• Home
  • 5
  • Article
  • 5
  • FHA Connection’s New Phishing-Resistant MFA: What You Need to Know

FHA Connection’s New Phishing-Resistant MFA: What You Need to Know

Sep 24, 2025

In 2025, the Federal Housing Administration (FHA) rolled out a mandatory phishing-resistant multi-factor authentication (MFA) requirement for all users of its FHAC (FHA Connection) system. This update is part of FHA’s broader effort to protect sensitive data, bolster identity management, and prevent credential-related breaches. 

But for mortgage lenders, this is more than a technical update—it’s a business-critical change. If your users fail to adopt the new MFA by the deadline, they will be unable to log in to FHAC at all, disrupting daily workflows, jeopardizing certifications, and potentially derailing HUD recertification timelines. 

What it Means  

  • Phishing-resistant MFA means more than just a code via SMS or email — FHA requires stronger factors such as FIDO2 security keys or biometric authenticators, or using OKTA FastPass. These methods help ensure that login credentials cannot be easily phished or compromised.  
  • All FHAC users (except those connecting via the FHA’s Business-to-Government (B2G) interface) are required to adopt this stronger form of MFA.  
  • The timeline has been updated (extended) so users have more time to make the switch. Originally, the deadline was July 28, 2025; later notices push mandatory compliance to October 27, 2025 in some communications.  

How to Implement It  

If your institution (or your users) needs to comply, here are the key steps:  

  • Choose your MFA method
    You have two main options:

  • Deploy / Configure across your user base
    • Ensure users have FHAC user IDs and are registered properly.
    • Your IT department may need to enable workstation support for FIDO2 or distribute OKTA Verify.
  • Test and validate
    • Have users log in via the new MFA method ahead of the deadline to ensure there are no access or compatibility issues.
    • Identify and resolve any issues in your environment (e.g., old OS that doesn’t support FIDO2, devices incapable of biometrics, etc.).  
  • Communicate to all stakeholders
    • Anybody who accesses FHAC must be aware of the change; failure to adopt MFA in time will mean losing access.
    • Include internal teams such as compliance, security, IT, so policies are updated.  

The Mortgage Lender Impact 

For mortgage lenders, FHAC isn’t optional. It’s central to daily operations. The system is used for: 

  • Submitting case binders and endorsements 
  • Managing insurance applications and claims 
  • Pulling FHA Connection reports 
  • Processing certifications and renewals 
  • Accessing lender approval and monitoring information 

Without MFA-enabled access, your staff won’t be able to log in to complete these core tasks. That means loans stall, insurance endorsements are delayed, and compliance timelines slip. For institutions with multiple users, even one person locked out of FHAC can create bottlenecks that ripple through processing pipelines. 

In short: failure to implement phishing-resistant MFA doesn’t just risk compliance—it risks the continuity of your FHA lending business. 

Impact on HUD & FHA Recertification  

This part is especially important. If your organization needs to maintain or renew HUD/FHA approval or recertification status, the MFA change can affect you in several ways:  

  • Access Requirement: Recertification often requires using FHAC to submit forms, manage certifications, or perform lender recertification. If key users don’t have access, those functions can’t be performed, which can delay or block recertification.  
  • User Identity & Security Audit: Many recertification/compliance reviews assess identity management, internal controls, authentication, and access controls. By implementing phishing-resistant MFA, your organization strengthens its compliance posture. Conversely, not having it could show up as a deficiency.  
  • Timeliness: Deadlines for recertification often don’t wait. Even if your FHA/HUD recertification window is open, inability to access FHAC due to missing MFA could mean missing parts of the recertification package or being unable to validate or submit required documentation.  

 

FHA’s phishing-resistant MFA requirement is more than a security upgrade—it’s a make-or-break access point for lenders. Missing the deadline means losing FHA Connection login privileges, which disrupts daily operations and threatens timely HUD recertification. 

By acting now—choosing your MFA method, training staff, and validating logins—you not only secure your systems but also protect your ability to process loans, manage insurance, and maintain compliance without interruption. 

For more information, contact the FHA Resource Center via answers@hud.gov. 

Connect with Richey May’s experts to ensure your operations are airtight and risk-free.  

Explore More Insights

Some of these items predate Richey May’s restructuring to an alternative practice structure. Richey May is no longer a CPA firm. All Attest services are provided by Richey, May & Co., LLP.

Our Latest Insights

Looking for more industry expertise and to stay up to date? Check out more from the experts at Richey May below: