Compare commits
1 commit
ccb6821e56
...
c8231193c9
| Author | SHA1 | Date | |
|---|---|---|---|
| c8231193c9 |
1 changed files with 2 additions and 2 deletions
|
|
@ -29,7 +29,7 @@
|
|||
- **Digits**: `6`
|
||||
- **Period**: `30` seconds
|
||||
- **Algorithm**: `sha512`
|
||||
- **Look ahead window**: `1–2`
|
||||
- **Look ahead window**: `1-2`
|
||||
- **Reusable token**: `off`
|
||||
|
||||
Click **Save**.
|
||||
|
|
@ -74,7 +74,7 @@ With this enabled, internal users without an OTP configured will be prompted to
|
|||
> This makes `browser-internal-otp` the default Browser flow, so **internal (local) users** who log in with username/password must use OTP.
|
||||
|
||||
**Important for external (Entra) users:**
|
||||
- Go to **Identity Providers → (Microsoft Entra)** and ensure **Post Login Flow / Post Broker Login Flow** is **None** (or a flow **without** OTP), so external users don’t get a Keycloak OTP prompt after IdP login.
|
||||
- Go to **Identity Providers → (Microsoft Entra)** and ensure **Post Login Flow / Post Broker Login Flow** is **None** (or a flow **without** OTP), so external users don't get a Keycloak OTP prompt after IdP login.
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue