If you haven't already, install Dotkernel Admin.
The installation steps listed below should work similarly in any middleware-based application.
The first step is to include the package in your project by running this command:
composer require dotkernel/dot-totp
We will follow the Dotkernel file structure and create the files in the list below. If you follow the links from the main totp integration example, you can download the files and add them to your codebase.
You can use the trait at src/Core/src/App/src/Entity/TotpTrait.php in any entity where you need 2FA.
Make sure to migrate the new columns
totpSecret,totp_enabledandrecovery_codesin your entity.
There are still some code snippets in the _misc folder:
view-account.html.twig file or in a new page.src/Admin/src/RoutesDelegator.php file.config/pipeline.php file after $app->pipe(AuthMiddleware::class);.src/Admin/src/ConfigProvider.php file.Once you have dot-totp implemented, you can activate the feature in your admin accounts.
If you navigate to your profile from the top-right image in Dotkernel Admin, you should see this box.

Simply click on 'Enable TOTP' to begin the activation process.
We blurred out the QR code and recovery codes for this tutorial. You will receive dynamically generated versions that will be fully visible to you.
You will need to have an Authenticator app installed on your mobile device.

Follow the instructions on the screen:
The code refreshes every 30 seconds.
The TOPT activation flow will list several recovery codes you can use if your mobile device isn't available.

Each recovery code is usable only once.
Save the recovery codes in a secure location.
If the code is valid, you will be logged in, and TOTP will be activated for your account.
Whenever you need to log into the account, you will start by entering your username and password, like before. Since TOTP is activated, you will need to also submit the code from your Authenticator app. Alternatively, you can submit a recovery code.

That's it! You are now logged in securely.