Skip to content
  • There are no suggestions because the search field is empty.

Two-Factor Authentication (2FA)

CustomCat requires Two-Factor Authentication (2FA) on all accounts to enhance platform security and protect store integrations, financial activity, and account access. 2FA is mandatory and cannot be disabled.

What Is Two-Factor Authentication?

Two-Factor Authentication (2FA) adds an additional layer of security to your login process.

In addition to your password, you will be required to enter a one-time verification code when signing in.

This ensures that even if someone gains access to your password, they cannot access your CustomCat account without the verification code.


How 2FA Works

When logging into CustomCat:

  1. Enter your email and password

  2. Enter the one-time verification code sent to your account email. 

  3. Access your account

You will be prompted for a new verification code each time you log in from an unrecognized device.


“Remember This Device” Option

To reduce login friction, you may select “Remember this device” during login.

When selected:

  • You will not be prompted for a verification code each time you log in from that device

  • The device will remain trusted unless you log out, clear browser data, or access from a new device

For security reasons, only enable “Remember this device” on personal or secure work devices.


Can 2FA Be Turned Off?

No.

Two-Factor Authentication is required on all CustomCat accounts and cannot be disabled.

This policy helps ensure platform-wide security standards and protects all sellers.


Changing Devices or Losing Access

If you:

  • Change phones

  • Lose access to your authentication method

  • Are unable to receive verification codes

Please contact CustomCat Support for assistance restoring account access.

For security reasons, identity verification may be required.


Best Practices

We recommend:

  • Using 2FA on secure personal or company devices

  • Avoid enabling “Remember this device” on shared or public computers

  • Keeping your authentication method up to date

  • Assigning Admin access only to trusted team members