Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

improve the OTP experience #14

Open
roudger opened this issue Mar 2, 2019 · 5 comments
Open

improve the OTP experience #14

roudger opened this issue Mar 2, 2019 · 5 comments
Labels

Comments

@roudger
Copy link

roudger commented Mar 2, 2019

Using One Time Password to login seems mandatory for sufficient security.

But when you have to connect 15 times a day, it's tedious ...

It would be very convenient to be able to authorize the connection without OTP for x minutes or hours after a first connection on the same browser, as can be seen in most web applications that use OTP.

Thank you

@roudger
Copy link
Author

roudger commented Jun 30, 2019

it might be interesting to have an option to force all users to use 2-factor authentication for more security.
Thank you for this wonderful job!

@nuxsmin
Copy link
Member

nuxsmin commented Aug 18, 2019

Hello, sorry for the late reply...

I agree with you, the "reminder" feature will be implemented in next releases. The other one, I'll try to find out a solution in order to force users to use this kind of authentication. Be aware that the plugin architecture is loosely coupled with sysPass code base, because it depends on events to run the plugin's tasks, so is not easy to "force" users to enable this behavior.

Thanks for the feedback!

@roudger
Copy link
Author

roudger commented Aug 18, 2019

Hello,
Very good news !
Good luck to find a solution and many thanks

@IcebergTitanic
Copy link

Not sure if it is possible, but perhaps it would be helpful to allow for a different assignment of profile based on whether 2FA is enabled or not? Especially if it could be (optionally) automatic.

So for example, initial login for a user gives a non-privileged profile, but upon enabling 2FA successfully, the profile can be upgraded to a more privileged profile. And then if the user disables 2FA then it should automatically revert to the unprivileged profile. I know that sounds pretty involved, but it would really help this be really useful IMHO.

@roudger
Copy link
Author

roudger commented Sep 9, 2021

Hi,
Another small improvement: it would be useful if the password field was activated (focus) by default in order to avoid an additional click

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants