Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow users to set up 2FA/TOTP for RPs that pass acr_values=AAL2 #589

Closed
shane-tomlinson opened this issue Oct 31, 2018 · 13 comments
Closed

Allow users to set up 2FA/TOTP for RPs that pass acr_values=AAL2 #589

shane-tomlinson opened this issue Oct 31, 2018 · 13 comments
Assignees

Comments

@shane-tomlinson
Copy link
Member

@shane-tomlinson shane-tomlinson commented Oct 31, 2018

Follow on from #6545.

If a user does not have TOTP enabled and the relier specifies acr_values=AAL2, the user is displayed a message that says This request requires two step authentication enabled on your account. but does not provide an easy way for the user to do so.

Over in mozilla/addons#732 (comment), @diox has requested that we make it possible for users to do so.

ref #6661
ref mozilla/fxa-auth-server#2708

┆Issue is synchronized with this Jira Task
┆Issue Number: FXA-735

@shane-tomlinson
Copy link
Member Author

@shane-tomlinson shane-tomlinson commented Nov 5, 2018

@shane-tomlinson to get more info from the AMO team about whether this is a blocker.

@vbudhram
Copy link
Contributor

@vbudhram vbudhram commented Nov 6, 2018

@ryanfeeley What are your thoughts on

Instead, we would need for them to be able to set it up directly in the same flow, so that they would be able to easily get back to AMO (logged in) once they are done.

The setup any security thing flow during a login flow sounds similar to security tune-up during login. It seems like there might be some overlapping features that could be used for both.

@rfk
Copy link
Member

@rfk rfk commented Nov 13, 2018

from mtg: @davismtl and @vbudhram to sync up on how to unblock this.

@vbudhram
Copy link
Contributor

@vbudhram vbudhram commented Nov 29, 2018

We have a meeting with AMO at all hands to help refine the next stages of this.

@shane-tomlinson
Copy link
Member Author

@shane-tomlinson shane-tomlinson commented Mar 20, 2019

ref #7069

@rfk
Copy link
Member

@rfk rfk commented Jun 27, 2019

It's been a while since we looked at this issue, so I just wanted to summarize the current state and next steps. A simple way to reproduce the underlying issue is as follows:

dead-end screen with error message

To proceed, the user has to open a new tab, go to their account settings, set up 2FA, then return to the original login flow and complete it.

This flow would be significantly improved if, rather than getting an error message, we took the user to a page where they can set up 2FA inline in the signin flow. From @vbudhram's experience implementing the initial version, it sounded like this could be a fairly complex bit of state management. It also depends on some UX input for details, although starting from the existing 2FA setup screen seems like a fine approach.

@shane-tomlinson shane-tomlinson changed the title Allow users to set up 2FA/TOTP for reliers that pass acr_values=AAL2 Allow users to set up 2FA/TOTP for RPs that pass acr_values=AAL2 Aug 2, 2019
@jaredhirsch jaredhirsch self-assigned this Aug 6, 2019
@ryanfeeley
Copy link
Contributor

@ryanfeeley ryanfeeley commented Aug 8, 2019

Could the user instead be redirected to account settings, with a message (modal or red bar) that says:

  • Accessing {replying party} requires you to have Two Step Authentication enabled on your account.
@rfk
Copy link
Member

@rfk rfk commented Aug 8, 2019

Could the user instead be redirected to account settings

This sounds similar to what we do right now (although we don't direct them straight to the settings page, we provide a "more information" link that they can follow to get to the settings page).

The desired experience here is to set up 2fa "inline" in the login flow, so that when the user is done they can easily continue with signing in to the requesting RP. It would be great to re-use the settings page for this, but it's not clear to me how we then direct the user back to their login flow.

@shane-tomlinson
Copy link
Member Author

@shane-tomlinson shane-tomlinson commented Sep 5, 2019

It would be great to re-use the settings page for this

I would be fearful that the user would get totally lost within the settings page by clicking around on other things.

@ryanfeeley
Copy link
Contributor

@ryanfeeley ryanfeeley commented Sep 9, 2019

I would be fearful that the user would get totally lost within the settings page by clicking around on other things.

Normal users yes, but not extension developers.

@shane-tomlinson
Copy link
Member Author

@shane-tomlinson shane-tomlinson commented Sep 10, 2019

Normal users yes, but not extension developers.

I'm not buying this assertion, and am very weary of adding special case logic within the settings page to redirect back to AMO.

@data-sync-user
Copy link
Collaborator

@data-sync-user data-sync-user commented Apr 23, 2020

➤ Jared Hirsch commented:

The separate issue for extracting the 2FA setup flow into mixins was an artificial distinction: I had to put the flow together to understand how to extract the code. Converted FXA-308 to a subtask of this issue. Reducing points for this issue down to 3 to reflect work remaining.

@data-sync-user
Copy link
Collaborator

@data-sync-user data-sync-user commented Apr 23, 2020

➤ Jared Hirsch commented:

This issue is really old and doesn't make it clear what work's left for this epic.

Closing in favor of https://jira.mozilla.com/browse/FXA-1750.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
9 participants