Starting with version 10.6.15, we’re adding 2-Step Verification (2FA) for the WebAdmin interface — an extra layer of protection for your mail server administration. This update is designed to keep access secure without getting in the way, whether you’re managing a single environment or running a clustered setup with delegated administrators.

Before You Upgrade
Axigen 10.6.15 includes internal updates to the way we store security-related admin data. If you plan to test the feature and may need to roll back to an earlier version, make sure to back up the serverData folder from your Axigen working directory before upgrading.
What’s Protected
2-Step Verification applies to:
- All WebAdmin accounts, including the built-in admin and any additional administrator users
- Interactive sessions, where protection against phishing or brute-force attacks matters most
After enabling 2-Step Verification, each admin will be asked for a verification code from a second source during login.
What’s Not Affected
No changes are made to the following:
- API endpoints such as /metrics and /data/accounts, which continue using basic authentication
- The CLI interface, where we recommend restricting access (e.g., via VPN)
For additional protection, we recommend placing API endpoints and WebAdmin behind a reverse proxy — especially if you want to implement IP filtering, access restrictions, or throttling.
How It Works
2-Step Verification is enabled by default, but not mandatory. As an administrator, you can:
- Set which 2-Step Verification methods are available
- Make 2-Step Verification required across all admin accounts
- View, revoke, or reset configured methods per user
You can manage 2-Step Verification settings either in the WebAdmin or via CLI.
Supported Verification Methods
You can choose from three types of second factors:
Authenticator App
- Uses standard TOTP (Time-based One-Time Password)
- Compatible with Google Authenticator, Microsoft Authenticator, and YubiKey (via the Yubico Authenticator app)
- Works offline after setup
- YubiKey support is based on its ability to generate TOTP codes (not FIDO / WebAuthn)
- Sends a one-time code to the admin’s configured email address
- Requires no extra setup
- Great fallback or option for less technical users
SMS
- Sends codes via text message
- Requires an SMS connector (e.g., Twilio)
- A good choice for mobile-first environments
Managing 2-Step Verification from the CLI
If you prefer scripting or automation, the CLI gives you full control:
- Enable / disable 2-Step Verification
- Set allowed methods
- Customize message templates
- List or revoke active methods for specific users
Cluster Deployments
In a clustered setup, 2-Step Verification settings and admin accounts are not automatically synced across nodes.
You’ll need to:
- Configure each admin account separately on the relevant nodes
- Set up 2-Step Verification for each account on each node it accesses
To keep things simple, we recommend using email or SMS as verification methods in clustered environments — these are not tied to a specific device or instance.
Admin Account Strategy
We support two common use cases when it comes to administrator roles:
Domain-Specific Admins
- Limited to managing one or more specific domains
- No server-level permissions
- Should be configured only on the Backend node(s) that host their domains
- Ideal for delegated admin access by individual customers or teams
Platform / Service Admins
- Responsible for server-wide and / or domain-level services
- Should be configured on all nodes where access is required (frontend and backend)
- Typically manage SMTP, IMAP, or WebMail at the service level
Example Setup: Multi-Tenant Cluster
Here’s a simplified example:
Nodes:
- Frontend-SMTP → frontend for SMTP
- Frontend-Proxy → frontend for IMAP / WebMail
- Backend-1 to Backend-4 → backend servers
Domain Placement:
- domain1.tld → hosted on Backend-1
- domain2.tld → hosted on Backend-2
- large-domain.tld → distributed across Backend-3 and Backend-4
Admin Accounts:
Admin User |
Configured On |
Purpose |
---|---|---|
admin-domain1-tld |
Backend-1 |
Manages domain1.tld |
admin-domain2-tld |
Backend-2 |
Manages domain2.tld |
admin-large-domain-tld |
Backend-3, Backend-4 |
Manages large-domain.tld |
admin-all-domains |
Backend-1, Backend-2, Backend-3, Backend-4 |
Cross-domain management |
admin-imap |
Frontend-Proxy, all Backend nodes |
IMAP service management |
admin-smtp |
Frontend-SMTP, all Backend nodes |
SMTP service management |
This approach keeps access clear and aligned with actual responsibilities — improving security and simplifying management.
Get Started
2-Step Verification is available now in Axigen 10.6.15. If you’re already using delegated admin accounts or just want to tighten access, this is the right time to turn it on.
With flexible options and per-account configuration, 2-Step Verification gives you better control — while keeping your admins efficient and productive.