03.02 - Working with Systems that Prevent Credential Sharing

03.02 - Working with Systems that Prevent Credential Sharing

Some applications prevent credential sharing through various methods.  This article explains how to work through different methods:

Two-Factor Work-Around

Some systems require two-factor authentication.  Without a work-around, this makes a migration specialist's job more difficult because they have to have the client connected with them live in order to receive the two-factor code.
Fortunately, there is a good workaround.
Nearly all systems support three different 2FA methods: Text-Message 2FA, Email 2FA, and Microsoft/Google Authenticator 2FA.

When using Microsoft/Google Authenticator (Preferred)

Use a service like 1password.com to store the to create a "virtual" authenticator that can be shared between the client and the migration specialist.  This allows both people to retrieve the 2FA code.

When using Email 2FA

The client can create conditional mail forwarding rules that will automatically forward certain 2FA emails to the migration specialist.

Concurrent Logins Work-Around

Some systems only allow you to be logged in once and if you log in on one browser, you get automatically logged out of all other browsers.

There is no true work-around for this, but the following best practices will help alleviate challenges.

Request two administrator-level login credentials.

  1. The first login will be an exclusive login that should only ever be used by Universal Migrator.
    1. You should reset the password on this login to something that only you know so that other staff members don't log in with it.
    2. Remember: if this login is used while Universal Migrator is doing a backup, your backup will be interrupted.
  2. The second login is one that you as a human will use to look around the system.
For both logins, you should make their access as easy as possible by either removing 2FA or using 1password.com's virtual 2FA
    • Related Articles

    • 03.03 - Working with Hostile Providers

      Many providers to law firms treat their customers with honesty and integrity, however, occasionally you may encounter hostile / predatory providers. A hostile provider is one that will actively work to make it difficult for the client to leave. This ...
    • 03.04 - Working with Hostile Providers - Notice of Departure

      When working with a hostile provider, we first recommend reading the instructions in this article. If the relationship has sufficiently deteriorated, you may consider using this email template to help ensure a smoother transition. Never mention the ...
    • 05 - Collaborative Sharing

      Our team has insight into how consultants world-wide are performing migrations. We use this information help evolve the policies and procedures of all the consultants we work with. Our goal is that all consultants using Universal Migrator deliver ...
    • 02 - Working With Historic Users

      To Preserve or Merge? When a client moves into their new system, what do they want to happen with data tied to former employees? Do they want to keep it and attribute it to the original user? Do they want to attribute it to another user? Or do they ...
    • 03 - Working with Client-Provided CSV Data

      Sometimes firms will have a special CSVs that they may provide that will be used to tweak or adjust data in the backup. When you receive this data you should do the following: DO NOT import these CSVs directly into a Universal Migrator database. ...