TOTPRadius : migrating from previous versions using full backup and restore functions
This option allows taking a full backup of the appliance, including users, hardware tokens, configuration, certificate and license* files. The backup can be restored on the TOTPRadius versions starting from 0.2.7. Administrative credentials, web access (username: admin) or ssh access (username: totpradius), are not included in this backup.
The function is located on the Export/Import page under Backup and Restore tab.

The file generated by "Download full backup" button will have t2bckp extension and will contain all settings, certificates, users and hardware tokens tables and is ready to fully migrate between appliances.
Migrating from previous versions
The full backup feature is introduced in version 0.2.7, however, we also prepared a patch that allows generating and downloading the full backup file from older versions. The steps are as shown below:
- Upload backup.php to /var/www/html/admin/ via SSH/SFTP (you can use WinSCP, FileZilla or any other client supporting SFTP)
- Navigate to http(s)://FQDN_OR_IP/admin/backup.php and click on "Download backup" button
- This will download a file with .t2bckp extension which you can use to restore the configuration on newer versions of TOTPRadius (>0.2.7)
The patch can be downloaded here.
- FIDO Security keys registrations (for versions older than 0.2.8)
- FIDO Security keys-based VPN sessions
- Oauth2 associations and sessions
- Slave appliance details
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
04-04-2026
Understanding FIDO User Verification Modes and the always_uv Setting
Token2 R3.3 and later FIDO2 keys enforce user verification by default with always_uv = true, improving security, though some platforms and apps like Windows 10, macOS, and certain legacy clients may fail to handle this override correctly.
05-03-2026
Introducing TOTPVault — self-hosted TOTP management for teams
Most TOTP apps work by distributing copies of the secret to every person who needs access — fine for personal accounts, but for shared service accounts it means MFA secrets scattered across people's phones with no clean way to revoke access when someone leaves.
21-12-2025
Android, NFC, and the Missing Piece of WebAuthn
For years, Android users have faced a frustrating limitation—Android does not support CTAP2 over NFC. This means no PIN verification and no discoverable credentials (passkeys) when using NFC, and therefore limited to simple U2F-style flows without user verification. That said, there finally seems to be a solution.