Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Two-factor authentication #106

Closed
snipe opened this issue Dec 2, 2013 · 8 comments
Closed

Two-factor authentication #106

snipe opened this issue Dec 2, 2013 · 8 comments
Assignees
Milestone

Comments

@snipe
Copy link
Owner

snipe commented Dec 2, 2013

Using Duo-Security, potentially other vendors.

Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.

@ardevd
Copy link

ardevd commented Jul 24, 2014

Google Authenticator support would be awesome.

@DanLockcuff
Copy link

Would love to see google auth as well.

@snipe snipe added the 👩‍💻 ready for dev These issues are ready for someone to work on them - take your pick! label Nov 4, 2014
@DWSR
Copy link

DWSR commented Aug 21, 2015

Azure MFA would be my vote, since you're already providing AD Integration. This would allow companies that are Federating AD and AAD to leverage this app very effectively.

@vermorel
Copy link

+1 for Google Auth, we would love this!

@snipe snipe removed the enhancement label Mar 26, 2016
@Profecy
Copy link

Profecy commented Apr 25, 2016

YubiKey might be handy as well!
Or at least generic OTP or maybe challenge-repsonse?

@davidking727
Copy link

Will this be in V3?

@snipe
Copy link
Owner Author

snipe commented Jun 13, 2016

@davidking727 no, not in v3

@snipe
Copy link
Owner Author

snipe commented Oct 29, 2016

FYI, I have a working version of this for Google Auth that I'm about to push up to dev. Need to add some additional settings and the ability for an admin to clear a secret key/enrollment status (for the case where a user has lost their phone, etc).

@snipe snipe added in progress and removed 👩‍💻 ready for dev These issues are ready for someone to work on them - take your pick! labels Oct 29, 2016
@snipe snipe self-assigned this Oct 29, 2016
snipe added a commit that referenced this issue Oct 29, 2016
* refactor to clean up LDAP login, and make the login method easier to handle.

* Login refactor cleanup

* Google 2FA package

* Adds Google Authenticator two-factor

* Removed unused blade

* Added optin setting in profile

* Removed dumb comments

* Made lock_passwords check more consistent

* Additional two factor strings

* Lock passwords check

* Display feature disabled text if in demo mode

* Two factor admin reset options

* Translation strings
@snipe snipe closed this as completed Oct 29, 2016
@snipe snipe removed the in progress label Oct 29, 2016
dmeltzer pushed a commit to dmeltzer/snipe-it that referenced this issue Nov 5, 2016
* refactor to clean up LDAP login, and make the login method easier to handle.

* Login refactor cleanup

* Google 2FA package

* Adds Google Authenticator two-factor

* Removed unused blade

* Added optin setting in profile

* Removed dumb comments

* Made lock_passwords check more consistent

* Additional two factor strings

* Lock passwords check

* Display feature disabled text if in demo mode

* Two factor admin reset options

* Translation strings
dmeltzer pushed a commit to dmeltzer/snipe-it that referenced this issue Nov 6, 2016
* refactor to clean up LDAP login, and make the login method easier to handle.

* Login refactor cleanup

* Google 2FA package

* Adds Google Authenticator two-factor

* Removed unused blade

* Added optin setting in profile

* Removed dumb comments

* Made lock_passwords check more consistent

* Additional two factor strings

* Lock passwords check

* Display feature disabled text if in demo mode

* Two factor admin reset options

* Translation strings
@ESWBitto ESWBitto mentioned this issue Mar 16, 2017
2 tasks
@rkayutkin rkayutkin mentioned this issue Jun 14, 2019
2 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants