
Traditional login methods, relying solely on a username and password, are vulnerable to various attacks, such as password guessing and phishing attempts. As more IoT data is collected and stored on the platform, additional protection from unauthorized access is required. Recognizing the growing need for data security, we are introducing two-factor authentication for our web and mobile applications. All Navixy partners now can provide two-factor authentication for their clients, depending on their needs and security requirements.
According to Denis Demianikov, VP of Product Management at Navixy, this security measure has been highly anticipated, and adding it was a matter of time.
Introducing two-factor authentication (2FA) was a natural step for Navixy to meet the growing demand for safeguarding sensitive telematics data. By requiring a one-time passcode sent via email, 2FA provides significant account protection with minimal user input. This security level-up provides more confidence for our users that their data is better protected from unauthorized access.
– Denis Demianikov, VP of Product Management at Navixy
The two-factor authentication (2FA) solutions market is growing due to higher demand for secure products, technological advances, and expanded distribution channels. Favorable policies and data privacy trends also drive this growth, creating the need for augmented security and making two-factor authentication a global technological benchmark.
Recent stats perfectly illustrate this trend, claiming weak or stolen passwords to be blamed for 81% of data breaches, with an average cost of $4.24 million per data breach incident.
No wonder two-factor authentication is becoming a standard in all data-driven industries. Still, it can be most in demand in the fields requiring stricter security measures. Some examples include:
As mentioned, two-factor authentication adds an extra layer of security to user accounts. It requires two forms of identification before granting access, combining something you know (like a password) with something you have (like a phone or security token) to better protect against unauthorized access.
Two-factor authentication can be implemented in several different ways, including:
Behind the scenes, two-factor authentication takes several steps.
These steps ensure that even if an attacker steals the user’s password, they would still need the second authentication factor to gain access, making it significantly harder for unauthorized users to break into the account.
Our first stage of two-factor authentication implementation focuses on generating one-time passcodes and sending them to the email used to access the platform. Each passcode is valid for only 5 minutes, minimizing the window for potential misuse. Additional requests are limited to prevent abuse, allowing a new passcode to be requested only once every minute.

Knowing that the login page is the first step in a user’s journey, we ensured minimal disruption while integrating two-factor authentication into the existing login process. The usual credential validation procedure remains the same, so the next steps are available only if the login/password combination is valid.
From the user’s perspective, there are just a couple of extra steps:
For all users with two-factor authentication, a second factor validation will be performed during each log in attempt, whenever the user’s session has expired. The login process will remain exactly the same for users who have two-factor authentication turned off and for demo accounts.
Once the user's login credentials are verified, the system generates a unique one-time password (OTP) or verification code with a limited lifetime. It is a six-digit code consisting of random digits from 0 to 9 that is valid for just 5 minutes, minimizing the risk of misuse. Only one OTP is valid during this time, ensuring all previously generated codes cannot be used for authentication.

The OTP is then securely and promptly communicated to the user via the email approved during login/password validation. To prevent abuse and brute force attempts, users can request a new code once every minute. To validate the code provided by users, we check the current OTP’s lifetime. If valid, we check the actual digit sequence:
The number of validation attempts is limited by the authentication API call rate limit, ensuring consistent performance and security.
To further limit code guessing attempts, we’ve limited the special user session to just 5 minutes. After 5 minutes of unsuccessful code validation attempts or simply idling, the login and password are requested again, and the authentication starts from the beginning.
Diagram outlines the identity verification steps, highlighting key security processes like one-time passcode generation and validation.
To support requesting a second factor during authentication, we’ve updated our API:
/user/auth method now returns a new special session type if a second factor is required./user/auth/code/resend method to resend an authentication code to the specified emailuser/auth/code/verify method.For a detailed review of our authentication process, refer to the Developer Documentation.
Platform administrators can adjust security settings in the Admin Panel. Currently, you can control whether to enable two-factor authentication for:
Note that the current implementation only allows enabling two-factor authentication for all account users, including sub-users created in the main account.

To configure 2FA settings, you can utilize our updated Panel API, using the calls to read and update 2FA settings for a list of specified users or all users of the platform, as well as set default settings for new users. Learn more about our Panel API in the Developer Hub.
The 2FA feature is designed to work flawlessly across desktop and mobile web layouts, thanks to responsive UI practices.

The changes will also affect the X-Monitor application for iOS and Android, and will be included in our upcoming new mobile app for fleet managers.
The introduction of two-factor authentication marks a significant milestone in our commitment to enhancing security. Next, we envision this feature becoming more flexible and configurable:
We encourage our partners to take advantage of this powerful feature and experience its benefits.
Want to know more about protecting your telematics data in Navixy? Reach out to our team to have your questions on safety and access protection, as well as other platform’s capabilities, answered.