ATStatus
ATStatus WikiLoading documentation...

Two-Factor Authentication

Secure admin access with TOTP-based 2FA

Security

ATStatus supports Time-based One-Time Password (TOTP) two-factor authentication for admin accounts. When enabled, users must provide both their password and a code from their authenticator app to log in.

How It Works

1

Enable 2FA

Admin navigates to their profile settings and initiates 2FA setup

2

Scan QR Code

Scan the QR code with an authenticator app (Google Authenticator, Authy, etc.)

3

Verify Code

Enter the 6-digit code from your app to confirm setup

4

Save Recovery Codes

Store your backup recovery codes in a secure location

Compatible Authenticator Apps

Google Authenticator

iOS & Android

Authy

iOS, Android, Desktop

Microsoft Authenticator

iOS & Android

1Password

All platforms

Any TOTP-compatible authenticator app will work with ATStatus.

Enabling 2FA

Two-factor authentication must be enabled at the system level before users can set it up.

Environment Variable

ENABLE_2FA=true

Status Page Setting

enable2FA: true

Important

Once 2FA is enabled for a user, they cannot disable it without admin intervention. Make sure users save their recovery codes before enabling 2FA.

Account Recovery

If a user loses access to their authenticator app:

  • Recovery Codes - Use one of the backup codes provided during setup
  • Admin Reset - An admin with OWNER or ADMIN role can reset 2FA for the user
  • Database Reset - In emergencies, 2FA can be disabled directly in the database

Technical Implementation

Algorithm

TOTP (RFC 6238) with SHA-1 hash, 6-digit codes, 30-second window

Secret Storage

Encrypted at rest using application-level encryption

Recovery Codes

10 single-use codes generated at setup, hashed in database

Related Documentation