Skip to content
Welcome To Charanjit Cheema Blog

Welcome To Charanjit Cheema Blog

An Open Source and Cloud Blog

Menu
  • Home
  • About Me!
  • Way to my Technical Blog
  • Contact me
  • Privacy Policy
Menu

To Activate the Virtual MFA device authentication for AWS console access.

Posted on December 14, 2018 by Charanjit Cheema

Multi-Factor authentication (MFA) is an extra layer of security, it is a combination of more then one credentials which authenticates the user example combination of user password with security token (software or hardware based), using of biomatric verification for authenticating the user credentials. By adding extra layer in security it make difficult for unauthorised person to get access of confidential resources like compute devices, network or database. It is helpful in case if one layer get compromised the attacker still has at least one more barrier to breach before breaking into the target successfully.

AWS also provides many MFA authentication mechanism: Virtual MFA devices, U2F security key, Hardware MFA device and SMS text message-based MFA. Read more for these MFA authentication mechanism

This tutorial cover how to install and use the Virtual MFA device app for authenticating your AWS login user id on AWS console.

Note: For installing Virtual MFA device app you need smartphone or tablet. The Virtual MFA device app should be AWS supported MFA device app such as Google Authenticator, Authy 2-Factor Authentication (for iphone and Andriod) or Authenticator (for Windows phone) which generates six digit code for authentication on AWS console.

I am using Google Authenticator on my Android based smartphone in this tutorial.

Installing of Google Authenticator on Andriod phone:

  • Go to Google Play store search the Google Authenticator or aws mfa compatiable.

  • Tap Google Authenticator> Tap install.

 

To Activate Virtual MFA device authentication:

  • Login to AWS Management Console and access the IAM console at https://console.aws.amazon.com/iam/.
  • In the navigation pane, choose Users.
  • In the User Name list, choose the name of the intended MFA user.
  • Choose the Security credentials tab. Next to Assigned MFA device, choose Manage.

  • In the Manage MFA Device wizard, choose Virtual MFA device, and then choose Continue.

  • From the wizard, choose Show QR code, and then from your smartphone use the installed Google Authenticator app to scan the QR code (In Google Authenticator this option available as scan a barcode) as Google Authenticator use camera for scanning QR code hence it will ask for permission to access camera first time so provide the same. Once you are done, the virtual MFA device app will starts generating one-time passwords.

  • In the Manage MFA Device wizard, in the MFA code 1 box, type the one-time password that currently appears in the virtual MFA device. Wait up to 30 – 60 seconds for the device to generate a new one-time password. Then type the second one-time password into the MFA code 2 box. Choose Assign MFA.

Note: As code or OTP in Google Authenticator change in every minute you need to quickly put the code in request. You need to take backup of QR Code image or secret key in secure place so that in case of MFA Device App need to reinstall in your phone you can recover your MFA settings. If you lost the QR Code or Secret keys then you need to contact the AWS customer support team.

To testing the login authentication through Virtual MFA device app:

  • Login to your AWS account link with Account ID, IAM user name and password

  • In next page it will start asking you to put Multi-Factor authentication or MFA code generated on your Smartphone Google Authenticator App:

  • Click on Submit. Voila, you have now access of AWS console from your user account.

Reference Sources:
https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_virtual.html

Loading

  • Author
  • Recent Posts
Charanjit Cheema
Follow him
Charanjit Cheema
Charanjit is currently working as a Cloud Architect at Mphasis, with 17 years of experience in IT infrastructure projects, implementation, and support. While his main role is as a DevOps engineer, he holds a Cloud Architect position and has strong skills in cloud technologies and automation. His expertise includes Terraform, Ansible, AWS, Azure DevOps, Azure Cloud, VMware, and Linux systems.

Charanjit is passionate about automating tasks and improving processes. He uses tools like Terraform and Azure DevOps to build and manage cloud infrastructure and streamline deployment. He also enjoys using Shell scripts and Ansible playbooks to make systems run more efficiently.

In his free time, Charanjit enjoys learning about new technologies and sharing his knowledge through his blog. When he’s not working, he likes listening to music, having a cup of coffee, and relaxing in nature.

You can connect with Charanjit on Twitter, Facebook, LinkedIn, or email him at charanjit.cheema@cjcheema.com.
Charanjit Cheema
Follow him
Latest posts by Charanjit Cheema (see all)
  • How to optimize the performance of Ansible Automation Platform or Ansible Tower - July 16, 2023
  • How to fix code and text file linting errors with the help of Visual Studio Code - June 27, 2023
  • How to migrate existing WordPress blog from AWS EC2 instance to Amazon Lightsail - May 29, 2023

Like this:

Like Loading...

Related

2 thoughts on “To Activate the Virtual MFA device authentication for AWS console access.”

  1. Firoz Akhter says:
    December 14, 2018 at 2:34 pm

    This is Really Great blog, Which help me much more. I request to all you please refer this blog and grow your knowledge how to Multi Factor Authentication works.

    Loading...
    Reply
    1. Charanjit Cheema says:
      December 14, 2018 at 2:40 pm

      Thanks Firoz

      Loading...
      Reply

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Tags

AWS Cloud Computing Dockers Networking Open Networking OpenSource RHEL-CentOS SDN Server Hardware SLES tcpdump Ubuntu WSL

Follow me @

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2 other subscribers

Recent Posts

  • How to Deploy Docker Containers with NGINX on AWS EC2 Using Ansible and GitHub Actions
  • No More DynamoDB! Use Native S3 locking for Terraform State
  • How to Bring and Manage Manually Created AWS Resources Under Terraform Management
  • Iterating Cloud Resource Provisioning Using Terraform Count and For_Each Meta-Arguments
  • Terraform and Ansible Collaboration for AWS Cloud Deployment

Recent Comments

  1. Charanjit Singh on Terraform and Ansible Collaboration for AWS Cloud Deployment
  2. christinatodd2020aeaa798563 on Terraform and Ansible Collaboration for AWS Cloud Deployment
  3. Charanjit Singh on How to Set password policy in CentOS or RHEL system
  4. SAURABH on How to recover or rebuild initramfs in CentOS 7 Linux
  5. Sangita on How to Set password policy in CentOS or RHEL system

Archives

  • April 2025
  • February 2025
  • January 2025
  • August 2024
  • July 2024
  • June 2024
  • January 2024
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • September 2022
  • August 2022
  • July 2020
  • May 2020
  • February 2020
  • November 2019
  • June 2019
  • May 2019
  • March 2019
  • February 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • June 2018
  • May 2018
  • April 2018

Categories

  • Automation
  • Cloud Computing
  • Coding
  • CyberSecurity
  • Networking
  • OpenSource
  • RHEL-CentOS
  • Server Hardware
  • SLES
  • Technical Blog
  • Ubuntu
  • WSL

Blog Stats

  • 18,353 hits
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Home
  • About Me!
  • Way to my Technical Blog
  • Contact me
  • Privacy Policy
© 2025 Welcome To Charanjit Cheema Blog | Powered by Superbs Personal Blog theme
 

Loading Comments...
 

    %d