Skip to content

Configure TOTP Tokens for Mideye On-Premise

Mideye Server 6 supports on-premise TOTP tokens as a second authentication factor. A user in the database or LDAP can have an on-premise token connected to their account. The token generates a TOTP code that serves as the second factor.

Available in two versions:

  • Software token — authenticator TOTP app on the user’s phone (e.g., Mideye+)
  • Hardware token — a physical TOTP device

Authentication type support:

Auth typeRole of TOTP
11 (On-prem)Primary second factor
7 (Touch-Plus)Fallback when out of coverage
8 (Touch-Mobile)Fallback when out of coverage

The Web Admin and Self-Service Portal share the same login page and RADIUS client. The user’s role determines which interface they access — administrators see the Web Admin, regular users see the Self-Service Portal.

For LDAP users, the role is determined by RADIUS Translation rules based on LDAP group membership. Users without a RADIUS Translation value are treated as regular users and access the Self-Service Portal.

Edit application-prod.yml:

  • Linux: /opt/mideyeserver6/config/application-prod.yml
  • Windows: C:\Program Files (x86)\Mideye Server 6\config\application-prod.yml

Add use-self-service-portal: true:

application:
switch-host: primary.mideye.com
switch-backup-host: secondary.mideye.com
switch-port: xxxxx
log-path: C:\Program Files (x86)\Mideye Server 6\log
use-self-service-portal: true

Restart the Mideye Server service.

To run the Self-Service Portal on a different port:

application:
self-service-proxy:
enabled: true
http-port: xxxx
ssl-port: xxx

To use the default self-signed certificate:

application:
self-service-proxy:
enabled: true
http-port: xxxx
ssl-port: xxx
bypass-ssl-validation: true

Restart the service after changes.


The TOTP seed can be distributed via the Web Admin (by an administrator) or via the Self-Service Portal (by the end user).

  1. Log in to the Web Admin portal.
  2. Go to Users and TokensMideye Users.
  3. Edit the user → Tokens tab.
  4. Choose Register authenticator.
  5. Have the user scan the QR code with the Mideye+ app:
    • Open Mideye+ → menu (top right) → Authenticator → tap + to scan.
  6. Enter the TOTP from the app into the verification box.
  7. Click Register while the TOTP is still valid. If it expired, re-enter the new code.
  1. Edit the user → Tokens tab.
  2. Choose Verify OTP.
  3. Enter the OTP from the user’s authenticator app.
  1. Edit the user → Tokens tab.
  2. Click Unregister authenticatorUnregister.
  1. Log in to the Self-Service Portal.
  2. Select Register Authenticator.
  3. Scan the QR code with the Mideye+ app.
  4. Enter the TOTP and click Register.
  1. Log in to the Self-Service Portal.
  2. Choose Verify OTP and enter the code from the app.
  1. Log in to the Self-Service Portal.
  2. Click Unregister AuthenticatorUnregister.

TOTP hardware tokens are delivered with a PSKC file containing the token credentials and a transport key. Both must be uploaded to the Mideye Server before tokens can be assigned to users.

  1. Log in to the Web Admin as an administrator.
  2. Go to Users and TokensHardware Tokens.
  3. ActionsImport hardware tokens from a PSKC file.
  4. Upload the PSKC file and enter the transport secret.
  5. Click Import. The tokens appear in the Hardware Tokens list.
  1. Go to Users and TokensMideye Users.
  2. Edit the user → Tokens tab.
  3. Choose Assign token to user.
  4. Select the serial number from the dropdown. Verify it matches the physical token.
  5. Click Assign.
  1. Edit the user → Tokens tab.
  2. Token OperationsVerify OTP.
  3. Enter the OTP from the hardware token.
  1. Edit the user → Tokens tab.
  2. Token OperationsUnassign token from userUnassign.
  1. Edit the user → Tokens tab.
  2. Token OperationsChange Token State.
  3. Select the reason and Save Changes.
  1. Edit the user → Tokens tab.
  2. Token OperationsChange Token State.
  3. Select ValidSave Changes.
  1. Log in to the Self-Service Portal.
  2. Select Assign Token To User.
  3. Enter the serial number from the back of the token.
  4. Press the token button to generate an OTP.
  5. Click Assign.

To store TOTP seeds in an LDAP attribute (instead of the Mideye database), the LDAP bind account needs read/write permissions on the chosen attribute. The attribute must support 120+ characters and Unicode.

  1. Open Server ManagerToolsActive Directory Users and Computers.
  2. Right-click the DomainPropertiesSecurityAdvanced.
  3. Click AddSelect Principal → select the LDAP bind account.
  4. Set Applies to: Descendant msDS-CloudExtensions objects.
  5. Click Clear All, then enable:
    • Read msDS-cloudExtensionAttribute1
    • Write msDS-cloudExtensionAttribute1
  6. Click OKApplyOK.
  1. Open the Mideye Dashboard → Directory SettingsLDAP Profiles.
  2. Edit the profile → User Attribute tab.
  3. In the TOTP Secret Cipher Attribute field, enter msDS-cloudExtensionAttribute1.
  4. Click Verify, enter a username, and click Verify.

A message “Successfully verified LDAP attribute” confirms the setup.