Anaconda home page
6.8.0
Search...
⌘K
Ask AI
Pricing
Download
Download
Search...
Navigation
User management and configuration
Enabling two-factor authentication
Home
Getting Started
Tools
Package Security Manager
Data Science & AI Workbench
Reference
Package Security Manager (6.8.0)
Key Features
System requirements and environment preparation
Installing Package Security Manager
Administering Package Security Manager
Administrator guides
User management and configuration
Managing user access
User management
Roles and permissions
Establishing an LDAP connection
Configure realm email settings
Disabling brute force protection
Enabling two-factor authentication
Okta integration using OIDC
Github login integration
Configuring a proxy for outgoing Keycloak HTTP requests
Updating your SAML username attribute in Keycloak
Viewing user login activity
Updating your domain
Mirrors
Policies
Grafana monitoring
Artifact download report
Audit event export
Container logs
Setting proxy servers
Enable and configure SSL post installation
Common Vulnerabilities and Exposures (CVEs)
System metrics with Prometheus
Licenses
Automatically generating service accounts
Backup and restore
Upgrading Package Security Manager
Switching from Docker to Podman
Upgrading Postgres
Increasing artifact upload size limit
Uninstalling Package Security Manager
Using Package Security Manager
Team Notebooks
Reference materials
On this page
For all new users
For existing users
Package Security Manager (6.8.0)
Administering Package Security Manager
User management and configuration
Enabling two-factor authentication
Copy page
Copy page
Two-factor authentication (2FA) can be enabled in Keycloak using either Google Authenticator or the One-Time Password(OTP) tool FreeOTP.
For more background on OTPs, see
Keycloak’s documentation on OTP
.
For all new users
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Realm settings
from the left-hand navigation.
Select the
Themes
tab.
Open the
Account theme
dropdown menu and select
keycloak
from the list.
Click
Save
.
Select
Authentication
from the left-hand navigation.
Select the
Required actions
tab.
Find
Configure OTP
in the
Required actions
column, and toggle
Set as default action
to
ON
.
For existing users
This must be done for every user that does not have an OTP configured.
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Users
from the left-hand navigation.
Select a user from the list to view their profile page.
Open the
Required user actions
dropdown menu and select
Configure OTP
.
Click
Save
.
Was this page helpful?
Yes
No
Disabling brute force protection
Okta integration using OIDC
Assistant
Responses are generated using AI and may contain mistakes.