You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en_US/multi-factor-authn/multi-factor-authentication.md
+11-11Lines changed: 11 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,16 @@ The goal of MFA is to ensure that even if someone obtains your password, they ca
25
25
26
26
MFA is disabled by default. To enable MFA for users, the administrator must configure the system to support MFA and set it up for individual users. Only users with [administrator privileges](../dashboard/system.md#users) can enable or disable MFA for other users.
27
27
28
+
### Enable MFA by Default for the Dashboard
29
+
30
+
To enable MFA for all Dashboard users by default, the administrator needs to configure the `dashboard.default_mfa` setting in the configuration file. This can be set to either `none` (to disable MFA) or `{mechanism: totp}` (to enable TOTP-based MFA).
31
+
32
+
Example configuration:
33
+
34
+
```bash
35
+
dashboard.default_mfa = {mechanism: totp}
36
+
```
37
+
28
38
### Enable MFA for Users via EMQX Dashboard
29
39
30
40
Administrators can enable MFA directly from the Dashboard by following these steps:
@@ -59,16 +69,6 @@ For more information on the role-based access control implementation of the REST
59
69
60
70
:::
61
71
62
-
#### Enable MFA for the Dashboard
63
-
64
-
To enable MFA for the entire Dashboard, the administrator needs to configure the `dashboard.default_mfa` setting in the configuration file. This can be set to either `none` (to disable MFA) or `{mechanism: totp}` (to enable TOTP-based MFA).
65
-
66
-
Example configuration:
67
-
68
-
```bash
69
-
dashboard.default_mfa = {mechanism: totp}
70
-
```
71
-
72
72
#### Enable MFA for a Specific User
73
73
74
74
To enable MFA for a specific user, the administrator can send a `POST` request to the `/users/{username}/mfa` API endpoint with the following request body:
@@ -115,4 +115,4 @@ After you've completed the initial setup, you can use the authenticator app to l
115
115
3.**Successful Login**:
116
116
If the code is valid, you will be logged into the Dashboard.
117
117
4.**Invalid Code**:
118
-
If the code is incorrect or expired, you will see an error message. In this case, you can try entering the current code from your authenticator app.
118
+
If the code is incorrect or expired, you will see an error message. In this case, you can try entering the current code from your authenticator app.
0 commit comments