-
Notifications
You must be signed in to change notification settings - Fork 397
[WIP] MSC2271 TOTP 2FA login #2271
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: old_master
Are you sure you want to change the base?
Conversation
Excellent. But a separate proposal for U2F/WebAuthn? |
Returns: `{"totp_key": "keyhere", "backup_keys": ["a", "b", "c"]}` | ||
|
||
`DELETE /_matrix/client/r0/user/{user_id}/totp` | ||
Remove TOTP from the account. Require password as a parameter (?) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Password and TOTP, I think.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Other services I've seen allow you to remove 2FA tokens without having to auth the 2FA (only requiring password for confirmation). Of course you do need to be logged in already.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think I've had the opposite experience, but can't name a service off-hand
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this endpoint should just require user interactive auth, like other security sensitive endpoints do. The server could then decide, if you need to provide the password, password+totp token, password+totp recovery key, or any other combination, just like the usual flows.
High level proposal for TOTP 2FA auth from @hawkowl
Rendered