Anaconda home page
latest
Search...
⌘K
Ask AI
Pricing
Download
Download
Search...
Navigation
Advanced admin guides
Enabling two-factor authentication
Home
Getting Started
Tools
Package Security Manager
Data Science & AI Workbench
Reference
Package Security Manager (On-Prem)
Key Features
System requirements and environment preparation
Install guides
Admin guides
User configuration
Mirrors
Policies
Common Vulnerabilities and Exposures (CVEs)
Licenses
Integrations
Advanced admin guides
Enabling two-factor authentication
Artifact download report
Audit event export
Automatically generating service accounts
Container logs
Switching from Docker to Podman
Updating your domain
Establishing an LDAP connection
System metrics with Prometheus
Upgrading Postgres
Setting proxy servers
Backup and restore
Configuring a proxy for outgoing Keycloak HTTP requests
Updating your SAML username attribute in Keycloak
Configure realm email settings
Enable and configure SSL post installation
Uninstalling Package Security Manager
Upgrading Package Security Manager
Increasing artifact upload size limit
Viewing user login activity
User guides
Troubleshooting
Frequently asked questions
Release notes
On this page
For all new users
For existing users
Package Security Manager (On-Prem)
Admin guides
Advanced admin guides
Enabling two-factor authentication
Copy page
Copy page
Two-factor authentication (2FA) can be enabled in Keycloak using either Google Authenticator or the One-Time Password(OTP) tool FreeOTP.
For more background on OTPs, see
Keycloak’s documentation on OTP
.
For all new users
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Realm settings
from the left-hand navigation.
Select the
Themes
tab.
Open the
Account theme
dropdown menu and select
keycloak
from the list.
Click
Save
.
Select
Authentication
from the left-hand navigation.
Select the
Required actions
tab.
Find
Configure OTP
in the
Required actions
column, and toggle
Set as default action
to
ON
.
For existing users
This must be done for every user that does not have an OTP configured.
Log in to the Keycloak administrative console
.
Navigate to the dev realm.
Select
Users
from the left-hand navigation.
Select a user from the list to view their profile page.
Open the
Required user actions
dropdown menu and select
Configure OTP
.
Click
Save
.
Was this page helpful?
Yes
No
JupyterHub FAQ
Artifact download report
Assistant
Responses are generated using AI and may contain mistakes.