Account Security
Protect your Hunch account with additional security features.
Two-Factor Authentication (2FA)
Add an extra layer of security to your account using time-based one-time passwords (TOTP).
Why Use 2FA?
Two-factor authentication significantly reduces the risk of unauthorized access:
- Requires both your password and a verification code
- Protects against phishing attacks
- Secures your account even if password is compromised
Supported Authenticator Apps
Hunch works with any TOTP-compatible authenticator app:
- Google Authenticator (iOS / Android)
- Authy (iOS / Android / Desktop)
- 1Password (iOS / Android / Desktop)
- Microsoft Authenticator (iOS / Android)
- Bitwarden (iOS / Android / Desktop)
- Any other TOTP app
Setting Up 2FA
- Log in to your Hunch dashboard
- Navigate to Settings
- Scroll to the Two-Factor Authentication section
- Click Configure MFA
- Scan the QR code with your authenticator app
- Enter the 6-digit verification code
- Click Verify & Enable
Manual Setup
If you cannot scan the QR code:
- Click Can't scan QR code? on the setup screen
- A manual entry key will be displayed
- Enter this key manually in your authenticator app
- Enter the verification code
- Click Verify & Enable
Using 2FA
After enabling 2FA:
- Enter your email and password as usual
- When prompted, open your authenticator app
- Enter the 6-digit code shown for Hunch
- Complete login
Disabling 2FA
To disable two-factor authentication:
- Go to Settings
- Navigate to Two-Factor Authentication
- Enter your current 6-digit verification code
- Click Disable
We recommend keeping 2FA enabled for maximum security. Only disable if absolutely necessary.
Common Issues
Codes not working:
- Ensure your device time is synchronized
- Try the next code in sequence
New device setup:
- Reconfigure MFA from Settings after signing in
- Keep a second authenticator enrollment path in your internal access process if you require MFA for admins
IP Allowlist
Restrict access to your Hunch dashboard to specific IP addresses.
When to Use IP Allowlist
- Limit access to office networks
- Comply with security policies
- Prevent unauthorized access from unknown locations
- Add an extra layer of protection
Setting Up IP Allowlist
- Go to Settings
- Find the IP Allowlist section
- Enter an IP address (e.g.,
192.168.1.1) - Add a description (optional)
- Click Register IP Address
IP Address Formats
| Format | Example | Description |
|---|---|---|
| Single IP | 192.168.1.1 | Specific address |
| CIDR Range | 192.168.1.0/24 | Network range |
| IPv6 | 2001:db8::1 | Specific IPv6 address |
Managing Allowed IPs
Adding IPs:
- Enter IP address and optional description
- Click Add
- Changes take effect immediately
Removing IPs:
- Click the trash icon next to the IP
- Confirm removal
- Access is revoked immediately
Important Notes
- If you lock yourself out, contact support
- Prefer testing allowlists with a second active session before tightening access broadly
Session Management
Email verification
New password-based signups must verify their email before sign-in. If the verification link expires, the user can request a new verification email from the login flow.
Viewing Active Sessions
Your settings page shows recent activity including:
- Login timestamps
- IP addresses used
- Device information
You can revoke:
- a specific session
- every other active session
Enterprise session policy
Workspace owners can enforce stronger session policy, including:
- require SSO
- allow or block password login
- enforce a single active session
- require MFA for admin users
- set access-token lifetime
- set idle timeout
- set refresh-token lifetime
- restrict login to allowed email domains
- enforce IP allowlists at the policy layer
For the full enterprise feature set, see Enterprise Auth and Sessions.
Security Recommendations
- Enable 2FA - Strongest protection
- Use IP Allowlist - Restrict access to known networks
- Review sessions - Check for unauthorized access
- Use strong passwords - Minimum 12 characters
- Use individual accounts - Invite teammates instead of sharing credentials
Password Requirements
- Minimum 8 characters
- Mix of uppercase and lowercase
- Include numbers and symbols
- Don't reuse passwords from other services
We recommend enabling MFA for all operators, especially anyone with billing, team management, website publishing, or admin access.