Re: otp resets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > * Could we require someone enter their password + token before accepting
> > the token? ie, they try and enroll, ipa adds it, they have to verify, if
> > they can't, it's removed?
>
> This is _very_ common in other implementations.

Yeah, but there is no API in IPA to do that (we did consider it when
writing the code).
I've been working on this issue yesterday, trying to find a
workaround, but my tests didn't give something usable. I've asked the
FreeIPA folks on IRC and they had no solution (but they had meetings,
so maybe later).
I've noticed that Christian proposed a possible (hackish) way of doing
it yesterday evening in the AAA channel, I'll try that on Monday.

> > * Could we add 'recovery codes' so if someone enrolls and it's
> > wrong/broken, they could use a code to login and add a new token and
> > remove the old broken one?
>
> Likewise!

Again, there is no API in IPA to do that. Christian suggested a
workaround where we could use a HOTP token to get a similar result,
however the user would still need to enroll the hotp token, so if they
can't enroll their TOTP or if it fails, there's little chance
enrolling the HOTP token will not fail as well.

> > 2. How can we verify identity on people who request the removal of their
> > last otp? Do we just tell them to make a new account?
> >
> > Random ideas:
> >
> > * If they are not in any groups, how about we just reset based on email?
> > * Or perhaps if they are not in any sysadmin* groups?
>
> I think packager groups should also not be reset just based on email.

I can log the creation of OTP tokens in Noggin, and we could maybe
decide that if you ask us to delete a token you've created in the last
20 minutes, we do it based on email?

> > * If they are Red Hat employees we can use the internal verify thing
>
> Yes. Is there a way we could extend something similar to non-RHers?

That would be interesting, how does it work? Can we replicate it in some way?

> > * We could use gpg signed email if there is a gpg key assigned to the
> > account.
> > * Could we use ssh key to verify them?

Like asking them to edit a file on people.fp.o? But I suppose not
everybody will have an ssh key either.

A.
_______________________________________________
infrastructure mailing list -- infrastructure@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to infrastructure-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/infrastructure@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux