Skip to main content

Authentication Methods

The Authentication Methods section allows store administrators to control how users log in to the platform.
Admins can enable or disable login options, set a default authentication method, and configure security rules such as OTP limits and validation settings for Vendors, Customers, and Store Operators.

On This Page

User Authentication Types

This section displays all available login methods supported by the platform.

  • Authentication methods can be configured separately for:
    • Vendors
    • Customers
    • Store Operators
  • Each authentication method shows:
    • Current status (enabled or disabled)
    • Method preview
    • Default selection option

Available Authentication Methods

Administrators can enable or disable the following login options:

  • Email with OTP
  • Email with Password
  • Mobile Number with OTP
  • Mobile Number with Password
  • Username with Password

Each method can be activated or deactivated using the toggle button.

OTP Configuration Settings

For OTP-based authentication methods, administrators can configure additional security controls:

  • OTP Limit Per User
    Defines the maximum number of OTP requests allowed per user within a defined time period.

  • Resend OTP Timer
    Sets the minimum time (in seconds) before a user can request a new OTP.

  • Failure Validation Limit
    Limits the number of failed OTP attempts allowed per session.

Click Update to save changes or Cancel to discard updates.

Default Authentication Method

  • Any enabled authentication method can be set as the default login option.
  • The default method is automatically selected on the login screen.
  • Only one authentication method can be set as default at a time.

Enable or Disable Authentication Methods

  • Use the toggle switch to enable or disable a login method.
  • Disabled methods will not appear on the login screen.
  • Enabled methods become available immediately for users.

Key Benefits

  • Flexible login options for different user types
  • Improved platform security through configurable OTP rules
  • Centralized control over authentication behavior
  • Better balance between user convenience and security