Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Force 2FA on every user #6774

Open
3 tasks
OpenNebulaSupport opened this issue Nov 5, 2024 · 0 comments
Open
3 tasks

Force 2FA on every user #6774

OpenNebulaSupport opened this issue Nov 5, 2024 · 0 comments

Comments

@OpenNebulaSupport
Copy link
Collaborator

Description
2FA is currently configured on a per user basis. The configuration is stored on the user template. If an admin tries to set the 2FA, a user could remove it by issuing a one.user.update call since the configuration resides on the user template. To prevent this, the 2FA config, could be set as restricted attr for users

USER_RESTRICTED_ATTR = "SUNSTONE/TWO_FACTOR_AUTH_SECRET"
USER_RESTRICTED_ATTR = "FIREEDGE/TWO_FACTOR_AUTH_SECRET"

however, this also prevents the user from setting 2FA on their own initially. Ideally, 2FA could be set on a global scale by the cloud admin as an auth policy.

Use case
To prevent users from disabling 2FA but also allowing them to enable it.

Progress Status

  • Code committed
  • Testing - QA
  • Documentation (Release notes - resolved issues, compatibility, known issues)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants