File tree Expand file tree Collapse file tree 1 file changed +1
-14
lines changed
content/vault/v1.21.x (rc)/content/docs/enterprise/mfa Expand file tree Collapse file tree 1 file changed +1
-14
lines changed Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ MFA in Vault can be of the following types.
2020- ** Time-based One-time Password (TOTP)** - If configured and enabled on a path,
2121 this would require a TOTP passcode along with Vault token, to be presented
2222 while invoking the API request. The passcode will be validated against the
23- TOTP key present in the identity of the caller in Vault. TOTP supports [ self-enrollment ] ( #self-enroll-mfa-totp ) .
23+ TOTP key present in the identity of the caller in Vault.
2424
2525- ** Okta** - If Okta push is configured and enabled on a path, then the enrolled
2626 device of the user will get a push notification to approve or deny the access
@@ -43,19 +43,6 @@ MFA methods are globally managed within the `System Backend` using the HTTP API.
4343Please see [ MFA API] ( /vault/api-docs/system/mfa ) for details on how to configure an MFA
4444method.
4545
46- ## Self-enroll MFA TOTP
47-
48- The TOTP method supports self-enrollment so users can generate their own QR codes without admin assistance.
49-
50- ``` text
51- $ vault write sys/mfa/method/totp/my_self_enroll_totp \
52- issuer=Vault \
53- period=30 \
54- key_size=30 \
55- algorithm=SHA256 \
56- enable_self_enrollment=true
57- ```
58-
5946## MFA methods in policies
6047
6148MFA requirements on paths are specified as ` mfa_methods ` along with other ACL
You can’t perform that action at this time.
0 commit comments