Anaconda home page
6.1.8
Search...
⌘K
Ask AI
Pricing
Download
Download
Search...
Navigation
User management and configuration
Enabling two-factor authentication
Home
Getting Started
Tools
Package Security Manager
Data Science & AI Workbench
Reference
Anaconda Server (6.1.8)
Key Features
Preparing Environment for Anaconda Server
Installing Anaconda Server
Administering Anaconda Server
Administering Anaconda Server
User management and configuration
User management and configuration
User roles and permissions
Enabling two-factor authentication
Okta integration using OpenID Connect Provider (OIDC)
Create a dev-users-admin role
Social login integration (GitHub)
Role provisioning: Keycloak admin user with restricted rights
Proxy mirroring
Enabling and configuring SSL
LDAPS
Updating your domain
Common Vulnerabilities and Exposures (CVEs)
Mirrors
CVE mirror troubleshooting
System metrics with Prometheus
Upgrading Anaconda Server
Using Anaconda Server
Reference materials
On this page
For new users
For existing users
Anaconda Server (6.1.8)
Administering Anaconda Server
User management and configuration
Enabling two-factor authentication
Copy page
Copy page
Two-factor authentication(2FA) can be enabled in Keycloak using either Google Authenticator or the One-Time Password(OTP) tool FreeOTP.
For more background on OTPs, see Keycloak’s
documentation on OTP
.
For new users
Go to
Authentication
.
Navigate to the
Required Actions
tab.
Under
Configure OTP
, select
Default
.
For existing users
This should be done for every user that does not have an OTP configured.
Go to the user profile page.
Under
Required Field
, select
Configure OTP
.
Was this page helpful?
Yes
No
User roles and permissions
Okta integration using OpenID Connect Provider (OIDC)
Assistant
Responses are generated using AI and may contain mistakes.