Skip to content
Start In Cloud

Two-Factor Authentication

You have analytics data you don’t want anyone else accessing. A stolen password alone should never be enough to break in. HitKeep supports two second-factor methods: TOTP (time-based one-time passwords, compatible with any authenticator app) and Passkeys (WebAuthn, compatible with hardware security keys, Face ID, Touch ID, and Windows Hello). You can also generate recovery codes as one-time backup factors for account recovery.

HitKeep security settings — TOTP and WebAuthn Passkey setup
Settings → Security — TOTP authenticator app and hardware Passkey enrollment.

TOTP is compatible with Google Authenticator, Aegis, Bitwarden Authenticator, 1Password, and any RFC 6238-compliant app.

  1. Open Settings → Security in the HitKeep dashboard.
  2. Under Two-Factor Authentication, click Set up authenticator app.
  3. Scan the QR code with your authenticator app.
  4. Enter the 6-digit code displayed in your app to confirm.

TOTP is now active. On future logins you will be prompted for the current code after entering your password.

API reference:

Passkeys replace your password entirely with a cryptographic credential stored on your device. Supported authenticators include:

  • Hardware keys: YubiKey 5, FIDO2 USB keys
  • Platform authenticators: Apple Face ID / Touch ID, Android biometrics, Windows Hello
  1. Open Settings → Security in the HitKeep dashboard.
  2. Under Passkeys, click Add passkey.
  3. Follow your browser’s prompt to register your authenticator.

Once registered, you can log in by clicking Sign in with a passkey on the login page — no password needed.

HitKeep login page with password sign-in and passkey sign-in options
The login screen exposes passkey sign-in directly, so enrolled users can authenticate without typing a password first.

API reference:

Recovery codes are single-use backup codes for the case where you still know your password but no longer have your authenticator app or passkey device.

  1. Open Settings → Security in the HitKeep dashboard.
  2. Under Recovery codes, click Generate codes or Regenerate codes.
  3. Store the displayed codes immediately.
  4. Use Copy all or Download .txt to keep them somewhere safe.
  1. Enter your email address and password.
  2. On the MFA screen, choose Use recovery code.
  3. Enter one of your unused recovery codes.

Each recovery code can be used exactly once.

If another instance owner is still able to log in, they can reset MFA for a locked-out user from Administration → Users → Disable MFA. This is an online, owner-only action and is the preferred operator workflow for cloud deployments.

If no owner can log in, the offline CLI recovery command is still available as break-glass recovery:

Terminal window
hitkeep recover disable-2fa --email user@example.com

See the Recovery Guide for full details.

Prefer not to manage authentication infrastructure yourself? HitKeep Cloud → handles backups, security updates, and account recovery automatically.