diff --git a/core/Command/TwoFactorAuth/Disable.php b/core/Command/TwoFactorAuth/Disable.php
new file mode 100644
index 000000000000..992ab409639d
--- /dev/null
+++ b/core/Command/TwoFactorAuth/Disable.php
@@ -0,0 +1,65 @@
+
+ *
+ * @copyright Copyright (c) 2016, ownCloud, Inc.
+ * @license AGPL-3.0
+ *
+ * This code is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License, version 3,
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License, version 3,
+ * along with this program. If not, see
+ *
+ */
+
+namespace OC\Core\Command\TwoFactorAuth;
+
+use OC\Authentication\TwoFactorAuth\Manager;
+use OC\User\Manager as UserManager;
+use OC\Core\Command\Base;
+use Symfony\Component\Console\Input\InputArgument;
+use Symfony\Component\Console\Input\InputInterface;
+use Symfony\Component\Console\Output\OutputInterface;
+
+class Disable extends Base {
+
+ /** @var Manager */
+ private $manager;
+
+ /** @var UserManager */
+ private $userManager;
+
+ public function __construct(Manager $manager, UserManager $userManager) {
+ parent::__construct('twofactorauth:disable');
+ $this->manager = $manager;
+ $this->userManager = $userManager;
+ }
+
+ protected function configure() {
+ parent::configure();
+
+ $this->setName('twofactorauth:disable');
+ $this->setDescription('Disable 2FA for a user');
+ $this->addArgument('uid', InputArgument::REQUIRED);
+ }
+
+ protected function execute(InputInterface $input, OutputInterface $output) {
+ $uid = $input->getArgument('uid');
+ $user = $this->userManager->get($uid);
+ if (is_null($user)) {
+ $output->writeln("Invalid UID");
+ return;
+ }
+ $this->manager->disableTwoFactorAuthentication($user);
+ $output->writeln("2FA disabled for user $uid");
+ }
+
+}
diff --git a/core/Command/TwoFactorAuth/Enable.php b/core/Command/TwoFactorAuth/Enable.php
new file mode 100644
index 000000000000..f1db53030fd7
--- /dev/null
+++ b/core/Command/TwoFactorAuth/Enable.php
@@ -0,0 +1,65 @@
+
+ *
+ * @copyright Copyright (c) 2016, ownCloud, Inc.
+ * @license AGPL-3.0
+ *
+ * This code is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License, version 3,
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License, version 3,
+ * along with this program. If not, see
+ *
+ */
+
+namespace OC\Core\Command\TwoFactorAuth;
+
+use OC\Authentication\TwoFactorAuth\Manager;
+use OC\User\Manager as UserManager;
+use OC\Core\Command\Base;
+use Symfony\Component\Console\Input\InputArgument;
+use Symfony\Component\Console\Input\InputInterface;
+use Symfony\Component\Console\Output\OutputInterface;
+
+class Enable extends Base {
+
+ /** @var Manager */
+ private $manager;
+
+ /** @var UserManager */
+ private $userManager;
+
+ public function __construct(Manager $manager, UserManager $userManager) {
+ parent::__construct('twofactorauth:enable');
+ $this->manager = $manager;
+ $this->userManager = $userManager;
+ }
+
+ protected function configure() {
+ parent::configure();
+
+ $this->setName('twofactorauth:enable');
+ $this->setDescription('Enable 2FA for a user');
+ $this->addArgument('uid', InputArgument::REQUIRED);
+ }
+
+ protected function execute(InputInterface $input, OutputInterface $output) {
+ $uid = $input->getArgument('uid');
+ $user = $this->userManager->get($uid);
+ if (is_null($user)) {
+ $output->writeln("Invalid UID");
+ return;
+ }
+ $this->manager->enableTwoFactorAuthentication($user);
+ $output->writeln("2FA enabled for user $uid");
+ }
+
+}
diff --git a/core/Middleware/TwoFactorMiddleware.php b/core/Middleware/TwoFactorMiddleware.php
index 5f03bd7649c8..863b2691606c 100644
--- a/core/Middleware/TwoFactorMiddleware.php
+++ b/core/Middleware/TwoFactorMiddleware.php
@@ -72,6 +72,10 @@ public function beforeController($controller, $methodName) {
if ($this->twoFactorManager->isTwoFactorAuthenticated($user)) {
$this->checkTwoFactor($controller, $methodName);
+ } else if ($controller instanceof TwoFactorChallengeController) {
+ // Allow access to the two-factor controllers only if two-factor authentication
+ // is in progress.
+ throw new UserAlreadyLoggedInException();
}
}
// TODO: force login if controller != LoginController
diff --git a/core/register_command.php b/core/register_command.php
index 01ec2e7f28e7..55b36dee1bbf 100644
--- a/core/register_command.php
+++ b/core/register_command.php
@@ -50,6 +50,14 @@
$application->add(new \OC\Core\Command\Integrity\CheckCore(
\OC::$server->getIntegrityCodeChecker()
));
+$application->add(new OC\Core\Command\TwoFactorAuth\Enable(
+ \OC::$server->getTwoFactorAuthManager(),
+ \OC::$server->getUserManager()
+));
+$application->add(new OC\Core\Command\TwoFactorAuth\Disable(
+ \OC::$server->getTwoFactorAuthManager(),
+ \OC::$server->getUserManager()
+));
if (\OC::$server->getConfig()->getSystemValue('installed', false)) {
diff --git a/lib/private/Authentication/TwoFactorAuth/Manager.php b/lib/private/Authentication/TwoFactorAuth/Manager.php
index 3d4cab46af73..a72e36686bda 100644
--- a/lib/private/Authentication/TwoFactorAuth/Manager.php
+++ b/lib/private/Authentication/TwoFactorAuth/Manager.php
@@ -26,6 +26,7 @@
use OC\App\AppManager;
use OCP\AppFramework\QueryException;
use OCP\Authentication\TwoFactorAuth\IProvider;
+use OCP\IConfig;
use OCP\ISession;
use OCP\IUser;
@@ -39,13 +40,18 @@ class Manager {
/** @var ISession */
private $session;
+ /** @var IConfig */
+ private $config;
+
/**
* @param AppManager $appManager
* @param ISession $session
+ * @param IConfig $config
*/
- public function __construct(AppManager $appManager, ISession $session) {
+ public function __construct(AppManager $appManager, ISession $session, IConfig $config) {
$this->appManager = $appManager;
$this->session = $session;
+ $this->config = $config;
}
/**
@@ -55,7 +61,26 @@ public function __construct(AppManager $appManager, ISession $session) {
* @return boolean
*/
public function isTwoFactorAuthenticated(IUser $user) {
- return count($this->getProviders($user)) > 0;
+ $twoFactorEnabled = ((int) $this->config->getUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 0)) === 0;
+ return $twoFactorEnabled && count($this->getProviders($user)) > 0;
+ }
+
+ /**
+ * Disable 2FA checks for the given user
+ *
+ * @param IUser $user
+ */
+ public function disableTwoFactorAuthentication(IUser $user) {
+ $this->config->setUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 1);
+ }
+
+ /**
+ * Enable all 2FA checks for the given user
+ *
+ * @param IUser $user
+ */
+ public function enableTwoFactorAuthentication(IUser $user) {
+ $this->config->deleteUserValue($user->getUID(), 'core', 'two_factor_auth_disabled');
}
/**
diff --git a/lib/private/Server.php b/lib/private/Server.php
index 153a7da5fc45..6f23eb50ef8b 100644
--- a/lib/private/Server.php
+++ b/lib/private/Server.php
@@ -279,7 +279,7 @@ public function __construct($webRoot, \OC\Config $config) {
});
$this->registerService('\OC\Authentication\TwoFactorAuth\Manager', function (Server $c) {
- return new \OC\Authentication\TwoFactorAuth\Manager($c->getAppManager(), $c->getSession());
+ return new \OC\Authentication\TwoFactorAuth\Manager($c->getAppManager(), $c->getSession(), $c->getConfig());
});
$this->registerService('NavigationManager', function ($c) {