Security and Access
Protect your Treblle account with robust security features including multi-factor authentication, secure password management, and access controls. These security measures help safeguard your API data and account information.
Multi-Factor Authentication (MFA)
Enhance your account security with multi-factor authentication, adding an extra layer of protection beyond your password.
Setting Up MFA
-
Navigate to Security Settings
Access the Multi-Factor Authentication section in your account settings.
-
Scan QR Code
Use an authenticator app (such as Google Authenticator, Authy, or Microsoft Authenticator) to scan the provided QR code.
-
Enter Verification Code
Input the 6-digit code from your authenticator app to verify the setup.
-
Complete Setup
Click Verify MFA to enable multi-factor authentication on your account.
Using MFA
Once enabled, you’ll need to provide a one-time secret from your authenticator app every time you log in, significantly improving your account security.
Managing MFA
- Disable MFA: Use the Disable MFA button if you need to turn off multi-factor authentication
- Re-enable MFA: Follow the setup process again to re-activate MFA

Password Management
Update Password
Regularly updating your password helps maintain account security:
- Current Password: Enter your existing password
- New Password: Choose a strong, unique password
- Confirm Password: Re-enter your new password to confirm

Password Best Practices:
- Use a long, random password with mixed characters
- Avoid reusing passwords from other accounts
- Consider using a password manager
- Update passwords regularly
Developer Settings
Personal Access Tokens
Generate personal access tokens to access your account through the API programmatically.

Creating a Token
- Token Name: Provide a descriptive name for identification
- App Selection: Choose the application or service that will use this token
- Expiration: Set an appropriate expiration date for security
- Generate Token: Click to create your personal access token
Token Security
- Store tokens securely and never share them
- Use tokens with appropriate scope limitations
- Regularly rotate tokens for enhanced security
- Delete unused tokens promptly