Post-Tyranny-Tech-Infrastru.../ansible/roles/authentik
Pieter 2d94df6a8a feat: Add automated 2FA/MFA enforcement for Authentik
Implements automatic configuration of 2FA enforcement via Authentik API:

**Features:**
- Forces users to configure TOTP authenticator on first login
- Supports multiple 2FA methods: TOTP, WebAuthn, Static backup codes
- Idempotent: detects existing configuration and skips update
- Fully automated via Ansible deployment

**Implementation:**
- New task file: ansible/roles/authentik/tasks/mfa.yml
- Updates default-authentication-mfa-validation stage via API
- Sets not_configured_action to "configure"
- Links default-authenticator-totp-setup as configuration stage

**Configuration:**
```yaml
not_configured_action: configure
device_classes: [totp, webauthn, static]
configuration_stages: [default-authenticator-totp-setup]
```

**Testing:**
 Deployed to dev server successfully
 MFA enforcement verified via API
 Status: "Already configured" (idempotent check works)

Users will now be required to set up 2FA on their next login.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2026-01-14 16:11:08 +01:00
..
defaults Add Authentik identity provider to architecture 2026-01-07 11:23:13 +01:00
files feat: Implement Authentik flow configuration via blueprints 2026-01-14 14:15:58 +01:00
handlers Add Authentik identity provider to architecture 2026-01-07 11:23:13 +01:00
tasks feat: Add automated 2FA/MFA enforcement for Authentik 2026-01-14 16:11:08 +01:00
templates fix: Resolve Authentik email delivery issues 2026-01-13 09:52:23 +01:00