Anaconda home page
6.6.0
Search...
⌘K
Ask AI
Pricing
Download
Download
Search...
Navigation
User management and configuration
Enabling two-factor authentication
Home
Getting Started
Tools
Package Security Manager
Data Science & AI Workbench
Reference
Anaconda Server (6.6.0)
Key Features
Preparing Environment for Anaconda Server
Installing Anaconda Server
Administering Anaconda Server
Overview
User management and configuration
Overview
User management
Roles and permissions
Establishing an LDAP connection
Configure realm email settings
Enabling brute force protection
Enabling two-factor authentication
Okta integration using OpenID Connect Provider (OIDC)
Github login integration
Configuring a proxy for outgoing Keycloak HTTP requests
Updating your SAML username attribute in Keycloak
Viewing user login activity
Updating your domain
Mirrors
Grafana monitoring
Artifact report
Setting proxy servers
Enable and configure SSL post installation
Common Vulnerabilities and Exposures (CVEs)
System metrics with Prometheus
Licenses
Backup and restore
Upgrading Anaconda Server
Switching from Docker to Podman
Stopping and Uninstalling Anaconda Server
Using Anaconda Server
Team Notebooks
Reference materials
On this page
For all new users
For existing users
Anaconda Server (6.6.0)
Administering Anaconda Server
User management and configuration
Enabling two-factor authentication
Copy page
Copy page
Two-factor authentication (2FA) can be enabled in Keycloak using either Google Authenticator or the One-Time Password(OTP) tool FreeOTP.
For more background on OTPs, see
Keycloak’s documentation on OTP
.
For all new users
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Realm settings
from the left-hand navigation.
Select the
Themes
tab.
Open the
Account theme
dropdown menu and select
keycloak
from the list.
Click
Save
.
Select
Authentication
from the left-hand navigation.
Select the
Required actions
tab.
Find
Configure OTP
in the
Required actions
column, and toggle
Set as default action
to
ON
.
For existing users
This must be done for every user that does not have an OTP configured.
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Users
from the left-hand navigation.
Select a user from the list to view their profile page.
Open the
Required user actions
dropdown menu and select
Configure OTP
.
Click
Save
.
Was this page helpful?
Yes
No
Enabling brute force protection
Okta integration using OpenID Connect Provider (OIDC)
Assistant
Responses are generated using AI and may contain mistakes.