Multi-factor authentication
When a bucket is configured for object versioning, a developer can optionally configure
the bucket to require multi-factor authentication (MFA) for delete requests. Using MFA, a time-based
one time password (TOTP) token is passed as a key to the x-amz-mfa header. The
tokens are generated with virtual MFA devices like Google Authenticator, or a hardware MFA device
like those provided by Gemalto.
Use radosgw-admin to assign time-based one time password tokens to a user. You
must set a secret seed and a serial ID. You can also use radosgw-admin to list,
remove, and resynchronize tokens.
| Term | Description |
|---|---|
|
TOTP |
Time-based One Time Password. |
|
Token serial |
A string that represents the ID of a TOTP token. |
|
Token seed |
The secret seed that is used to calculate the TOTP. It can be hexadecimal or base32. |
|
TOTP seconds |
The time resolution used for TOTP generation. |
|
TOTP window |
The number of TOTP tokens that are checked before and after the current token when validating tokens. |
|
TOTP pin |
The valid value of a TOTP token at a certain time. |
Table: Terminology