Post-Tyranny-Tech-Infrastru.../ansible/roles
Pieter 2d94df6a8a feat: Add automated 2FA/MFA enforcement for Authentik
Implements automatic configuration of 2FA enforcement via Authentik API:

**Features:**
- Forces users to configure TOTP authenticator on first login
- Supports multiple 2FA methods: TOTP, WebAuthn, Static backup codes
- Idempotent: detects existing configuration and skips update
- Fully automated via Ansible deployment

**Implementation:**
- New task file: ansible/roles/authentik/tasks/mfa.yml
- Updates default-authentication-mfa-validation stage via API
- Sets not_configured_action to "configure"
- Links default-authenticator-totp-setup as configuration stage

**Configuration:**
```yaml
not_configured_action: configure
device_classes: [totp, webauthn, static]
configuration_stages: [default-authenticator-totp-setup]
```

**Testing:**
 Deployed to dev server successfully
 MFA enforcement verified via API
 Status: "Already configured" (idempotent check works)

Users will now be required to set up 2FA on their next login.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2026-01-14 16:11:08 +01:00
..
authentik feat: Add automated 2FA/MFA enforcement for Authentik 2026-01-14 16:11:08 +01:00
common WIP: Ansible base configuration - common role (#2) 2025-12-27 14:00:22 +01:00
docker Complete Ansible base configuration (#2) 2025-12-27 14:13:15 +01:00
mailgun/tasks fix: Resolve Authentik email delivery issues 2026-01-13 09:52:23 +01:00
nextcloud fix: Increase Nextcloud wait timeout to 300s and make invitation flow non-blocking 2026-01-13 13:14:47 +01:00
traefik feat: Complete Authentik SSO integration with automated OIDC setup 2026-01-08 16:56:19 +01:00