mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 23:15:57 +03:00
[GH-ISSUE #503] MFA: Remember this device for 30 days #2257
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#2257
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @davidrudduck on GitHub (May 12, 2021).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/503
This may be a conscious decision to enforce MFA checks upon EVERY login.
It would be great to have the ability to 'remember' the device so it's quicker to get back into when you're always on the same device.
Tell me to STFU if this is never going to happen ;)
@fred5632 commented on GitHub (May 13, 2021):
I agree, this is a nuisance
@bradhawkins85 commented on GitHub (May 13, 2021):
This would be a really nice to have feature.
Would be good if the timeout was selectable though with options ranging from 1 hour to 30 days.
@saulens22 commented on GitHub (May 13, 2021):
A week sounds like a reasonable default for RMM tool
@frankemann commented on GitHub (May 13, 2021):
Even better would be a SSO with Azure Ad. We could then utilize Azure Ad Conditional Access based on our existing secutiry policies from ONE identity/device platform.
@davidrudduck commented on GitHub (May 13, 2021):
Maybe an option to set the timeout in hours, and you just do the math with the maximum value being 720 hours (30 days) or something?
@wh1te909 commented on GitHub (May 13, 2021):
yea the auth token is hardcoded now to 5 hours TTL, with auto refresh happening every 600 seconds so basically if you leave your browser open forever with trmm logged in you'll never be logged out.
I can move this into
local_settings.pyand then you can just set it to whatever you want.For now you can just edit
settings.pywhich is in/rmm/api/tacticalrmm/tacticalrmmand look for this sectiongithub.com/wh1te909/tacticalrmm@67cc37354a/api/tacticalrmm/tacticalrmm/settings.py (L108)and change the
(hours=5)to(days=30)or whatever you wantthen
sudo systemctl restart rmmfor changes to take effect. also log out and back in so token gets recreatednote
settings.pywill be overwritten on every rmm update butlocal_settings.pywill not so next release i'll move it but for now just try the above and lmk if works@davidrudduck commented on GitHub (May 13, 2021):
Ah-may-zing ❤️
@wh1te909 commented on GitHub (May 15, 2021):
released in 0.6.10 see https://wh1te909.github.io/tacticalrmm/functions/settings_override/ for instructions
@ventra007 commented on GitHub (Aug 16, 2022):
This link is dead. The new link is https://docs.tacticalrmm.com/functions/settings_override/