Configure TOTP Tokens for Mideye On-Premise
Mideye Server 6 supports on-premise TOTP tokens as a second authentication factor. A user in the database or LDAP can have an on-premise token connected to their account. The token generates a TOTP code that serves as the second factor.
Available in two versions:
- Software token — authenticator TOTP app on the user’s phone (e.g., Mideye+)
- Hardware token — a physical TOTP device
Authentication type support:
| Auth type | Role of TOTP |
|---|---|
| 11 (On-prem) | Primary second factor |
| 7 (Touch-Plus) | Fallback when out of coverage |
| 8 (Touch-Mobile) | Fallback when out of coverage |
Self-Service Portal
Section titled “Self-Service Portal”The Web Admin and Self-Service Portal share the same login page and RADIUS client. The user’s role determines which interface they access — administrators see the Web Admin, regular users see the Self-Service Portal.
For LDAP users, the role is determined by RADIUS Translation rules based on LDAP group membership. Users without a RADIUS Translation value are treated as regular users and access the Self-Service Portal.
Enable the Self-Service Portal
Section titled “Enable the Self-Service Portal”Edit application-prod.yml:
- Linux:
/opt/mideyeserver6/config/application-prod.yml - Windows:
C:\Program Files (x86)\Mideye Server 6\config\application-prod.yml
Add use-self-service-portal: true:
application: switch-host: primary.mideye.com switch-backup-host: secondary.mideye.com switch-port: xxxxx log-path: C:\Program Files (x86)\Mideye Server 6\log use-self-service-portal: trueRestart the Mideye Server service.
Separate Self-Service Portal port
Section titled “Separate Self-Service Portal port”To run the Self-Service Portal on a different port:
application: self-service-proxy: enabled: true http-port: xxxx ssl-port: xxxTo use the default self-signed certificate:
application: self-service-proxy: enabled: true http-port: xxxx ssl-port: xxx bypass-ssl-validation: trueRestart the service after changes.
Software tokens (authenticator apps)
Section titled “Software tokens (authenticator apps)”The TOTP seed can be distributed via the Web Admin (by an administrator) or via the Self-Service Portal (by the end user).
Administrator workflow
Section titled “Administrator workflow”Register an authenticator app
Section titled “Register an authenticator app”- Log in to the Web Admin portal.
- Go to Users and Tokens → Mideye Users.
- Edit the user → Tokens tab.
- Choose Register authenticator.
- Have the user scan the QR code with the Mideye+ app:
- Open Mideye+ → menu (top right) → Authenticator → tap + to scan.
- Enter the TOTP from the app into the verification box.
- Click Register while the TOTP is still valid. If it expired, re-enter the new code.
Verify a user’s authenticator
Section titled “Verify a user’s authenticator”- Edit the user → Tokens tab.
- Choose Verify OTP.
- Enter the OTP from the user’s authenticator app.
Unregister an authenticator
Section titled “Unregister an authenticator”- Edit the user → Tokens tab.
- Click Unregister authenticator → Unregister.
User self-service workflow
Section titled “User self-service workflow”Register
Section titled “Register”- Log in to the Self-Service Portal.
- Select Register Authenticator.
- Scan the QR code with the Mideye+ app.
- Enter the TOTP and click Register.
Verify
Section titled “Verify”- Log in to the Self-Service Portal.
- Choose Verify OTP and enter the code from the app.
Unregister
Section titled “Unregister”- Log in to the Self-Service Portal.
- Click Unregister Authenticator → Unregister.
Hardware tokens (TOTP)
Section titled “Hardware tokens (TOTP)”TOTP hardware tokens are delivered with a PSKC file containing the token credentials and a transport key. Both must be uploaded to the Mideye Server before tokens can be assigned to users.
Import PSKC file
Section titled “Import PSKC file”- Log in to the Web Admin as an administrator.
- Go to Users and Tokens → Hardware Tokens.
- Actions → Import hardware tokens from a PSKC file.
- Upload the PSKC file and enter the transport secret.
- Click Import. The tokens appear in the Hardware Tokens list.
Administrator workflow
Section titled “Administrator workflow”Assign a token
Section titled “Assign a token”- Go to Users and Tokens → Mideye Users.
- Edit the user → Tokens tab.
- Choose Assign token to user.
- Select the serial number from the dropdown. Verify it matches the physical token.
- Click Assign.
Verify a token
Section titled “Verify a token”- Edit the user → Tokens tab.
- Token Operations → Verify OTP.
- Enter the OTP from the hardware token.
Unassign a token
Section titled “Unassign a token”- Edit the user → Tokens tab.
- Token Operations → Unassign token from user → Unassign.
Revoke a token
Section titled “Revoke a token”- Edit the user → Tokens tab.
- Token Operations → Change Token State.
- Select the reason and Save Changes.
Reactivate a revoked token
Section titled “Reactivate a revoked token”- Edit the user → Tokens tab.
- Token Operations → Change Token State.
- Select Valid → Save Changes.
User self-service workflow
Section titled “User self-service workflow”- Log in to the Self-Service Portal.
- Select Assign Token To User.
- Enter the serial number from the back of the token.
- Press the token button to generate an OTP.
- Click Assign.
Configure LDAP repository TOTP seeds
Section titled “Configure LDAP repository TOTP seeds”To store TOTP seeds in an LDAP attribute (instead of the Mideye database), the LDAP bind account needs read/write permissions on the chosen attribute. The attribute must support 120+ characters and Unicode.
Add permissions to the LDAP bind account
Section titled “Add permissions to the LDAP bind account”- Open Server Manager → Tools → Active Directory Users and Computers.
- Right-click the Domain → Properties → Security → Advanced.
- Click Add → Select Principal → select the LDAP bind account.
- Set Applies to:
Descendant msDS-CloudExtensions objects. - Click Clear All, then enable:
- Read msDS-cloudExtensionAttribute1
- Write msDS-cloudExtensionAttribute1
- Click OK → Apply → OK.
Verify in Mideye Server
Section titled “Verify in Mideye Server”- Open the Mideye Dashboard → Directory Settings → LDAP Profiles.
- Edit the profile → User Attribute tab.
- In the TOTP Secret Cipher Attribute field, enter
msDS-cloudExtensionAttribute1. - Click Verify, enter a username, and click Verify.
A message “Successfully verified LDAP attribute” confirms the setup.
Related links
Section titled “Related links”- Authentication Types — All authentication types including Type 11 (On-prem)
- HID Token Setup — HID Mini Token card provisioning
- YubiKey Administration — YubiKey provisioning guide
- Hardware Tokens — GUI reference for hardware token management
- Application Configuration — Full
application-prod.ymlreference