Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command Side Authenticator (factors) #7314

Open
12 tasks
Tracked by #6433
hifabienne opened this issue Jan 30, 2024 · 3 comments
Open
12 tasks
Tracked by #6433

Command Side Authenticator (factors) #7314

hifabienne opened this issue Jan 30, 2024 · 3 comments

Comments

@hifabienne
Copy link
Member

hifabienne commented Jan 30, 2024

As a ZITADEL Administrator I want to be able to create add/manage/remove all different kind of authenticators to my users in regards of having user schemas.

Acceptance Criteria

  • Feature is behind a feature flag
  • AddAuthenticator: Adds an authenticator
    • webAuthNKey
    • One time password Email
    • One time password SMS
    • Time based one time password
    • When adding a new authenticator it is checked if that authentication method is allowed on the user schema
  • RemoveAuthenticator: Removes an existing authenticator
    • webAuthNKey
    • One time password Email
    • One time password SMS
    • Time based one time password

Questions to answer

Do we need to check if authentication method is allowed on the user schema or not?

Additional Information

Authenticators

  • username: human readable identifier of the user
    • username
  • password
  • webAuthNKey
  • one time password
    • email
    • phone
  • time based one time password
  • jwt profile key
  • identity provider
  • PAT
  • FUTURE: recovery code
@hifabienne
Copy link
Member Author

@stebenz @eliobischof Can you please estimate this issue?

@stebenz
Copy link
Collaborator

stebenz commented Mar 27, 2024

Estimation:

  • authenticator events: 1d
  • writemodels userschema allowed and exists: 0,5d
  • command side: 0,5d
  • unit tests for all types: 1d
  • API definitions in oneof message: 0,5d
  • integration tests: 1d

Summary: 4,5d

@hifabienne
Copy link
Member Author

@eliobischof @stebenz As discussed I split the issue into 3 parts (username/secret, factors, identity providers), can you please estimate them?
#7896
#7897

@hifabienne hifabienne changed the title Command Side Authenticator (all the different types) Command Side Authenticator (factors) May 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: 📝 Prioritized Product Backlog
Development

No branches or pull requests

3 participants