Lightweight MFA (TOTP) for Django Admin: enable/disable MFA directly from the admin, verify codes on login, and support "trusted devices" via secure cookies.
- 🔑 TOTP-based MFA for Django Admin (Google Authenticator, Authy, etc.)
- 🛠 Setup MFA from the admin panel (QR code + code entry)
- ❌ Disable MFA with code confirmation
- 💻 Trusted devices: skip MFA for up to N days
- ⚙️ Middleware-based enforcement for admin access
- 📦 Configurable via environment variables
- 🎨 Ready-to-use templates for verification and setup pages
pip install django-admin-otp
Add this code to settings.py
from django_admin_otp import settings as otp_settings
# settings.py
INSTALLED_APPS = [
# ...
"django.contrib.admin",
"django_admin_otp",
]
# Should be last middleware
MIDDLEWARE = [
# ...
"django_admin_otp.middleware.AdminOTPMiddleware",
]
...
# at the end of file
otp_settings.init()
Add urls
from django.contrib import admin
from django.urls import include, path
from django.conf import settings
urlpatterns = [
path("admin/", admin.site.urls),
path("admin-mfa/", include("django_admin_otp.urls")),
]
Export variables
export ADMIN_OTP_PROJECT_NAME "Your-project-name"
Run migrations and createsuperuser (if it hasn't created yet):
python manage.py migrate django_admin_otp
&
python manage.py createsuperuser
Run server
python manage.py runserver
Go to localhost:8000/admin/, login to panel and go to OTP Verifications panel
Click on 'Setup MFA for current user'
Scan QR and enter code from your app here. Click on submit.
If code is correct - MFA for your user would be set. You will be redirected to Django Auth Form (via logout).
Now you can start login process.
Login into admin panel. After success - you will see theese form.
Enter code to from your app and choose trust device option.
If would set - you can login from this device without MFA process. (stored in cookie).
It would worked for some time (see Configuration section).
Go to OTPVerification admin panel.
If you have already connected to MFA - the button would be "Disable MFA for Current user"
Click on it, enter code from your app and your mfa (with trusted devices) would be deleted.
Configurable environment variables:
-
ADMIN_OTP_PROJECT_NAME
- project name which would display in Auth APP. -
ADMIN_PATH
— admin URL prefix (default"admin"
). -
ADMIN_OTP_FORCE
(int) — require MFA setup for all admin users (default0
). SeeForce OTP
section for more details. -
ADMIN_OTP_TRUSTED_DEVICE_DAYS
— validity period for trusted devices (defaults30
days) -
ADMIN_OTP_DEVICE_TOKEN_COOKIE_NAME
— name of trusted device cookie (default"admin_otp_trusted_device"
).
This parameter change default setup mfa behavior. If is set, all users that tries to login into admin panel would be redirected to setup mfa process. Without set mfa - you wouldn't be able to login in admin panel.
How it goes:
After login you'll see this form
After setup mfa - you will be redirected on login to OTP process form
...
...