Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] U2F / Security Keys / General 2FA improvements #1281

Open
hikaru-shindo opened this issue Sep 28, 2024 · 1 comment
Open

[Feature] U2F / Security Keys / General 2FA improvements #1281

hikaru-shindo opened this issue Sep 28, 2024 · 1 comment

Comments

@hikaru-shindo
Copy link

Is your feature request related to a problem? Please describe.
Currently some admin functions require 2FA authentication. The only options available are Email and TOTP Authenticator Apps.
Some people use Security Keys and U2F (Universial Two Factor) for added ease of use and security, but this is currently not supported.

Describe the solution you'd like

  • Support U2F as a valid 2FA mechanism
  • It should also be possible to configure multiple 2FA mechanisms (be it security keys, TOTP Authenticator devices, ...)
    • This allows for a backup to be configured in case one device (mobile phone, security key, ...) is lost
  • When activating 2FA a set of backup codes should be printed

Describe alternatives you've considered
There is currently only the possibility of adding ONE TOTP authenticator OR email for 2FA - this hardly is an alternative ;)

Additional context

U2F is defined as part of the FIDO standards. More information can be found here: https://fidoalliance.org/specs/u2f-specs-master/fido-u2f-overview.html

@d00p
Copy link
Member

d00p commented Sep 28, 2024

This would lead to a major refactoring of the whole login process, maybe someone wants to get into it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants