Note: FIDO U2F authentication is currently only available for the Chrome browser.
Warning for users in organizations that require two-factor authentication:
- If you're a member or outside collaborator to a private repository of an organization that requires two-factor authentication, you must leave the organization before you can disable 2FA on your GitHub Enterprise instance.
- If you disable 2FA you will automatically lose access to the organization and any private forks you have of the organization's private repositories. To regain access to the organization and your forks, re-enable two-factor authentication and contact an organization owner.
- You must have already configured 2FA via a TOTP mobile app.
- Ensure that you have a FIDO U2F compatible security key inserted into your computer.
- In the upper-right corner of any page, click your profile photo, then click Settings.
In the user settings sidebar, click Security.
Under two-factor authentication, click Edit.
Under Security keys, click Register new device.
- Type a nickname for the security key, then click Add.
- When prompted, touch your security key to have it authenticate against GitHub Enterprise.
- If you're authenticating to GitHub Enterprise on an Android phone, you can use your FIDO U2F compatible security key and Google Authenticator to sign into your account with Near Field Communication (NFC).
- Confirm that you've downloaded and can access your recovery codes. If you haven't already, or if you'd like you generate another set of codes, download your codes and save them in a safe place. If you lose access to your account, you can use your recovery codes to get back into your account. For more information, see "Downloading your two-factor authentication recovery codes."
After you've saved your recovery codes and enabled 2FA, we recommend you sign out and back in to your account. In case of problems, such as a forgotten password or typo in your email address, you can use recovery codes to access your account and correct the problem.