The first enterprise-grade solution for Jira Two-factor authentication with U2F support

Jira 2FA (2 factor authentication) by Alpha Serve

2FA for Jira available in Data Center and Server versions

2FA for Jira: U2F & TOTP

Start your free trial of 2FA for Jira: U2F & TOTP now!
Enjoy a hassle-free and secure user login to Jira. 2FA for Jira: U2F & TOTP combines simplicity with a great user experience.

2FA for Jira: U2F & TOTP plugin is the first app that enables the use of U2F devices (Yubico Yubikey, NitroKey, TapID, Bluink Key, Feitian) together with a mobile device as key code generator.

Key Features

TOTP & U2F Support
Supports any mobile application, such as Google Authenticator, Microsoft Authenticator, 2STP, OTP Auth, Authy, and others. For U2F: use FIDO2/WebAuthn devices like Yubico Yubikey, NitroKey, TapID, Bluink Key, Feitian.
Flexible Settings
Get more from a variety of app Settings: Whitelist IP addresses / IP ranges, enable Brute Force defense, Force certain groups to enable MFA, allow to Remember devices for fast login.
Rich Access Logs
Track and analyze users’ activity, search by username, or IP address. Export Authentication logs to CSV, XLS/XLSX.

Pricing

Server
Starting from
$10
  • per year for 10 users
More Details
Data Center
Starting from
$450
  • per year for 50 users
More Details
2FA for Jira: U2F & TOTP
Learn more about 2FA for Jira app from the video demo
Try 2FA for Jira: U2F & TOTP now for free. Visit the Alpha Serve Marketplace page.

Some helpful links


One of the Most Effective Strategies to Improve the Security and Reliability of Your Atlassian Products

Online security is one of the primary concerns of every IT business. 2-factor authentication is one of the efficient ways to address data safety risks. You need more than a password to validate your identity while using 2FA and to access a device. It requires the second element (fido security key).

The number of cybercrimes is growing every year. While no one denies the fact, only 50% of businesses are using two-factor authentication to secure sensitive data.

Not sure which Scrum tool is the best for your project? Take a look at our list that includes top Scrum tools accompanied by brief functionality descriptions.