Skip to content

Mideye+ App and Touch Accept Configuration

Mideye+ is a free smartphone app that enables push-based OTP delivery and Touch Accept authentication. Users receive one-time passwords via data push instead of SMS, and can approve logins with a single tap.

Key benefits:

  • Works without mobile network coverage (WiFi only)
  • Touch Accept for one-tap authentication
  • Offline manual signature when no connectivity
  • No additional cost

Users with smartphones can choose to download the Mideye+ app. This enables login also when the phone is not reachable via the mobile network. There is no extra charge using the Mideye+ app and does not need to be used by the entire organization.

Mideye+ can be downloaded for both Android and iPhone by searching in Apple/Google store or following below links.

Once downloaded and installed, open the Mideye+ app. First time opening the Mideye+ app, the message “Mideye+ Would Like to Send You Notification” pops up. Click “Allow” to allow the app to send notifications each time an authentication attempt is made.

Activate iPhone App: === “1. Enter Phone number”

- Enter the phone number in international format e.g +46735084555 and press “Next”.

Mideye+ iPhone app phone number entry screen with international format input field

=== “2. Authenticate to corporate resource”

- Make an authentication attempt to the corporate resource (e.g Anyconnect, Citrix-portal etc) that is protected with Mideye.

Mideye+ iPhone app waiting for authentication attempt screen during activation

=== “3. Activation SMS”

- Once the SMS is received, open the message and click the link. A redirect to the Mideye+ app will take place with the text “Activation successful” and an OTP is displayed. This can be used to login to the corporate resource during an app activation.

Mideye+ iPhone app activation successful screen showing generated OTP code

Mideye+ is now activated

Activate Android App:

“1. Agree to terms”

  • Open the Mideye+ app and agree to the terms.

Mideye+ Android app terms and conditions acceptance screen

“2. Enter Phone number”

  • Enter the phone number in international format e.g +46735084555 and press “Next”.

Mideye+ Android app phone number entry screen with international format input

“3. Authenticate to corporate resource”

  • Make an authentication attempt to the corporate resource (e.g Anyconnect, Citrix-portal etc) that is protected with Mideye.

Mideye+ Android app waiting for authentication attempt during activation

“3. Activation SMS”

  • Once the SMS is received, open the message and click the link. A redirect to the Mideye+ app will take place with the text “Activation successful” and an OTP is displayed. This can be used to login to the corporate resource during an app activation.

Mideye+ Android app activation successful screen with generated OTP code

When Mideye+ is activated, the app can be used to authenticate when logging on to a protected resource that is using Mideye two-factor authentication. Instead of receiving traditional text-messages containing an OTP, Mideye will send the OTP using data traffic and the OTP will be presented in the phone as a notification.

Mideye+ iPhone notification showing one-time password code received via push

Sending data OTP instead of traditional text messages have a big advantage when end-users do not have any network coverage but still have internet access.

Mideye+ also works as a token card and can be used when both network coverage and internet access is missing. When end users try to authenticate, and the phone does not have any coverage, Mideye will instead present the user with the message “Phone not reachable, please sign xxxxxx”.

Cisco AnyConnect VPN client showing Mideye challenge message for offline manual signature

The message presented to the end-user when logging on lacking coverage. In this example, Cisco Anyconnect. To sign, open the Mideye+ app and click “Manual signature at the bottom of the screen”

Mideye+ iPhone app showing Offline OTP button for manual challenge signing

Click “Offline OTP” to manually sign the login

Enter the challenge presented on your loginscreen.

Mideye+ iPhone app offline OTP entry screen with challenge code input field

Enter the OTP presented in the Mideye+ app

Mideye+ iPhone app showing generated offline response code to enter at login

Use the OTP at the login page.

If a manual signing does not work, but instead the end-user is presented with a failed authentication, it is likely because the RADIUS timeout of the RADIUS client is set to less than 35 seconds. Refer to the section “Troubleshooting RADIUS client” in the Configuration guide.

User is not receiving any notifications when using Mideye+

Section titled “User is not receiving any notifications when using Mideye+”

For Mideye+ to function correctly it is important that the end-user accepts that Mideye+ can present notifications. This question is presented to the end-user only once after installing the app. If the user accidentally pressed “Deny” instead of “Allow”, no notifications with OTP will be shown during authentication. To manually fix this follow the instructions below:

  1. Tap the “Settings” icon.
  2. Scroll down and tap “Notifications”
  3. Tap Mideye+ in the “Notification style”
  4. Enable “Allow Notifications”

iPhone Settings showing Mideye+ notification settings with Allow Notifications toggle enabled

Enable notifications

Enabling notifications vary depending on what version of Android is being used. Refer to each manufacturer’s manual for details.

Android is not presenting any notifications while the phone is in battery saving mode

Section titled “Android is not presenting any notifications while the phone is in battery saving mode”

If the phone is low on battery and the end-user enables battery saving mode, Mideye+ must be excluded to still be able to present notifications when authenticating. The example below shows how to achieve this using a Samsung phone. For other phones, refer to the manual from the manufacturer.

  1. Open “Settings”
  2. Open “Battery” and navigate to “Unmonitored Apps”
  3. Click “Add apps” and select Mideye+ followed by “Done”

Samsung Android battery settings showing Mideye+ added to unmonitored apps list

Add Mideye+ to unmonitored apps

To further ease the authentication process, Touch Accept can be used to simply allow or deny an authentication attempt. This function can be enabled from Mideye configuration tool and does only affect those users that have Mideye+ installed on their cellphones. Also, Touch Accept does not use challenge-response when authenticating, which enables two-factor authentication on applications and services that do not have support for traditional two-factor authentication.

Navigate to “Configuration” followed by “LDAP Profiles”. Select the LDAP-Profile that is being used, and click “Edit”. Select the tab “Authentication” and change the “Default authentication type” to 6, 7 or 8 depending on if there should be a fallback available to traditional OTP. Fallbacks are only efficient if the authentication service supports challenge-response. In those cases, if for any reason Touch accept would fail, a normal OTP will be sent to the phone. If the authentication service does not have any support for challenge-response, authentication type 6 will be the only option.

Mideye Server LDAP Profile Authentication tab showing Touch Accept authentication type selection

To verify if the configuration is working, simply perform an authentication attempt to any Mideye enabled service. Now, instead of receiving an OTP to the Mideye+ app, a question to allow or deny the login will be presented. Since the authentication type 8 (Touch-mobile) was selected in the previous step, an OTP will be sent if Touch should fail.

Mideye+ iPhone app Touch Accept prompt with Accept and Deny buttons for login approval

Login using Touch Accept.