Using Two-Factor Authentication
Red Hat Customer Portal 1
Using two-factor authentication to access your Red Hat user account
Abstract
This guide explains how to set up and remove two-factor authentication to access a Red Hat user account by using an authenticator application or recovery codes.
For information about the Red Hat SSO (RH-SSO) product, see Product Documentation for Red Hat Single Sign-On.