Compare commits
1 commit
ccb6821e56
...
c8231193c9
| Author | SHA1 | Date | |
|---|---|---|---|
| c8231193c9 |
1 changed files with 2 additions and 2 deletions
|
|
@ -29,7 +29,7 @@
|
||||||
- **Digits**: `6`
|
- **Digits**: `6`
|
||||||
- **Period**: `30` seconds
|
- **Period**: `30` seconds
|
||||||
- **Algorithm**: `sha512`
|
- **Algorithm**: `sha512`
|
||||||
- **Look ahead window**: `1–2`
|
- **Look ahead window**: `1-2`
|
||||||
- **Reusable token**: `off`
|
- **Reusable token**: `off`
|
||||||
|
|
||||||
Click **Save**.
|
Click **Save**.
|
||||||
|
|
@ -74,7 +74,7 @@ With this enabled, internal users without an OTP configured will be prompted to
|
||||||
> This makes `browser-internal-otp` the default Browser flow, so **internal (local) users** who log in with username/password must use OTP.
|
> This makes `browser-internal-otp` the default Browser flow, so **internal (local) users** who log in with username/password must use OTP.
|
||||||
|
|
||||||
**Important for external (Entra) users:**
|
**Important for external (Entra) users:**
|
||||||
- Go to **Identity Providers → (Microsoft Entra)** and ensure **Post Login Flow / Post Broker Login Flow** is **None** (or a flow **without** OTP), so external users don’t get a Keycloak OTP prompt after IdP login.
|
- Go to **Identity Providers → (Microsoft Entra)** and ensure **Post Login Flow / Post Broker Login Flow** is **None** (or a flow **without** OTP), so external users don't get a Keycloak OTP prompt after IdP login.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue