Sie sind hier:
In order to use the MFA gateway, we need to activate the users or servers. Please send a request to email@example.com with the following details of all users.
– Phone number (no extension)
– Server to be accessed
As soon as everything is prepared on our side, we will let you know and you can start with the initial setup of the users.
Tip: It is best to install Microsoft Authenticator from the app store on your phone right now.
Before the MFA login works, the second factor must be activated.
Each user must register for this at https://mfa.timewarp.at. When registering, the phone number provided will be called and you will be prompted to press the # key.
After logging in, you will be given the option to activate the Microsoft Authenticator app via QR code (we recommend this method). Furthermore, five security questions have to be answered.
After that, the user is set up.
For the remote desktop connection to work properly, the RDP gateway must be adjusted in the connection settings.
With a right click on the connection -> Edit.
Click on “Settings…” under “Advanced.
In the new window apply the settings set above and confirm with “OK”.
Return to the “General” tab and “Save”.
Open the settings in the “Microsoft Remote Desktop” app.
In the Gateways tab, add a new one with the following settings.
When connecting, select the newly created gateway under “Gateway”.
If you connect now, you will be asked on the phone to confirm the second factor and only then the connection will be established.
To prevent login without MFA, the connections are blocked on the firewall with the normal RDP gateway.
When all users are set up, please firstname.lastname@example.org prompt to implement the appropriate changes on the firewall.
Under https://mfa.timewarp.at you can find a self-service portal. Here settings such as authentication method, phone number, etc. can be customized.
New users must be activated by TIMEWARP support.
New servers can be integrated with AD-Management the group dlg.NNNN*.rdpgws.computers by yourself or by an email to email@example.com.
S3 Synology: Access and Restore of Backups
Synology S3 Backup Configuration
Embed S3 Object Storage in Nextcloud
The Key Factors of Cloud End-to-End Encryption
What is End-to-End Encryption in the Cloud?
Would you like to be informed about news right away? Then register here for the newsletter: