Two-Factor Authentication (2FA) for cPanel & WHMCS

Verified Knowledge
Quick Summary: 2FA requires both your password and a code from your phone (using Google Authenticator or Authy) to log in. This prevents attackers from accessing your account even if they steal your password.
Why Password-Only Security is Dead
In 2026, AI-driven botnets can brute-force billions of passwords per hour. Sophisticated phishing attacks can trick even experienced users into revealing their credentials. Two-Factor Authentication (2FA) makes those stolen passwords useless.
Step 1: Enable 2FA in cPanel
- Log in to cPanel.
- Search for Two-Factor Authentication in the Security section.
- Click "Set Up Two-Factor Authentication."
- Scan the QR code with your mobile app (Google Authenticator, Authy, or Bitwarden).
- Enter the 6-digit code and click "Configure."
Step 2: Enable 2FA in WHMCS (If you are a Reseller)
As an admin selling hosting, your account is even more critical.
- Log in to WHMCS Admin.
- Go to Setup > Staff Management > Two-Factor Authentication.
- Choose "Time Based One Time Password" (TOTP).
- Individual staff members can now enable 2FA in their "My Account" settings.
Recovery Codes: Don't Lose Them!
When you enable 2FA, the system will give you a list of "Recovery Codes." Write these down on paper. If you lose your phone or it breaks, these codes are the ONLY way to regain access to your hosting account without a long manual verification process with our support team.
The AmanaFlow Standard
At AmanaFlow, we strongly recommend 2FA for every user. It’s a free, 30-second setup that provides enterprise-grade protection for your digital business.
FAQ
Q: Can I use SMS for 2FA?
A: SMS is less secure than app-based 2FA as it can be vulnerable to "SIM Swapping" attacks. We always recommend app-based TOTP.
Q: Does it slow down my login?
A: It adds 5-10 seconds to the process, but the security peace of mind is worth every second.
More from Security
View Category
DDoS Attacks Explained: How AmanaFlow Keeps You Online
Learn about Distributed Denial of Service (DDoS) attacks and how our multi-terabit mitigation network ensures 100% uptime for your business.

SQL Injection: How to Audit and Fix Vulnerabilities
Protect your database from the most common web attack. Learn how SQLi works and how to prevent it using 'Parameterized Queries'.

Hardening your Linux Server: A DevSecOps Checklist
Going beyond default settings. A comprehensive guide to securing your Ubuntu or AlmaLinux server for production workloads.