Recommendation ladder
When a connection needs MFA — at onboarding, or after the status transitions toMFA_TOKEN_EXPIRED — present these options to the end customer in this order:
| # | Option | What it asks the customer to do | Recommended when |
|---|---|---|---|
| 1 | Upload documents | Email or upload PDF bills; nothing on the utility portal changes. | Always the first option. Works for any portal and requires no account changes. |
| 2 | Disable MFA on the portal | Turn off MFA in the utility portal’s account settings, if the portal allows it. | Customer controls the utility account and their organization’s policies permit it. |
| 3 | Managed MFA forwarding | Change the utility portal’s MFA destination to a Nectar-provided email address. | Customer must keep MFA on and is comfortable setting a third-party email as the code destination. |
| 4 | Customer-inbox forwarding | Keep the utility’s existing MFA email; set up auto-forwarding from that inbox to Nectar. | Customer cannot change the portal’s MFA destination. Frequently fails because of corporate email security policies. |
| 5 | SMS MFA relay (beta) | Change the utility portal’s MFA phone number to a Nectar-provided number. | Portal only supports SMS MFA and email options are off the table. Contact support to request access. |
1. Upload documents
Direct the end customer to upload their utility bill PDFs. The parsed output — documents, meters, accounts, and usage data — is identical to what automated collection produces, and no portal or email configuration is required. Upload bills through the API withPOST /job/company/{companyId}/bulk, or have your end customer drag PDFs into the Nectar app.
Choose this first when:
- The end customer is a facility manager who already receives bills by email.
- The portal’s MFA cannot be disabled and the customer will not change its destination.
- You need historical data quickly — uploading a batch of PDFs is faster than waiting for a weekly automated pull.
2. Disable MFA on the portal
Many utility portals make MFA optional. If the end customer controls the account and their organization allows it, turning MFA off in the portal’s security settings is the simplest way to restore fully automated weekly collection with no ongoing forwarding to maintain. After the customer disables MFA on the portal, use a reconnect invitation to refresh the stored credentials. Nectar picks up the new login on the next scheduled check. Choose this when:- The utility portal’s security settings allow turning off MFA.
- Organizational policy does not require MFA on utility accounts.
3. Managed MFA forwarding (recommended forwarding strategy)
Nectar provisions a unique email address for the connection. The end customer sets that address as the MFA destination in the utility portal’s account settings. When the portal sends a login code, Nectar receives it directly and uses it to complete the automated login. Nectar can also auto-forward the raw code to any additional email addresses the customer specifies, so the customer continues to see their codes. Use this when the customer must keep MFA on, can change the portal’s MFA destination, and doesn’t want to manage their own forwarding rules. How the end customer configures it:Start a reconnect (or complete the initial connection flow)
The Nectar-hosted wizard displays the dedicated email address for this connection.
Sign in to the utility portal
In the portal’s account or security settings, set the Nectar-provided email as the MFA code
destination.
Optionally add additional recipients
In the Nectar wizard, list any customer-side emails that should also receive a copy of each
code.
- Nectar receives codes directly from the utility portal — no dependency on the customer’s email infrastructure.
- No email-forwarding rules for the customer to maintain.
- The same setup flow works for managed-service customers whose own IT team has to approve the change.
- They will need access to the portal’s MFA settings.
- They must be comfortable setting a third-party email as the MFA destination.
4. Customer-inbox forwarding
The customer keeps their existing MFA email on the utility portal and adds an auto-forwarding rule in their own inbox that forwards the utility’s MFA emails to a Nectar-provided address. Use this only when the customer cannot or will not change the MFA destination on the utility portal. How the end customer configures it: The reconnect wizard displays a unique forwarding address. The customer adds a filter in their email client that auto-forwards messages from the utility’s MFA sender to that address. Guidance for the most common providers is included in the shareable one-pager at the bottom of this page. Common failure modes your support team should recognize:- Admin policy blocks external auto-forwarding (the filter saves but never fires).
- The utility rotates the sender address used for codes and the filter’s sender match goes stale.
- A forwarding rule is disabled automatically after a suspicious-login event.
5. SMS MFA relay (beta)
For utility portals that only support phone-based MFA, Nectar can provision a phone number that receives SMS codes. The customer sets that number as the MFA destination in the portal; Nectar captures each code and can relay it to customer-owned phone numbers. This capability is currently in limited beta.Beta access: Email [email protected] with the
company name and the utility portals that require SMS MFA. We will enable the capability on your
organization and walk your team through the setup flow.
Detecting MFA issues from the API
Subscribe toconnection.updated.v2 webhooks and branch on status:
connection.updated.v2 event fires with status: "CONNECTED".
See Connection lifecycle — credential errors for the full set of statuses that pause collection.
Triage flow for customer support teams
When an end customer reports a broken MFA connection, walk through these questions in order. The first “yes” determines the path.- Can the customer upload bills instead? → Route to Document upload. Stop here for most cases.
- Can the customer disable MFA on the utility portal? → Have them disable it, then send a reconnect invitation.
- Will the customer change the portal’s MFA destination to a Nectar email? → Managed MFA forwarding.
- Is the customer on a personal / unrestricted email account? → Customer-inbox forwarding may work.
- Portal only supports SMS? → Request SMS MFA relay beta access.
Shareable one-pager
The section below is written for end customers. You can paste it into your own help center, forward it in an email, or link directly (use/developer-guide/mfa-integration#shareable-one-pager).
Your utility portal uses MFA — here’s how to keep data flowing
Your utility portal requires a second step to log in (an emailed code, a text message, or an authenticator app). Automated utility data collection can’t complete that step on its own, so we offer several options. Pick the first option that works for you. Each one further down takes more effort to maintain.Option 1 — Upload your bills directly (easiest)
Option 1 — Upload your bills directly (easiest)
Email us your utility bill PDFs, or drag them into the upload area. We extract the same data as an automated connection — usage, costs, meter details — without touching your utility portal. No MFA configuration required.Best for: Most customers. Facility managers who already receive bills by email. Customers whose IT team won’t allow portal or email changes.
Option 2 — Turn off MFA on your utility portal
Option 2 — Turn off MFA on your utility portal
Many utility portals make MFA optional. Sign in to your utility portal’s account or security settings and turn MFA off. Once it’s off, click Reconnect in your Nectar app to resume automated collection.Best for: Customers who own the utility account and whose organization doesn’t mandate MFA on utility portals.
Option 3 — Let us receive MFA codes on your behalf (recommended if you must keep MFA on)
Option 3 — Let us receive MFA codes on your behalf (recommended if you must keep MFA on)
We’ll give you a dedicated email address. Set that address as the MFA destination in your utility portal. We receive each code, complete the automated login, and can copy the code to additional email addresses of your choice so you still see them.Best for: Customers who must keep MFA on and can change the MFA destination in their utility portal.Heads up: You’ll be routing utility login codes to a third party. We never share or store codes beyond the duration of the login.
Option 4 — Forward MFA codes from your own inbox (last resort)
Option 4 — Forward MFA codes from your own inbox (last resort)
Keep your existing MFA email on the utility portal, then add a filter in your own inbox that auto-forwards utility MFA emails to an address we provide.Best for: Customers on personal email accounts who can’t change the portal’s MFA destination.Heads up: Most corporate email systems (Microsoft 365, Google Workspace) block auto-forwarding to external addresses by default. If your IT team enforces these rules, this option often fails silently after a few days. If you’re on a work email, try options 1–3 first.Setup guides: Gmail → Settings → Filters and blocked addresses → Create filter. Outlook / Microsoft 365 → Rules → Create rule. iCloud → Mail → Preferences → Rules. Your IT team may need to allow-list our forwarding domain.
Option 5 — SMS MFA (beta)
Option 5 — SMS MFA (beta)
If your utility portal only supports text-message codes, contact [email protected]. We can provision a phone number that receives your MFA texts and relay codes to phone numbers you choose. This feature is in limited beta.
Related pages
Document upload
Submit bills directly — the recommended first option for MFA-protected accounts.
Connection invitations
Create reconnect invitations that open the MFA wizard for end customers.
Connection lifecycle
Detect
MFA_TOKEN_EXPIRED via webhooks and trigger the recovery flow.