Beta

Second Factors, Ready to Use

Enable TOTP, SMS, email, or passkey verification per user. QR codes generate, backup codes issue, and verification triggers when you need it.

Account security

Protect accounts with second-factor authentication

Enable MFA for users with time-based one-time passwords, SMS codes, email verification, or phishing-resistant passkeys. Trigger verification on sensitive actions and provide backup codes for account recovery.

Capabilities

Everything you need for second-factor authentication

TOTP authenticator apps

Generate QR codes for Google Authenticator, Authy, and other TOTP apps. Verify six-digit codes with time- window tolerance.

SMS verification

Send verification codes via SMS to registered phone numbers. Codes expire after configurable durations.

Email verification

Send verification codes or magic links to user email addresses. Useful for passwordless authentication flows.

Passkey authentication

Enable phishing-resistant authentication with WebAuthn passkeys. Users authenticate with biometrics or hardware security keys, eliminating shared secrets entirely.

Backup codes

Generate one-time backup codes when MFA is enabled. Users can authenticate with backup codes if they lose access to their primary MFA method.

On-demand verification

Trigger MFA verification at any point in your application. Protect sensitive actions like password changes, payment updates, or data exports.

Recovery flows

Handle lost device scenarios with secure recovery options. Admins can reset MFA for users who lose access.

Trusted devices

Allow users to remember devices and skip MFA for configurable periods. Revoke device trust instantly when needed.

30s
TOTP window

Code validity duration

5
MFA methods

TOTP, SMS, email, passkeys, backup codes

< 100ms
Verification time

Code validation latency

Why it matters

Protect accounts with strong authentication

Passkeys for phishing-resistant security

TOTP and SMS codes can be intercepted through phishing attacks. Passkeys use public-key cryptography bound to specific domains, making credential theft through phishing mathematically impossible.
In practice

A user registers a passkey with Face ID on their phone. Authentication happens through biometric verification that never leaves their device. No codes to intercept, no secrets to steal.

MFA without implementation complexity

Building MFA requires TOTP libraries, secure code generation, backup code storage, and recovery flows. Conjoin Auth MFA provides complete multi-factor authentication through API calls.
In practice

Enable TOTP-based MFA for a user in one API call. The response includes a QR code for scanning and backup codes for recovery. Verify codes on login without implementing TOTP verification.

Multiple MFA methods for flexibility

Users have different preferences and device access. Conjoin Auth MFA supports passkeys, authenticator apps, SMS, and email, allowing users to choose their preferred method.
In practice

A user sets up a passkey with Face ID for daily logins. When using a shared computer, they fall back to TOTP. Backup codes remain available if they lose access to their devices.

Trigger MFA when you need it

Your application decides when to require a second factor. Conjoin Auth MFA gives you the flexibility to prompt for verification on sensitive actions, not just at login.
In practice

A user changes their password or accesses billing settings. Your app calls the MFA verification endpoint before allowing the action, adding protection exactly where it matters.

Built for Your Workflow

Ship faster with solutions designed for real-world needs

How Conjoin solves this

Enable TOTP for users with one API call. Conjoin generates secrets, creates QR codes for authenticator apps, and issues backup codes for recovery. Secrets store encrypted, and code verification handles time-window tolerance automatically.

Impact

Ship complete authenticator app support without managing TOTP secrets or building recovery flows.

How Conjoin solves this

Register and verify passkeys through simple API calls. Conjoin handles challenge generation, attestation verification, credential storage, and cryptographic validation for Face ID, Touch ID, and hardware keys.

Impact

Add phishing-resistant passkey authentication without implementing WebAuthn protocols.

How Conjoin solves this

Enable SMS verification codes through Conjoin Messaging Verifications. Phone numbers validate before enrollment, codes generate with configurable expiry, and delivery confirmation tracks message success across carriers. Rate limiting prevents abuse while allowing legitimate retry attempts.

Impact

Ship SMS-based MFA without carrier contracts, delivery infrastructure, or abuse monitoring.

How Conjoin solves this

Backup codes generate automatically when MFA enrolls. Each code hashes before storage, invalidates after single use, and can be regenerated through the API when users need fresh recovery options.

Impact

Provide account recovery for lost devices without building secure backup code infrastructure.

How Conjoin solves this

Trigger MFA verification before high-risk operations like password changes, billing updates, or admin actions. Your application calls the verification endpoint when needed, and Conjoin challenges the user through their configured MFA method.

Impact

Protect critical workflows with step-up authentication without disrupting everyday usage.

Ship your application today

Start building with Conjoin today. Free tier includes everything you need to prototype and launch. Scale when you're ready.