2FA Recovery Requests
The 2FA Recovery Requests page allows administrators to review and manage account recovery requests for users who cannot access their Two-Factor Authentication (2FA). Administrators can generate temporary recovery codes or cancel requests after verification.
Purpose
This page is used when staff members or customers lose access to their authenticator device, backup code, or registered verification method.
Recovery processing helps users regain access securely while maintaining account protection.
Filters
Status
Use this dropdown to filter requests by current processing state.
Examples:
- Pending
- Approved
- Cancelled
- Completed
Type
Use this dropdown to filter requests by requester category.
Examples:
- User
- Employee
- Customer
- All Types
Refresh
Use the Refresh button to reload the latest recovery requests and status updates.
Request Table
The table displays all submitted 2FA recovery requests.
Type
Shows the requester category.
Examples:
- User
- Employee
- Customer
Requester
Displays requester identification details.
Examples:
- Name
- Registered email
- IP address
Role
Shows the requester’s system role.
Examples:
- Employee
- Admin
- Customer
Requested
Displays the date and time when the recovery request was submitted.
Status
Shows the current request state.
Examples:
- Pending
- Completed
- Cancelled
Delivery
Displays whether the temporary recovery code has been delivered.
Examples:
- Email Sent
- SMS Sent
- Pending
- Failed
Actions
Provides options to process the selected recovery request.
- Generate code : Create a temporary single-use recovery code for the requester
- Cancel : Reject and close the recovery request
Security Notes
- Recovery codes should only be generated after identity verification
- Temporary codes should expire automatically after limited use or time
- Users should be required to re-enroll 2FA after successful login
- Cancel suspicious or duplicate requests immediately
Best Practices
- Verify requester identity before approving recovery
- Use recent contact details for code delivery
- Review IP address or login history if needed
- Monitor repeated recovery requests for suspicious activity
- Encourage users to save backup codes after re-enrollment