-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2FA Options #35
Comments
We can now do single-use codes. Will look at Yubikey at some point. For push-based services I'm thinking that we can do something like: When we reject an authentication request that requires 2fa, if there is a push-based method added to the account we can return a "supports push" header of some kind. The calling party (the frontend) can then call a If the push is approved generate a one-time-use temporary internal twofactorkey with a short expiry time and return the code to the user, they can then pass this through as the 2fa key for login. The temporary internal key can then be removed automatically after being used. This requires minimal changes to the auth flow then. |
Yubikey OTPs: |
More Authy Commits: mydnshost/mydnshost-frontend@838b2aa Probably not going to enable this any time soon, but the ground work is at least there for doing 2fapush stuff if I find something a bit less awful. |
2FA workflow sucks a bit.
I dislike having to pick up the phone, open authy, find the right app, then type the code. (Not a unique problem!)
It would be nice to support some other options:
The text was updated successfully, but these errors were encountered: