Can I enable two-factor authentication on Martini?
Short answer
Not yet. Self-serve two-factor authentication is not currently available on Martini accounts, so there is no authenticator-app setup flow or recovery-code screen in the product today. Use a strong unique password, keep your email account protected with 2FA, and contact support if you suspect unauthorized access.
Current 2FA status
Martini does not currently expose a self-serve two-factor authentication setting. You will not see an Enable 2FA button in account settings, and the sign-in flow does not ask for authenticator-app codes or recovery codes today.
The team intends to add stronger account-security controls over time, but this help article reflects the current product. If your workspace has a security requirement that depends on 2FA, raise it through support or your enterprise contact before moving sensitive production work into the account.
How to protect your account today
Use a strong, unique password for Martini and store it in a password manager. Do not reuse passwords from other creative tools, provider dashboards, or client portals. If you signed up with a social login, secure the underlying Google or Apple account with its own 2FA setting.
Keep the email address attached to your Martini account protected, because password resets and security notifications depend on that inbox. For team work, use workspaces instead of shared logins so each person has their own account, project access can be revoked cleanly, and billing activity remains attributable.
If you suspect unauthorized access
If you see projects, generations, billing activity, or workspace membership changes you do not recognize, change your password immediately and secure the email account used for sign-in. If you use social login, review active sessions and connected devices with that identity provider.
Contact support from the help icon with the account email, approximate time of the suspicious activity, and any project or billing IDs involved. Workspace owners should also review workspace members and remove any accounts that should no longer have access.
Enterprise and workspace considerations
For workspaces, the most important current control is individual membership. Do not share one Martini login across a team. Invite each collaborator separately, remove members when they leave the project, and keep workspace billing access limited to owners and admins who need it.
Enterprise teams with stricter security requirements should discuss SSO, audit, and account-security expectations during procurement. Availability depends on the contract and current product capabilities, so confirm requirements before relying on them for compliance.
Examples
- A solo creator asks where to enable 2FA — there is no self-serve 2FA setting today.
- A user signs in with Google — secure the Google account with Google 2-Step Verification.
- A workspace owner avoids shared credentials by inviting every teammate as a separate member.
- A suspicious billing event appears — change the password and contact support with the timestamp.
Edge cases
- There are no Martini recovery codes today because 2FA enrollment is not live.
- Social-login accounts inherit the security posture of the identity provider account.
- Workspace membership controls are not a substitute for account-level 2FA, but they reduce shared-login risk.
- Enterprise security features should be confirmed in the contract rather than assumed from consumer account settings.
What to do next
- Use a unique password for Martini and protect the account email with 2FA.
- Use separate workspace member accounts instead of shared logins.
- Contact support if you see account or billing activity you do not recognize.
- See the are-generations-private article for the broader account-privacy model.
Related help articles
Still need help? Contact support.