Two Factor Authentication (2FA) for the Bitbucket app, gives the ability to enable 2FA for Bitbucket Server. Bitbucket Server is compatible with all Authenticator Apps. Here we will go through a guide to configure 2FA between Bitbucket and Google Authenticator. By the end of this guide, Bitbucket users should be able to log in and register to Bitbucket Software with the second factor of Authentication.
You can refer the steps to configure Two Factor Authentication (2FA) method with the Bitbucket from the video or documentation given below
To configure Two-Factor Authentication for Bitbucket, you need the following items:
Bitbucket should be installed and configured (supported version from Bitbucket Server 6.6.0).
Admin credentials are set up in Bitbucket.
Valid Bitbucket Server or Data Center License.
Download And Installation
Log into your Bitbucket instance as an admin.
Navigate to the settings menu and Click Manage Apps.
Click Find new apps or Find new add-ons from the left-hand side of the page.
Locate Two-factor Authentication(2FA) for Bitbucket, Bitbucket 2FA via search.
Click Try free to begin a new trial or Buy now to purchase a license for Two-factor Authentication(2FA) for Bitbucket.
Enter your information and click Generate license when redirected to MyAtlassian.
Click Apply license.
Step 1: Setup miniOrange 2-Factor Authentication
Navigate to Two Factor Settings tab.
Enable 2-Factor Authentication: For Enabling 2FA for users click on 'Enable the 2 Factor Authentication' for Bitbucket users & click on Save.
Enable Backup Method: For Enabling the Security Question or Backup Code as Backup Method in case of an emergency login, click on 'Enable Backup Method' and select 'Security Questions'(the User need to configure unique security questions) or 'Backup Code'(add-in will provide a set of one-time passcode)
Allowing 2-Factor Authentication for users: For enabling 2FA for users, navigate to 'User Management' tab, where you can see the list of all the active users, and all 2FA operations can be performed on these active users.
Note: 2FA for all the users is disabled by default, you need to manually enable 2FA for all the users.
2FA for Users: Enter the name of the user in the Search Bar for whom you want to perform the operation and hit the search button, the user with that name will appear. And then in the Action column, select the required Action.
2FA for Groups: Enter the name of the group in the Search Bar for which you want to perform the operation, and hit the search button, the group with that name will appear. And in the Action column, select the required Action.
Note: In future, if users get added to this group, 2FA will be enabled for them by default.
Step 2: How the user can Configure the 2FA
Welcome Message for users: The following screen will be shown to users after enabling 2FA for a particular user.
Configure the Mobile Authenticator app: Once the user clicks Next, the Mobile Authenticator setup screen will be shown. Where the user needs to scan the QR code or use the Secret Key and then enter the 6 digit OTP generated on mobile app.
Configure the Yubikey Hardware Token app: Prior to Yubikey Hardware Token configuration SSL needs to be set up on the Bitbucket instance. The below screen will be shown at the time of configuring Yubikey Hardware Token as a 2FA method. On this page the user needs to follow the steps shown in page.
When the Yubikey is successfully configured as a 2FA Authentication method, the below image will pop up.
Configure the Security Question as Backup Method: Once Mobile Authenticator is configured successfully & if the Security Question is activated, the user will see the screen below where the user needs to configure the Security Question based on his knowledge.
Configure the OTP Over Email: The below screen will be shown at the time of configuring OTP Over Email as a 2FA method where the user needs to provide the OTP which is sent on his email address. User can configure OTP Over Email as a Primary as well as Backup method to login into Bitbucket.
Configure the OTP Over SMS: In this method, users need to verify their identity by entering the OTP they receive via SMS on their registered mobile number. In order to use OTP over SMS as a 2FA method, an SMS gateway needs to be configured. You can either go with the miniOrange SMS Gateway or use your own Custom Gateway for sending OTPs. Refer to this document to configure the gateway.
The below screen will be displayed to the end-user while configuring OTP Over SMS, where the user first needs to enter their mobile number and then validate the OTP which is sent to his/her mobile number.
OTP Over SMS can be configured as a Primary as well as a backup method.
Configure the Backup Code as Backup Method: If the Backup Code is activated as a Backup Method, the user will see the screen below where the user will see the list of one-time passcode.
Step 3: Additional Features
Step 3.1: Brute Force Configuration
It is used for restricting the access to your Bitbucket Application based on the number of Invalid Login Attempts for the specified period of time. For enabling Brute Force Configuration, click on the 'Enable Brute Force Protection for Bitbucket' checkbox, then select the number of invalid login attempts after which user will lock, and the time for which the user will be in a locked state and won't get access to Bitbucket application
Step 3.2: Remember My Device
It allows the user to ignore the 2FA check when trying to log in from the same device. Enable the checkbox for 'Remember My Device' feature, and in 'Expiry Time (in Days)' section enter the number of days for which the remember my device settings will be saved.
Step 3.3: Mobile Authenticator Settings
Customized label can be given to the Authenticator app. Enter the 'Name' for your authenticator app in the text box.
Step 3.4: OTP Over Email Settings
Admin can customize his own Email template at the time of Sending OTP. Here he can also customize OTP length as well as OTP Expiry duration.
Step 4: User Management
2FA for Single User: Enter the name of the user in the Search Bar for whom you want to perform the operation and hit the search button, the user with that name will appear. And then in the Action column, select the required Action.
2FA for Multiple Users: Select the users, in the Bulk 2FA Action drop-down list select the action you want to perform. And then hit Apply Button.
2FA for All Users: In Bulk 2FA Action Dropdown list under All users Section select necessary Action and hit Apply Button.
2FA for Single Group: Enter the name of the group in the Search Bar for which you want to perform the operation and hit the search button, the group with that name will appear. And then in the Action column, select the required Action.
2FA for Multiple Groups: Select the Groups, in the Bulk 2FA Action drop-down list select the action you want to perform. And then hit Apply Button.
2FA for All Groups: In Bulk 2FA Action Dropdown list under All groups Section select necessary Action and hit Apply Button.
Step 5: IP Restrictions
IP Whitelisting: It is a security feature that is often used for trusted users who can directly log into Bitbucket without asking for 2FA. Enter the IP address and click save for enabling the IP whitelisting
IP Blocking: It is a basic access control mechanism that blocks access to Bitbucket Application based on the IP address. It will deny access for those IPs which are listed here. Enter the IP address in the text box for IP blocking. The message for this blocked users can be customized, enter the message in the 'Blocked User Message' text box and click on save button.
Step 6: Reconfigure 2FA
Reconfigure 2FA: For reconfiguring 2FA for end-user, navigate to User Profile click on Two-factor Authentication, you can see the Configure Two Factor(2FA) window, now click on Reset button to Reconfigure the Authenticator or Backup method.