General steps for enabling MFA devices - Amazon Identity and Access Management
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

General steps for enabling MFA devices

The following overview procedure describes how to set up and use MFA and provides links to related information.

Note

You can also watch this English-language video, How to Setup Amazon Multi-Factor Authentication (MFA) and Amazon Budget Alerts, for more information.

  1. Get an MFA device such as one of the following. You can enable up to eight MFA devices per Amazon Web Services account root user or IAM user of any combination of the following types.

  2. Enable the MFA device.

    • Virtual or Hardware TOTP tokens –You can use Amazon CLI commands or Amazon API operations to enable a virtual MFA device for an IAM user. You cannot enable an MFA device for the Amazon Web Services account root user with the Amazon CLI, Amazon API, Tools for Windows PowerShell, or any other command line tool. However, you can use the Amazon Web Services Management Console to enable an MFA device for the root user.

    • FIDO security keys – Root users and IAM users with FIDO security keys can enable from the Amazon Web Services Management Console only, not from the Amazon CLI or Amazon API.

    For information about enabling each type of MFA device, see the following pages:

  3. Enable Multiple MFA devices (recommended)

    • We recommend that you enable multiple MFA devices to the Amazon Web Services account root user and IAM users in your Amazon Web Services accounts. This allows you to raise the security bar in your Amazon Web Services accounts and simplify managing access to highly privileged users, such as the Amazon Web Services account root user.

    • You can register up to eight MFA devices of any combination of the currently supported MFA types with your Amazon Web Services account root user and IAM users. With multiple MFA devices, you only need one MFA device to sign in to the Amazon Web Services Management Console or create a session through the Amazon CLI as that user. An IAM user must authenticate with an existing MFA device to enable or disable an additional MFA device.

    • In the event of a lost, stolen, or inaccessible MFA device you can use one of the remaining MFA devices to access the Amazon Web Services account without performing the Amazon Web Services account recovery procedure. If an MFA device is lost or stolen, it should be disassociated from the IAM principal with which it is associated.

    • The use of multiple MFAs allows your employees in geographically dispersed locations or working remotely to use hardware-based MFA to access Amazon without having to coordinate the physical exchange of a single hardware device between employees.

    • The use of additional MFA devices for IAM principals allows you to use one or more MFAs for everyday usage, while also maintaining physical MFA devices in a secure physical location such as a vault or safe for backup and redundancy.

  4. Use the MFA device when you log in to or access Amazon resources. Note the following:

    • FIDO security keys – To access an Amazon website, enter your credentials and then tap the FIDO security key when prompted.

    • Virtual MFA devices and hardware TOTP tokens – To access an Amazon website, you need an MFA code from the device in addition to your user name and password.

      To access MFA-protected API operations, you need the following:

      • An MFA code

      • The identifier for the MFA device (the device serial number of a physical device or the ARN of a virtual device defined in Amazon)

      • The usual access key ID and secret access key

    Notes
    • You cannot pass the MFA information for a FIDO security key to Amazon STS API operations to request temporary credentials.

    • You cannot use Amazon CLI commands or Amazon API operations to enable FIDO security keys.

    • You cannot use the same name for more than one root or IAM MFA device.

For more information, see Using MFA devices with your IAM sign-in page.