System Administrator

The default CFS system administrator is the FID super user (e.g. cn=directory manager). This user is configured during the RadiantOne FID installation. When the CFS system administrator logs into the administration console, the following menu options are displayed.


In the Dashboard section, the Global View node displays all installed applications packages. Only installed applications are available for tenant administrators to use for their portals.

sysadmin 1

The Servers node displays all CFS servers configured in the system and their status. A CFS server can be Master, Proxy, Proxy Web API or System.

sysadmin 2


Settings Configuration

In the Settings section, the Configuration node contains many settings related to CFS.

  • Package Gallery URL – Since Radiant Logic manages a web gallery for application templates and themes, the location may change over time. This allows the CFS system administrator to change the location of the web gallery if needed.
  • Enable Web Proxy – Enable it in case your company requires a web proxy to access the internet. This parameter is used for downloading packages on the Web Gallery.
  • Web Proxy URL – URL of your company's web proxy.
  • Web Proxy Port – Port of your company's web proxy.

sysadmin 3

Login Page

The Login Page configuration pages are used to configure the "Global Login Page" for both CFS Master and CFS Proxy. If you have more than one tenant, the global login page can display a login / password form or a custom HTML code. This feature allows to have different Global Login Page if you are on the CFS Master or the Proxy.

  • Enable Login Form - Activate the login / password form on the Global Login Page.
  • Logo - This is the logo displayed on top of the Global Login Page. The recommended size is 425px (w) x 270px (h).
  • Css - Use a custom CSS for this page.
  • HTML - Enter a custome HTML code if you don't want to display the login form

sysadmin 4


The SMTP node contains the settings required to send emails automatically for certain activities like user account creation, user account locked, user password reset, activities related to 2-step verification, and notifications related to certificate changes for CFS.

  • Enable Sending Emails – allows for activating and de-activating support for sending automated emails.
  • SMTP Address – address of the SMTP server.
  • SSL – whether SSL should be used to communicate to the SMTP server.
  • Port – port to connect to the SMTP server.
  • Login – login for the SMTP server (optional: only required if you enter a password).
  • Password – password associated with the login for the SMTP server (optional: only required if you enter a login).
  • From – address the automated emails should come from.

sysadmin 5


The Access node contains the settings for who can access the System Dashboard.

  • Enter the group that is used to authorize a user to access the dashboard.
  • Enter the Root DN where to start the search for the user lookup.
  • At last, provide the attribute used to search for the user.



The Redirection node contains the settings to bypass the automatic redirection to the RTCs based on the user agent of the web browser. For example, a Linux machine or a smartphone don't have a kerberos token to provide for authentication so we might want to create rules that prevent some web browser from being redirected to the RTC (if any).

  • Bypass all the following rules - check this option if you want to ignore the rules and let any web browser to access the RTC (if any).
  • Click "New Rule" to add a new rule.
  • Each textbox must contain the Regular Expression of the web browser user agent that you want to ignore.



In the Tenants section, the All Tenants node displays a list of all configured tenants. You can edit the parameters of the tenant by clicking the Edit button. If you need to update the FID schema used by this tenant, click Schema. To configure the self-registration for the tenant, click Registration. You can also delete the tenant by clicking Delete. Note that deleting a tenant from this interface does not delete the configuration in FID but only disables the tenant. If you want to definitely remove the tenant from FID, you can use the PowerShell cmdlet: Remove-CfsTenant.

New Tenant

Tenants can be created from the New Tenant node.

On the General tab, enter the tenant name and the Login URL (associated with the tenant portal) field populates automatically.

sysadmin 6

On the Location tab, specify the location in the identity store for people, groups and the default system groups used by CFS (HelpDesk and Tenant Administrators). This allows the CFS system groups to be located in a different container/naming context than the groups used for authorization of end/portal users. CFS does not try to create those groups for you. For users, this allows you to point to an existing container where all portal users for this tenant are located. If the tenant allows self-registered users, a container below the People DN in the identity store must allow insertion operations for new user accounts. To enable support for self-registered users, please see the Tenant Administrator Guide.

sysadmin 7

The Schema tab allows you to define the following:

  • The attribute that identifies users in the identity store
  • The identity store attribute that contains the "display name" for users
  • The identity store attribute that contains the users' email address
  • The object class associated with groups in the identity store
  • The attribute used to get the members of a group in the identity store

sysadmin 8

On the following screen, you must enter the email address of the user that plays the role of the Tenant Administrator. This user must exist in the identity store and have a valid email address. This user is added to the CFS system group Tenant Administrators.

sysadmin 9

Password Policy

You can set the password policy you want to use for a tenant in CFS. First of all, log into the FID Control Panel and create a new Password Policy. See the FID Documentation if you need help.

password policy 1

password policy 1b

Navigate back to the System web site for CFS and, in the Tenants section, click the All Tenants node. Then choose Edit for the tenant you want to apply the new password policy.

password policy 2

In the drop-down list Password Policy, select the new policy you have just created in your FID. The following field Password Policy Description is a text used displayed to indicate password strength requirements. e.g. Length, number of digits, special characters.

password policy 3

Click Save.


To configure the attributes allowed for self-registration (remember the Tenant Administration must also enable support for the self-registration of users):

  1. Under the Tenants node, click All Tenants.
  2. Click Registration next to the tenant to be configured. The Registration Attributes page is displayed.
  3. To add a registration attribute, click the red '+' sign at the top right corner of the Attributes table. The Add a new Attribute window opens. sysadmin 11
  4. Enter the name of the FID attribute. A list of relevant FID attributes populates as you type.
  5. Select a type from the pull-down menu. Options include constant, input, and expression.
  6. Enter a value in the field that populates when you selected the type. A constant is a static value applied to all self-registered users. An input is a value the user must enter during self-registration. An expression indicates how a value is computed for the self-registered user.
  7. Click OK. The Registration Attributes page displays your new registration attribute.
  8. Click Save.

Computation functions

The expressions for the computation of attribute values can use the following functions:

  • sub gets a substring of an input.
  • append concatenates two or more inputs.
  • lower gets the lower case of an input.
  • upper gets the upper case of an input.
  • trim removes the leading and trailing spaces of an input.
  • left gets the left part of an input.
  • right gets the right part of an input.

Computation script

Computation scripts are written in C# and must contain the function public string Compute(IDictionary<string, string> inputs). The variable inputs is a dictionary that contains the list of inputs provided by the end user.

public string Compute(IDictionary<string, string> inputs)
    return "Compute your Value";

Here are a few example you can use to compute your attributes.

public string Compute(IDictionary<string, string> inputs)
    // Extract a value from the dictionary with the key 'Firstname'
    return inputs["Firstname"];

public string Compute(IDictionary<string, string> inputs)
    // concatenate multiple values
    return inputs["Firstname"] + " " + inputs["Lastname"];

public string Compute(IDictionary<string, string> inputs)
    // use an extra variable
    string result = string.Concat(inputs["Firstname"], " ", inputs["Lastname"]);
    return result;


Themes determine the portal’s look-and-feel.

In the Web Gallery node of the Themes section, the CFS System Administrator can install the themes that they want to make available for tenants to use when designing their portals.

sysadmin 12

Installed themes are shown on the Available node. These themes are available for tenants to use for their portals. The Update all Themes button looks on the web gallery if there is any update for the templates installed.

sysadmin 13

The Upload node allows you to upload a .zip theme file. Those files are provided by Radiant Logic.

sysadmin 14


In the Applications section, the Web Gallery node contains all possible configuration templates. The Download all the templates button downloads and installs automatically all the templates available on the web gallery.

sysadmin 16

If an application is installed, it appears in the Available node and means that tenants are allowed to configure it for use in their portal. If support for an application should be removed, click Delete next to the application in the list shown in the Available node. The Update Templates button looks on the web gallery if there is any update for the templates installed.

sysadmin 15

The Upload node allows you to upload a .zip application file. Those files are provided by Radiant Logic. Note that if you remove an application template from the list, if a tenant administrator has already configured an application with it, the application is not removed from the tenant portal.

sysadmin 17

Tenant Administrator

CFS supports a multitenancy architecture allowing each configured tenant to manage their own groups, users, identity providers (authentication systems), applications and portal.

The CFS tenant administrator can configure the groups, users, identity providers and applications applicable for their portal.


In the Dashboard, Global View section, the tenant administrator sees a list of all applications configured for the portal and their status: enabled or disabled.

dashboard 1

The Certificates section, wil display a list of all certificates used throughout the configuration. From this screen, it is also possible to download the public key of each certificate. For details on certificates and how they are used by CFS, please see Certificates.

dashboard 2


General Settings

On the Authentication tab, you can define the lifespan of the cookie created when a user authenticates (default is 8 hours). You can also define the level of assurance associated with the tenant administration dashboard. The default assurance level is "Some" and can be changed from the "Level of Assurance" drop-down list. If a tenant administrator logs in with an authentication method that does not meet this level, they are denied access to the administration dashboard. If the Level of Assurance is changed and the currently logged in tenant administrator did not log in with an authentication method that meets this level, they are immediately disconnected from the administration dashboard. The "Auto Login" setting lets you define the behavior you want for the user when they reset their password. In the case they change the password in the CFS UI, allowing the auto login tells CFS to automatically authenticate the users. They are then be redirected to the CFS portal.

settings general 1

On the Self-Registration tab, you can define the policy for allowing new users to register themselves for portal access. If this behavior is desired, click the "Allow" option until a green checkmark is displayed in the User self-registration section. All self-registered users are stored in the identity store below the indicated "Users Target OU". If a tenant administrator wants to change the location of self-registered users, click Change Target OU. Locations defined in the Organization Units section of the dashboard are shown to select from. The location for the self-registered users must be a location below the global "People DN" defined for the tenant in the CFS System Admin Dashboard. This location/target OU in the identity store must allow insertions, otherwise creation of user accounts fails. The attributes required for self registration are defined for the tenant by the system administrator. Refer to the System Administration Guide for more information.

settings general 2

On the Challenge Questions tab, a tenant administrator can choose to activate challenge questions forcing a user to define answers to a given set of questions in order to be able to reset their password from the portal login screen. If this behavior is desired, click the "Activate" option until a green checkmark is displayed. Indicate the number of questions required for a user to answer for their account. This is the number of challenge questions that CFS is able to choose from when prompting the user for an answer during password resets. No matter how many number of questions are indicated here, the user must only answer one question correctly to go through the password reset process. However, CFS chooses which question to prompt the user with. The actual questions the user can choose from are defined on the Challenge Questions node in the Settings section.

settings general 3

On the Others tab, a tenant administrator can choose to disable the access to the "My Groups" page on the end user portal.

settings general 4

Messaging Service

CFS supports Twilio as a messaging service for delivering passcodes to users. If this is enabled, users is able to receive their passcode via text message or phone call. You must have your own Twilio account to configure CFS.

  • Click the "Enable Twilio" option until a green checkmark is displayed.
  • Enter the Account SID and Auth Token associated with your Twilio account.
  • Enter the phone number from which you want the text/phone call to come from.
  • Enter the text message you want to send users in the SMS Message Format property.
  • Enter the identity store attribute containing the phone number for the users.
  • Choose whether or not you want Twilio to be able to call users to give them the passcode.
  • Click Save when you are finished.

settings twillio

Challenge Questions

On the "Challenge Questions" node, you can define which questions a user must answer correctly in order to reset their password. Some default questions are listed and if you want to create more, click the "New Challenge Question" button. The number of questions a user must answer correctly is defined on the General Settings node. After this is defined, the user must log in to their portal account and go to the Security section. Locate the Challenge Questions and click Edit. Click New Question to provide answers to the desired challenge questions. This enables the user to be able to reset their forgotten password from the portal login screen. It is important to note that even if a user is required to answer a certain number of questions, they are only be prompted to answer one question properly in order to reset their password from the portal login screen. CFS decides which is the one question (from the total number of challenge questions configured) that the user must answer successfully. If a user has not defined answers for the required number of challenge questions, when they choose the "Forgot your Password?" link from the portal login screen, they are automatically emailed a new password value as opposed to being able to reset the password value themselves.

settings challenge questions


Certain activities trigger emails to be sent automatically. The email templates are configured from the "Emails" node.

settings emails

  • Base Template is the template that is used for all emails.
  • Account contains the email templates that are sent when an account is created or has been unlocked.
  • Access Requests contains the email templates that are sent when someone request access to an application and when the request has been granted or denied.
  • Password contains the email templates that are sent when a password has been reset.
  • Two-Step Verification contains the email templates that are sent for the two-step verification process.
  • Server contains the email templates that are sent when the CFS server trigger an important event.

Profile Attributes

Profile attributes are shown for portal users when they access their "My Profile".

settings attributes

From here you can change the attribute display name shown in the portal ("Name" column) and the corresponding attribute in the identity store ("Attribute" column). You can indicate if the attribute is public (allows users other than the owner to view it when using the search feature), read only (does not allow this attribute to be edited by the user), and define a data type (to assign a syntax for the displayed value). Data types available are string, photo, email and phone.

To add a new profile attribute, click Add Attribute. Enter the attribute name as it exists in the identity store schema and the display name you want shown in the portal. Indicate if the attribute is public and/or read only and click OK. Select a Data Type from the drop-down list (there is not one set by default).

settings new attribute

If you have this attribute skills in RadiantOne like on this picture.

settings new attribute fid

You should see the result on the profile page.

settings new attribute result

Login Page

The Customize section allows you to personalize the look and feel of the portal login screen.

  • Portal Logo - Use only PNG or JPG files, recommended size 425x270 pixels and 40 KB maximum.
  • Sign In Text - Optional Use if you need to give helpful information to your users before they sign in. You may include the contact information for your helpdesk.
  • Other IdPs description - Optional You can add a message to explain what are the external identity providers (like ADFS, OpenAM...)
  • Disclaimer - Optional You may want to add a disclaimer at the bottom of the page to inform the guests about your company policies...
  • CSS - The CSS tab allows you to completely customize the look of the login page to fit your company colors.

The Presentation section allows you to organize the position of the different identity providers you might want to use on your login page. Drag and drop the different section on the page and click Save.

Web Portal

In the Web Portal section, you can customize the presentation of the end user portal and the tenant administration.

  • Portal Title - Choose the title you want to see on the top of the portal.
  • Portal Logo - Choose the logo you want to see on the top of the portal.
  • CSS - The CSS tab allows you to completely customize the look of the portal by writing your own CSS.

In the Themes section, you can activate the theme you want to help you having a different portal experience very quickly.


In the Organization section, users, groups and organizational units can be managed.


From the "Users" section, you can search for users in your company, create new users, lock and unlock an account, reset a password and update the user profile.

Possible actions on an account: organization users actions

  • User Details - Open the profile of the user.
  • Edit user details - Edit the profile of the user.
  • Reset password - Reset the password for the account and send an email to the user with the new password.
  • Lock / Unlock account - Lock or unlock the user's account and send an email.
  • Set YubiKey - Set the user's YubiKey.

To create a new user, click "New User". Then, select the desired location/organization unit and provide the required attributes (e.g. email address, first name and last name...). These attributes are defined in the System Administration Guide. Then click Save to create the new account. An email is sent to the user with the password.


Groups are leveraged for access permissions. They define the administration permissions assigned to the configuration dashboard and can be used to assign access controls to applications. There are two default groups needed per tenant: Helpdesk and Tenant Administrators.

To add members to a group, click the "+" button next to the group you want to manage. Click Add Member. Enter the name of a user to search for in the top right and click Search. Check the desired members and click Add to the group.

organization groups add member

To remove a member from a group, click the red "trash" button next to the member you want to remove.

To create a new group, click "New Group". Provide the group name and description (optional). You can also provide the full DN of the owner of the group. Click Save to create the group.

organization groups new group

Organization Units

The portal user accounts are stored in the identity store. The organization units are the locations/containers where the actual accounts are stored. You can add new organization units from the Organization Units section. Select the parent of the new OU and enter a value for the "Name" property and click Save.

organization ou


A tenant administrator configures the authentication methods they want to support for their portal in the Authentication section. There are five types of authentication systems available and one or more can be activated. For more details on how to configure each identity provider, please refer the Identity Providers section.



For more details on each application, please refer to the Applications guide. You can use the "Gallery" to choose what application you want to configure using a template. If your system administrator has provided you with an application packages (.zip file), you can click Upload the custom package from Radiant Logic and select the file you have.

apps upload

This guide explains the different feature of the application configuration pages. Anything specific to an application is described in the Applications section.

Group Sets

Group sets are a way to categorize different applications in your portal. The value of the group set property you define for the application indicates which "tab" the application icon appears on in the portal.

For example, the default tab in the portal is titled: Applications. This is where all configured/available applications appear in the portal. If you wanted to categorize some of the applications to appear on a different tab, you can enter a name in the group set property for those applications and a new tab displays in the portal accordingly.

Access Rules

By default, an application has no restriction on the group the user is member of. You can specify the list of group of users who have access to your application by unchecking the option Allow All Users, clicking the red "+" button, and selecting a group. These groups allow member having access to the application (unless further security layer like LOA or COT or Filter blocks the access).

Also, when creating a new application, CFS automatically creates a group associated and all Access Requests go in this group. Click the Application Group link to manage this group.

apps access rules


A user can be authorized to access an application based on certain attributes in their profile which are stored in the identity store, come from the pass-through rules in each identity provider or the Circle of Trust rules. This criteria is defined on the Filter tab. Define a filter that dictates which criteria are required for a user to be qualified to access this application. Any user whose profile attributes do not match the indicated criteria is not authorized to access the application. In the example shown below, only users that have an "l" attribute with a value of "novato" and the attribte "Building" (CoT rules) with the value "buildinga" are authorized by CFS to access this application.

apps filter


CFS generates a certificate for each new tenant. This certificate is used by default for each application of the tenant. It means, all the applications of the same tenant use the same certificate (unless changed using the following guide). To change the certificate used by application, open the "Certificate" tab in the application configuration and check the option "Use a dedicated certificate".

apps certificate

You now have two options.

  • Upload a certificate private and public key - If you upload a "full" certificate, you must provide the password that is used to sign the tokens. This option stores the certificate (private and public keys) in the FID.
  • Upload a certificate public key - This option stores only the public key of the certificate in the FID. This is the most secure option because, in order to sign the tokens, each CFS machine looks into the Windows Certificate Vault of the computer in order to get the certificate private key.

The "Gallery" section contains all the application templates made available by the system administrator.

apps gallery

Click Configure next to a template to create an application using this template.

Circle of Trust

For an introduction to Circle of Trust, see the Concepts section of this guide.

Based on the location of the user, CFS adds a new claim to the user session that can be used to restrict access to sensitive applications.

apps cot

The "Attribute Name" is the name of the claim that is stored in the session. You can use this name as an "attribute" when creating a filter for an application.

To create a new CoT rule, click Add a new rule.

  • Enter a name for this rule.
  • Enter a set of IP addresses, IP Ranges or DNS.
  • Enter the value that is used to create the new claim in the user session.
  • Click OK to create the rule.
  • Click Save to save your configuration.

apps cot new

OpenID Connect

To learn about OpenID Connect, please visit CFS can be an identity provider using the protocols OAuth 2 and OpenID Connect.

To create a new OpenID Connect application, click New OpenID Connect Application. Then provide all the information regarding your application.

apps openid new

At the bottom of the page, get the application key and application secret and use them inside your application to authenticate against CFS.

apps openid

To specify the attribute you want to send to the application when they are requesting user's OAuth tokens, click Mappings and, for each scope, enter the name of the FID attribute you want to use for the specific attribute.

apps openid mappings


A helpdesk user is defined as someone who may perform one or more of the following activities:

Portal User


A user that does not have an account in the identity store can self-register at the portal login screen (if this function is enabled by the tenant administrator).

On the login page, click Register today.

portal user 1

The next page is the registration form. You can use one of the social network to automatically link your CFS account and to pre-populate the available fields. This feature has to be enabled by the tenant administrator.

portal user 2

Enter the required information on the form. If required, select your challenge questions and type the answers. You will then receive an email containing your new password to the email address you have provided.


Applications Portal

To access the applications portal, the user must be logged in. Only applications the user is authorized by CFS to access are displayed. Click the icon corresponding to the application you want to access. The user is automatically logged into the application.

  • If you think you should have access to an application that is not shown, contact your tenant administrator.
  • The applications under the title Application not available at your current level of assurance are not available until you log in with a more secure authentication system.

portal user 3

Request Application Access

During RP-initiated SSO (when a user navigates directly to an application as opposed to going first to the CFS portal page), if the user does not have access to the application (CFS as the enforcer), they are prompted at this time if they want to request access.

portal user 4

Click Yes and an email is sent to the application owner to request access to this application. When the owner grants you the access you receive a confirmation email, and then you can access this application (as long as you comply the other security levels).

portal user 5

Grant Application Access

As the owner of an application, when a user request access to it, you receive an email asking you to confirm (or deny) the request. On your web portal, navigate to Access Requests section in the left menu and choose the application you have requests pending.

portal user 6

Then, click Accept or Deny.

portal user 7

A confirmation email is sent to the user requesting the access to confirm your decision.

User Settings

Password Reset

Changing Your Password

Log into your CFS account and navigate to the Settings page and select Password - Change your password.

portal user 8

Provide your previous password and the new one twice.

portal user 9

Press Save to validate the new password.

Resetting a Forgotten Password

On the login screen, click the Forgot your password? link.

portal user 10

Enter your username and click Search.

portal user 11

If you have defined challenge questions in your account, you are prompted for one answer.

portal user 12

If you do not have challenge question in your CFS account, you are asked to confirm that CFS will reset your password.

portal user 13

If you answer the challenge question correctly, you are able to change your password.

portal user 14

When your password is changed, you get a confirmation message.

portal user 15

Challenge Questions

Log in on your CFS account and navigate to the Settings page and select Challenge Questions - Edit.

portal user 16

Click Add a new question. Select your Challenge Question and enter an answer.

portal user 17

You challenge question should appear on the screen.

portal user 18

If the tenant administrator has allowed users to login with their social network accounts, the users may link their portal login with their social network accounts.

Log in on your CFS account and navigate to the Settings page and select Social Networks - Links.

portal user 8

In the list of social networks made available by the tenant administrator, select the one you want to link.

portal user 20

If you select for example Facebook, you should be redirected to and are prompted for your credentials.

portal user 21

Then you have to accept that CFS will be able to get some information about your profile and your email address.

portal user 22

Once it's done, you are redirected to CFS and you can see if you account has been properly linked.

portal user 23

To try if the social network login works, log out from CFS. On the login page, click the social network you linked to your account.

portal user 1

You should be redirected to the social network. Then enter your credentials and you are redirected back to CFS and logged in into CFS.

User Sessions

Each user can check the session that are currently still opened on their CFS account. This can help to detect fraudulent sessions.

Log in on your CFS account and navigate to the Settings page and select My Sessions - Edit.

portal user 8

On this page you can see all the session you have opened with different computers/mobile devices and the web browser used.

portal user 26

  • Click the End Activity link to terminate a specific session.
  • Click the End All Activity link to terminate all the sessions except the current one.

Enable Two-Step Verification

Two-step verification is a method to provide an additional level of security to form-based (login/password) authentication. If this functionality is enabled by the tenant administrator, a user may retrieve the needed passcode via email, text message/phone call (if the tenant administrator has configured Twilio ), or by using an authenticator application on their smartphone (if allowed by the tenant administrator).

In order to use an authenticator application on your cell phone, you must synchronize your CFS account with your Authenticator application.

Install the Authenticator application on your smartphone

Android devices

Requirements: To use Google Authenticator on your Android device, it must be running Android version 2.1 or later.

Downloading the app:

  1. Visit Google Play.
  2. Search for Google Authenticator or click this link.
  3. Download and install the application.
iPhone, iPod Touch, or iPad

Requirements: To use Google Authenticator on your iPhone, iPod Touch, or iPad, you must have iOS 5.0 or later. In addition, in order to set up the app on your iPhone using a QR code, you must have a 3G model or later.

Downloading the app:

  1. Visit the App Store.
  2. Search for Google Authenticator or click this link.
  3. Download and install the application.
Windows Mobile devices

Requirements: To use Authenticator on your Windows Mobile, you must have Windows Phone > 8.0 or Windows Mobile > 10.

Downloading the app:

  1. Visit the Windows Store.
  2. Search for Authenticator or click this link.
  3. Download and install the application.
BlackBerry devices

Requirements: To use Google Authenticator on your BlackBerry device, you must have OS 4.5-7.0. In addition, make sure your BlackBerry device is configured for US English -- you might not be able to download Google Authenticator if your device is operating in another language.

Downloading the app: You'll need Internet access on your BlackBerry to download Google Authenticator.

  1. Open the web browser on your BlackBerry.
  2. Visit
  3. Download and install the application.

Activate Two-Step

Log into your CFS Account and navigate to the Settings page and select 2-step Verification - Activate.

portal user 8

With the application Authenticator on your smartphone, scan the displayed QR-Code.

portal user 28

  • The application should display a six digit code. Enter this code in the Generated Code textbox.
  • Validate the screen, click Save.

If you want to disable the Two-Step, go back to the Settings page and click 2-step Verification - Remove. Click Edit if you want to re-synchronize your phone.

Once this is setup, when you log into the portal with your login/password, you are prompted to enter the current passcode which you can get by launching the authenticator application on your cell phone. A new passcode is generated every 30 seconds. If you do not have access to your phone, you can choose to email a passcode to you instead. You have 30 minutes to get the passcode from your email and use it to log in with. If your tenant administrator has configured the Twilio messaging service, you can have the passcode texted or phoned to you.

Edit User Profile

Log in to your CFS account and click the My Profile section.

portal user 29

Click Edit link to modify your profile information.

To add/modify your profile picture, click Choose button next to Change Photo.

portal user 30

Browse to the photo to upload and click Open. Then, click Save. The next page shows your profile with the new information.

portal user 31

Searching for Users

From any page of the portal, there is a search box in the upper right corner. You can search for other users that are associated with the same tenant as yourself.

portal user 32

The search result returns the attributes configured by the tenant administrator. In this example, the user’s email, telephone number and photo are returned.

portal user 33