mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 06:55:52 +03:00
[GH-ISSUE #1870] Make users confirm their second factor before saving it #3111
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#3111
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sebvonhelsinki on GitHub (May 10, 2024).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/1870
Is your feature request related to a problem? Please describe.
When setting up 2FA, the user sees the the TOTP setup QR code and confirms with a click on "FINISH". When the user clicks on "FINISH", TacticalRMM saves the TOTP base code, without verifying that the user actually has it set up successfully on their end. If the user, for any reason, was not able to set up 2FA successfully, they are now locked out of their account since TacticalRMM asks for 2FA confirmation on the next login.
Describe the solution you'd like
After showing the user the TOTP secret code/QR code, before the user can confirm that they have set up MFA, the user should be required to enter the current TOTP code generated from the currently shown TOTP secret. Only after this confirmation should the 2FA settings for the user be updated.
To streamline this, the confirmation could look as follows:
Describe alternatives you've considered
No alternatives have come to mind.
Additional context
TacticalRMM is the first service I have encountered that activates 2FA without verifying that it actually works.