MFA Authentication Support
Last updated: April 30, 2026
Overview
Our authentication system is built using Stytch, leveraging passwordless login methods including:
Magic links (email-based login)
Google Sign-In (OAuth)
Because these methods do not use passwords, they differ from traditional authentication models.
How Authentication Works
Magic Links
When you log in via a magic link:
A secure link is sent to your email
Access is granted only if you can open that link
This verifies real-time control of your email inbox
Google Sign-In
When you use Google Sign-In:
Authentication is handled by Google
Any security measures (including MFA) configured on your Google account apply automatically
MFA (Multi-Factor Authentication) Considerations
Traditional MFA is typically defined as:
Something you know (e.g., password)
Something you have (e.g., phone, authenticator app)
Since our system is passwordless, this exact model does not apply directly.
However:
Magic links provide proof of access to your email account at the time of login
Google Sign-In inherits Google’s MFA protections (if enabled)
Compliance Perspective
For many security frameworks, this approach satisfies the intent of MFA requirements, as it ensures:
Verified identity through a trusted channel (email or Google)
Protection against unauthorized access
Security & Compliance Requests
If your organization:
Requires specific MFA controls for compliance (e.g., SOC 2, ISO 27001)
Needs documentation for internal security review
Please reach out and provide the requirement. We will:
Map our current authentication model to your requirement, or
Flag any gaps and evaluate them for our product roadmap