eAbout eDiscovery Authentication Methods

A system will support one of the following primary types of authentication:

  • TransPerfect Authentication (default) — The TransPerfect authentication method (TP Auth) that requires setup and management of corporate-assigned credentials (email address and password) for each User as well as permissions to access the eDiscovery application. A User entry created in eDiscovery using TP Auth requires an email address for the User to receive emails from the software, but the User entry itself does not include a username, nor does it enable specification of a password if the User is already defined and in TP Auth. (For TP Auth, the corporate-assigned email address is effectively serving as a username.) TransPerfect Authentication can be used with or without Authorized IP addresses.

  • Standard Authentication — The legacy authentication method known to current eDiscovery Users, which minimally requires an Organization User entry with a username, password, and email address, and can also support one or more additional authentication methods.

The following summarizes the additional authentication methods available depending on the primary form of authentication configured for a system:

  • Password (applies in general) — This base authentication is always enabled. Any User must always supply valid credentials to log in.
  • Email Security Code (applies to Standard Authentication only) — This type of authentication provides email -based Multi-Factor Authentication (MFA) for a Standard Authentication User. It requires availability of a Mail Server on the system to deliver a 6-digit code to the User's configured email address as part of the login process. When attempting initial login, the User will be prompted to supply the 6-digit code, sent via the email address. When you enable this type of authentication, you can configure it to either always make the User subject to Email Security Code authentication, or to make the User subject to Email Security Code authentication only if the User's IP address cannot be authorized.
  • Authorized IP addresses (applies to either TransPerfect Authentication or Standard Authentication — This type of authentication restricts the IP address(es) that the User can log in from, either one or more IP address values, subnets, or IP address ranges in IPV4 address format. The configured list serves as a whitelisted range of valid IP address values. This type of authentication applies to both Organization Users entries and System User entries.

Note: If the Standard Authentication User is subject to both Email Security Code and IP Address authentication at every login, the User is emailed a code as long as the IP address used is in the whitelisted range.

For more information about the Login screen and overall process, please see About the eDiscovery Login Process.