Reset Password
This page covers all methods for recovering access to Traefik Manager.
Method 1 - CLI reset (recommended)
This is the fastest method when you can exec into the container.
docker exec traefik-manager flask reset-passwordA new temporary password is printed to the terminal. On your next login you will be redirected to a forced password-change screen before you can access the dashboard.
INFO
Two-factor authentication is preserved by default. Your existing TOTP setup remains active.
Lost TOTP access
If you have also lost access to your TOTP authenticator app, add --disable-otp to reset both the password and 2FA in one step:
docker exec traefik-manager flask reset-password --disable-otpThis will:
- Generate a new temporary password and print it to the terminal
- Disable TOTP 2FA
- Require a password change on next login
After logging in, you can re-enable 2FA from Settings → Authentication → Enable 2FA.
Method 2 - Manual reset via manager.yml
Use this if you cannot exec into the container (e.g. the container won't start).
1. Open manager.yml in your config volume:
nano /path/to/traefik-manager/config/manager.yml2. Remove or blank the password hash and mark setup incomplete:
password_hash: ""
setup_complete: false3. Restart:
docker restart traefik-managerA new temporary password is auto-generated and printed to the logs:
docker compose logs traefik-manager | grep -A3 "AUTO-GENERATED"WARNING
Setting setup_complete: false will re-run the setup wizard after login. Your existing routes and settings are not affected - just complete the wizard again.
Method 3 - Pre-set a known password
If you want to set a specific known password instead of using the auto-generated one, generate a bcrypt hash and write it directly to manager.yml:
python3 -c "import bcrypt; print(bcrypt.hashpw(b'yournewpassword', bcrypt.gensalt()).decode())"Update manager.yml:
password_hash: "$2b$12$..."
must_change_password: false
setup_complete: trueRestart the container - no wizard, no forced change, log in immediately with the password you set.
See manager.yml reference for all available fields.
Two-factor authentication
Enable 2FA
- Settings → Authentication → Enable 2FA
- Scan the QR code with your TOTP app (Google Authenticator, Authy, 1Password, etc.)
- Enter the 6-digit code to confirm - 2FA is now active
Disable 2FA (while logged in)
Settings → Authentication → Disable 2FA
No code is required - you are already authenticated.
Disable 2FA (locked out)
Use the --disable-otp flag with the CLI reset command shown above.