Two-Factor Authentication on the EO-Lab Site Using a Mobile Application

This guide explains how to enable and use two-factor authentication (2FA) on the EO-Lab site using mobile apps such as FreeOTP. By following this tutorial, you’ll secure your account with Time-based One-Time Passwords (TOTP) generated on your smartphone.

What We Are Going to Cover

Introduction to Two-Factor Authentication (2FA)

Traditionally, online security relied on a combination of usernames and passwords. Most usernames are email addresses, and if an email address is breached, attackers may easily guess or retrieve the password too. Brute-force methods, cloud computing power, social engineering, and identity theft have made password-only systems increasingly vulnerable.

To counteract this, modern systems use two or more factors of authentication:

  • Something the user knows — e.g., a password or a security question.

  • Something the user has — e.g., a smartphone, token, or smart card.

  • Something the user is — e.g., biometric data like fingerprint or face scan.

On EO-Lab, two-factor authentication (2FA) requires:

  • Your username and password

  • A TOTP code generated by a mobile app

This article explains how to use a mobile device for 2FA. To use your computer for the same purpose, see: Two-Factor Authentication to EO-Lab site using KeePassXC on desktop.

We’ll refer to “mobile authenticator” as a generic term for any 2FA mobile app.

Authenticator App Comparison

Comparison of FreeOTP, Google Authenticator, and Microsoft Authenticator

Feature

FreeOTP

Google Authenticator

Microsoft Authenticator

Developer

Red Hat

Google

Microsoft

Cost

Free

Free

Free

Open Source

Yes

No

No

2FA Method

TOTP, HOTP

TOTP

TOTP, Push Notifications, Passwordless

Cloud Backup

No

No

Yes (encrypted)

Push Notifications

No

No

Yes (for Microsoft accounts)

Account Transfer

QR code export only

QR code export

Cloud sync

Customization

Limited

Limited

Rich naming, icons

Integration

Broad (TOTP/HOTP)

TOTP only

Best with Microsoft ecosystem

Security

High (offline, open-source)

High (offline)

High (biometric lock)

Biometric Lock

No

No

Yes

Multi-Device Sync

No

No

Yes

Usability

Minimalist

Simple

Feature-rich

You can use FreeOTP for Google accounts too. If you already use Google Authenticator, you may prefer to stick with it.

Common Issues with Mobile Authenticators

Caution

Losing your mobile device without recovery codes may lock you out permanently.

FreeOTP
  • No backup or sync

  • Manual reconfiguration for each account

Google Authenticator
  • No cloud backup

  • Vulnerable if phone/SMS is lost

Microsoft Authenticator
  • Best with Microsoft accounts

  • Cloud sync requires Microsoft account

In this tutorial, we’ll use FreeOTP.

Warning

If you lose access to QR codes or the mobile device, email support@cloudferro.com for recovery assistance.

Prerequisites

  1. Account

    You need a valid hosting account with Horizon access: https://cloud.fra1-1.cloudferro.com/auth/login/?next=/.

  2. Authenticator App on Your Phone

Platform Availability

App

FreeOTP

Google Authenticator

Microsoft Authenticator

Platforms

iOS, Android, F-Droid

iOS, Android

iOS, Android

Install the app according to your device’s platform guidelines.

Setting Up the Secret Code

Note

Setup is usually performed once; however, you’ll need to use the mobile app every time you log in.

The 2FA process relies on a shared secret — a 32-character base32 string used to generate TOTP codes.

There are two setup methods:

  • Scan a QR code — easier, but doesn’t reveal the secret.

  • Enter the secret manually — useful for automation or backups.

To begin setup:

QR code screen
Manual entry screen

Click Unable to scan? to reveal the secret string.

Option 1: Scan the QR Code

  1. Open FreeOTP

  2. Tap the plus (+) icon → tap QR code icon

  3. Scan the QR code

  4. A new TOTP entry will appear

QR code scan in FreeOTP

Note

Every page reload generates a new QR/secret — use it immediately or save securely.

Option 2: Enter the Secret Manually

Copy the key (e.g., GBLH AN3I JNBT EZ3T KAZE 6OCG JVLV OSJQ) and enter the values:

  • Type: TOTP

  • Algorithm: SHA1

  • Digits: 6

  • Interval: 30 seconds

Manual entry in FreeOTP

Replace jdoe@example.com and Example Inc with your details.

../_images/tfa-auth-11.png

Tap ADD TOKEN to save the entry.

../_images/tfa-auth-12.png

To get your 6-digit code, tap the entry:

../_images/tfa-auth-13.png

Logging Into the Dashboard with 2FA

  1. Visit https://tenant-manager.eo-lab.org/login

  2. Select EO-Lab from the drop-down

  3. Click Sign In

../_images/eefa_sign_regular_eo-lab.png
  1. Enter your TOTP code

../_images/eefa_restart_login_eo-lab.png

Open FreeOTP, get the code, and submit.

../_images/eefa_logged_in_eo-lab.png

Note

FreeOTP may auto-generate the code when it’s running in foreground.

Logging Into Horizon

Two ways:

Method 1: From Dashboard

Click on link FRA1-1 Horizon in the dashboard:

../_images/eefa_link_to_horizon_form_eo-lab.png

Method 2: Direct Link

Visit https://cloud.fra1-1.cloudferro.com/auth/login/?next=/ directly. You’ll be prompted to re-enter your 2FA code.

Either way, you get to this form:

../_images/eefa_go_to_horizon_eo-lab.png

Authenticate and enter the OpenStack Horizon interface:

../_images/eefa_load_horizon_eo-lab.png

What To Do Next

To use your computer for 2FA, see: Two-Factor Authentication to EO-Lab site using KeePassXC on desktop.

After logging in, you can activate OpenStack CLI access with your 2FA-enabled account: How to Activate OpenStack CLI Access to EO-Lab Cloud Using One- or Two-Factor Authentication