookies

    Managers

    earth icon
    • EN
      • EN
      • DE
      • ES
      • FR
      • IT
    Your browser is outdated, security and browsability are no longer guaranteed. We recommend that you update it as soon as possible by clicking here.