🎉 Announcing new lower pricing — up to 40% lower costs for Cloud Servers and Cloud SQL! Read more →


Two-factor authentication

This guide will take you through enabling two-factor authentication for your Brightbox user account.

Conventional username and password authentication is susceptible to password stealing, such as phishing attacks which trick a user into logging into a fake site and steal their credentials.

Two-factor authenticaton, also known as 2FA, protects you these kinds of issues by requiring an additional single-use code to log in, usually generated by an app on your phone.

You will need a Time-based One-Time Password (TOTP) generator such as Google Authenticator or FreeOTP.

Setup your two-factor application

Firstly, log in to Brightbox Manager as usual with your email address and password.

Then click the user menu up at the top right and select Two-factor Authentication.

Then click the Setup Two-factor Auth button and you’ll be presented with a QR barcode which you should scan with your TOTP generator app.

Scan the QR and a new entry should appear in your app labelled “Brightbox”. Tap the entry to get your first code, which will be a six digit number, and enter it into the box in Brightbox Manager and click Verify code.

Two-factor authentication is now enabled.

Save your backup codes

You’re now given five backup codes for use recovering access if you ever lose the ability to generate new one-time codes. Each backup code can be used only once and you cannot create any more of them, so once you’ve recovered access you should immediately reconfigure two-factor authentication with a new device.

This is the only time the backup codes are ever displayed to you, so note them down and store them securely, like you would a password.

Logging in with two-factor authentication

Different tools support two-factor authencation in different ways.

Native support

Tools that natively support two-factor will prompt you for your code explicitly.

Brightbox Manager and the Brightbox CLI natively supports two-factor authentication so after logging in as usual with your email and password you’ll then be prompted for your two-factor code before you can continue.

You’ll then only need to enter a new code if your session expires (usually a few hours) or after you explicitly log out.

Two-factor code in your password field

You can also provide your two-factor code up-front, as part of your password. This works with any existing tool that already works with Brightbox.

Enter your email address as your username as usual, then for the password enter your password with a two-factor code tagged on the end separated by a + character:

Email: wendy@example.com
Password: mypassword+123456

If the tool properly supports Brightbox OAuth authentication and caches the OAuth token, then you’ll only need to enter a code when your session expires (usually a couple of hours). Otherwise you’ll need to provide a new code every time you run the tool. That can be tiresome so instead you can use Temporary access tokens as your password.

Temporary access tokens

Temporary access tokens are randomly generated passwords for your user that expire after a couple of hours. You can use them in place of your password to login with any tool that doesn’t support two-factor authentication.

You can obtain a temporary access token using the Brightbox CLI:

$ brightbox token create --format=token


That token can then be used with other tools as the password:

Email: wendy@example.com
Password: dd02c7c2232759874e1c205587017b9d99d9ddee

Last updated: 17 Mar 2023 at 13:59 UTC

Try Brightbox risk-free with ÂŁ50 free credit Sign up takes just two minutes...