03.02 - Working with Systems that Prevent Credential Sharing

03.02 - Working with Systems that Prevent Credential Sharing

Some applications prevent credential sharing through various methods.  This article explains how to work through different methods:

Two-Factor Work-Around

Some systems require two-factor authentication.  Without a work-around, this makes a migration specialist's job more difficult because they have to have the client connected with them live in order to receive the two-factor code.
Fortunately, there is a good workaround.
Nearly all systems support three different 2FA methods: Text-Message 2FA, Email 2FA, and Microsoft/Google Authenticator 2FA.

When using Microsoft/Google Authenticator (Preferred)

Use a service like 1password.com to store the to create a "virtual" authenticator that can be shared between the client and the migration specialist.  This allows both people to retrieve the 2FA code.

When using Email 2FA

The client can create conditional mail forwarding rules that will automatically forward certain 2FA emails to the migration specialist.

Concurrent Logins Work-Around

Some systems only allow you to be logged in once and if you log in on one browser, you get automatically logged out of all other browsers.

There is no true work-around for this, but the following best practices will help alleviate challenges.

Request two administrator-level login credentials.

  1. The first login will be an exclusive login that should only ever be used by Universal Migrator.
    1. You should reset the password on this login to something that only you know so that other staff members don't log in with it.
    2. Remember: if this login is used while Universal Migrator is doing a backup, your backup will be interrupted.
  2. The second login is one that you as a human will use to look around the system.
For both logins, you should make their access as easy as possible by either removing 2FA or using 1password.com's virtual 2FA
    • Related Articles

    • 03.03 - Working with Hostile Providers

      Many providers to law firms treat their customers with honesty and integrity, however, occasionally you may encounter hostile / predatory providers. A hostile provider is one that will actively work to make it difficult for the client to leave. This ...
    • 03.04 - Working with Hostile Providers - Notice of Departure

      When working with a hostile provider, we first recommend reading the instructions in this article. If the relationship has sufficiently deteriorated, you may consider using this email template to help ensure a smoother transition. Never mention the ...
    • 05 - Collaborative Sharing

      Our team has insight into how consultants world-wide are performing migrations. We use this information help evolve the policies and procedures of all the consultants we work with. Our goal is that all consultants using Universal Migrator deliver ...
    • 01 - Is Universal Migrator for you?

      The Universal Migrator is a suite of tools that assists IT consultants in mass-transferring data and performing whole-sale migrations between different systems. It is a technical tool for technical individuals. You should use Universal Migrator if: ...
    • 01 - Creating a Migration Workspace

      Prior to scoping a migration, you should create a migration workspace for the prospective project on your migration workstation. This folder structure will contain notes and important information about the project that you will add to as you discuss ...