Using two-factor authentication (2FA) on your Private Cloud infrastructure
Find out how to enable the two-factor authentication to protect your infrastructure
Find out how to enable the two-factor authentication to protect your infrastructure
Last updated 10th June 2022
Having two-factor authentication activated helps to protect your Hosted Private Cloud infrastructure by reducing the risk of attacks (such as password theft).
This guide explains how to set up a second authentication method to protect your infrastructure.
In order to set up two-factor authentication, it is necessary to connect to the certified interface of your Private Cloud.
There are two possibilities for this:
Once connected to the management interface, click Change password
Within the interface, follow these steps:
Password and 2FA Shared Secret
,This creates a task and a token will be sent to you.
Go to the part Operation validation
, load the operation received by SMS, and confirm with the token received in the same SMS.
In case of a forgotten password, it is necessary to follow the "Password lost" procedure first, during which you will be offered to set up the 2FA.
You can now log in to your web client via its normal URL to arrive on this page:
It is now necessary to enter the token generated by the authentication application installed on your smartphone before you can sign in with your password.
Two-factor authentication will be activated when a user's password is changed. This means that if one user changes his password, all users will have 2FA enabled.
They will need to renew their password and then set up 2FA for their logins to be able to connect.
For customers with a version 6.0 infrastructure, access to the vSphere client (available only on Windows) will no longer be possible. They can access only with the vSphere web client.
When creating a new user, you now have the option of assigning or not assigning the role of token validator.
In both cases, it will be necessary to change the password through the "Certified interface" using the procedure outlined above in order to implement 2FA.
The only difference will be the user's autonomy in token validation.
Multiple third-party applications can be used that require connection to the vCenter. These applications must first be authorised through the vCenter access policy that is settable in your OVHcloud Control Panel.
These applications will then be able to access our infrastructures, but they will not necessarily handle two-factor authentication.
In this case, it will be necessary to create a whitelist to specifically bypass the 2FA.
This whitelist will be an addition to the main list of vCenter accesses.
To add your application's public IP addresses to this second whitelist, the following API calls will need to be used.
Join our community of users on https://community.ovh.com/en/.
Please feel free to give any suggestions in order to improve this documentation.
Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.
Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.
Thank you. Your feedback has been received.
Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.
Discuss with the OVHcloud community