github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/aws/iam/AVD-AWS-0165/Management_Console.md (about)

     1  1. Get an MFA device such as one of the following. You can enable only one MFA device per AWS account root user or IAM user.
     2  
     3      - A virtual MFA device, which is a software app that is compliant with RFC 6238, a standards-based TOTP (time-based one-time password) algorithm. You can install the app on a phone or other device. For a list of a few supported apps that you can use as virtual MFA devices, see Multi-Factor Authentication
     4      - A FIDO security key with an AWS supported configuration, such as one of the FIDO2 devices discussed on the Multi-Factor Authentication page. 
     5      - A hardware-based MFA device, such as one of the AWS supported hardware token devices discussed on the Multi-Factor Authentication page.
     6  
     7  2. Enable the MFA device. For information about enabling each type of MFA device, see the following pages:
     8  
     9      - Virtual MFA device: See [Enabling a virtual multi-factor authentication (MFA) device (console)](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_virtual.html)
    10      - FIDO security key: See [Enabling a FIDO security key (console)](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_fido.html)
    11      - Hardware MFA device: See [Enabling a hardware MFA device (console)](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_physical.html)