Skip to content

On-Premises MFA Server Architecture Overview

Mideye’s on-premises multi-factor authentication (MFA) system consists of four main components that work together:

  • Mideye Server — runs on your infrastructure, handles all authentication logic
  • Mideye Switch — Mideye-operated service that routes SMS and token requests
  • Mideye Cloud — cloud services for Magic Link, push delivery, and threat intelligence
  • Mideye+ app — authenticator app on the user’s phone

This page explains what each component does, how they connect, and what network access you need. For step-by-step authentication sequences, see Authentication Flows. For data location and compliance, see Data Residency.


YOUR INFRASTRUCTUREMIDEYE SWITCH (dual redundancy)EXTERNAL SERVICESMIDEYE CLOUDUSER'S PHONEVPN / App(RADIUS client)Web App(Magic Link API)LDAP / ADEntra IDLocal DBMideye ServerRADIUS Listener · Web Admin GUIMagic Link API · Self-Service PortalUser Repository AdaptersPrimary Switchprimary.mideye.com(Swedish DC 1)Secondary Switchsecondary.mideye.com(Swedish DC 2)SMS / SMSCTelecom ProvidersYubicloudHID & othertoken serversServer talks toSwitch + App talk toSMS / RCS(OTP text messages)Mideye+ App(push + TOTP)MASMagic Link +SessionsMideye ShieldThreat IntelPush ServiceAPNs / FCMPlus Activation& Deactivation RADIUSAccept / RejectREST APILDAP/LDAPSGraph APITLS 1.3 TLS 1.3 (failover)HTTPSHTTPSHTTPSHTTPSHTTPSHTTPS

The central authentication engine. It runs entirely on your infrastructure and handles all authentication logic, user management, and policy enforcement.

FunctionDescription
RADIUS listenerAccepts Access-Request packets from VPNs, firewalls, and network equipment. Supports PAP and MSCHAPv2.
Magic Link APIREST endpoint for web applications that need MFA without RADIUS.
User lookupResolves users from LDAP/AD, Microsoft Entra ID, or the local Mideye database.
OTP generationGenerates one-time passwords and coordinates delivery via Mideye Switch.
Token validationValidates OTPs from SMS, push, hardware tokens, and on-premise TOTP.
Self-Service PortalWeb portal where users register TOTP apps and manage hardware tokens.
Web Admin GUIHTTPS management interface for RADIUS clients, LDAP profiles, policies, and logs.
Audit loggingRecords every authentication attempt for compliance and troubleshooting.

A message routing and delivery service operated by Mideye. The Switch handles SMS delivery, token validation, and routes push/authentication requests through the cloud services in AKS.

FunctionDescription
SMS deliveryRoutes OTP messages to telecom providers (SMPP, CIMD2, EMI/UCP).
Push / Touch routingRoutes push notifications and authentication requests to the Plus services in the cloud.
Token validationValidates hardware tokens via Yubicloud (YubiKey) and HID token servers.
Magic Link SMSSends the Magic Link SMS (the link itself points to MAS, not the Switch).
Plus activation SMSSends encrypted activation SMS for Mideye+ app registration.

What the Switch does NOT do:

  • Does not store user credentials, passwords, or authentication policies
  • Does not make authentication decisions — that is always the Mideye Server
  • Only routes messages and manages delivery

Mideye operates two completely independent Switch environments in separate Swedish data centers:

EnvironmentHostnameData center
Primaryprimary.mideye.comSwedish DC 1
Secondarysecondary.mideye.comSwedish DC 2

The two environments are fully standalone — separate infrastructure, separate databases, separate network paths.

How failover works:

  1. New customers connect to the Secondary Switch first to verify the backup path.
  2. After verification, the Primary Switch is enabled.
  3. In production, the Server connects to Primary by default. If Primary is unreachable, traffic automatically routes to Secondary.
  4. After a configurable duration (default: 10 minutes), the Server retries Primary.
  5. All communication uses TLS 1.3 — the Server initiates all connections (outbound only).
  6. If both switches are unreachable, on-premise TOTP tokens still work. MAS and Shield remain available as they don’t depend on the Switch.

Several services run in Europe-based cloud infrastructure, separate from the Switch:

ServiceAccessed byPurpose
MAS (Mideye Application Service)ServerMagic Link approval pages, RADIUS session management
Mideye ShieldServerThreat intelligence — IP reputation and brute-force detection
Push ServiceSwitch + AppPush notifications via Apple APNs and Google FCM
Plus ActivationSwitch + AppActivation and deactivation of Mideye+ app instances

The authenticator app for iOS and Android. It replaces SMS-based OTPs with push notifications and offline TOTP codes.

FeatureDescription
Push authentication (Touch)One-tap approve/reject for login requests.
TOTP codesTime-based codes generated locally. Work offline.
Biometric unlockFace ID, Touch ID, or fingerprint to protect the app.
Assisted LoginApprovers receive push notifications to approve logins for other users.

The app communicates with the Plus services in Mideye Cloud. User credentials never leave the Mideye Server — the app only receives challenges and sends approve/reject responses.


Mideye Server 6 is built as a Java application using Spring Boot for the backend and React JS for the frontend.

The latest release (version 6.6+) runs on Adoptium Temurin OpenJDK 25 JRE, which is bundled with the installation package — no separate Java installation is required. Earlier versions (6.5 and below) used Java Runtime Environment 17.

The server runs as a background service, handling RADIUS requests on one or multiple ports. Configuration and administration are performed through the Web Admin GUI, with changes saved in real-time — no server restarts required.


All communication uses TLS 1.3. The Server initiates all connections — the Switch never connects inbound to your network.

MessagePurpose
OTPSend an SMS OTP to a phone number
PLUSSend a Mideye+ cryptographic challenge
TOUCHRequest a Touch push notification
MAGIC_LINKSend a Magic Link SMS
TOKEN_COUPLE_PLUSCouple a hardware token to a Mideye+ registration
PLUS_CLIENT_INFOCheck if a phone has Mideye+ activated
PINGHealth check
ServiceProtocolPurpose
MASHTTPS long-pollingMagic Link sessions, RADIUS session events
Mideye ShieldHTTPS REST APIIP reputation and threat data
ServiceProtocolPurpose
Push ServiceHTTPSRoute push notifications to APNs/FCM
Plus Verification ServiceHTTPSOTP encryption, activation/deactivation, token coupling

Your Mideye Server needs outbound access to:

DestinationPortProtocolPurpose
primary.mideye.comCustomer-specific TCP portHTTPS (TLS 1.3)Switch — SMS, token validation
secondary.mideye.comCustomer-specific TCP portHTTPS (TLS 1.3)Switch failover
mas.mideyecloud.se / mas.prod.mideye.comtcp/443HTTPSMAS — Magic Link, RADIUS Sessions
shield.mideye.comtcp/443HTTPSMideye Shield — threat intelligence

No inbound firewall rules are required. The customer-specific Switch port is assigned by Mideye Support during provisioning.

For a complete list of ports (RADIUS, database, LDAP, admin GUI), see Networking Requirements.


For environments with no internet access, Mideye Server can operate without any connection to Mideye Switch or cloud services:

  • Authentication is limited to on-premise TOTP tokens only
  • Users register TOTP tokens via the Self-Service Portal or admin assignment
  • SMS, push, and Magic Link are not available

Air-gapped mode is configured during the Configuration Wizard.