Oliver Günther
dff8cad504
|
6 years ago | |
---|---|---|
app | 6 years ago | |
config | 6 years ago | |
db/migrate | 7 years ago | |
lib | 6 years ago | |
spec | 7 years ago | |
.rubocop.yml | 7 years ago | |
.travis.yml | 6 years ago | |
Gemfile | 7 years ago | |
Gemfile.plugins | 7 years ago | |
README.md | 7 years ago | |
openproject-two_factor_authentication.gemspec | 7 years ago |
README.md
OpenProject Two-factor authentication plugin
Provides two-factor authentication.
Features
- Let users configure their 2FA devices (SMS to mobile phone, TOTP app-based authenticator) through their My Account
- Force users to have 2FA present on their accounts during login
Requirements
The OpenProject 2FA plugin requires the OpenProject Core to be in the same version as the plugin.
Installation
To install the OpenProject 2FA plugin you need to add the following line to the Gemfile.plugins
in your OpenProject folder (if you use a different OpenProject version than OpenProject 7, adapt :branch => "stable/7"
to your OpenProject version):
gem "openproject-two_factor_authentication", git: "https://github.com/opf/openproject-two_factor_authentication", :branch => "stable/7"
Afterwards, run:
bundle install
Setup
Enable the strategy of your choice through the configuration
totp
TOTP-based strategy for app-based authenticators such as Google Authenticator or Authy.
sns
Amazon SNS based strategy for delivery of SMS tokens. You need an active access key and secret to send SNS. To configure the strategies, use the following YAML code.
Enforcing users to have 2FA present
By default, this plugin enables users to add 2FA devices through their 'My account' page.
If you want all users of your instance to have 2FA enabled, set the enforced: true
configuration flag.
Then, all users will require to register a device to complete authentication / activation of their account. They also cannot delete their default device.
2fa:
active_strategies: [sns, totp]
enforced: false
sns:
region: 'eu-west-1'
access_key_id: 'aws key id'
secret_access_key: 'aws secret'
or set the ENV variables
OPENPROJECT_2FA_ACTIVE__STRATEGIES="[sns,totp]"
OPENPROJECT_2FA_ENFORCED="false"
OPENPROJECT_2FA_SNS_REGION="eu-west-1"
OPENPROJECT_2FA_SNS_ACCESS__KEY__ID="keyid"
OPENPROJECT_2FA_SNS_SECRET__ACCESS__KEY='secret'
Allowing remember-me functionality
Optionally, you can configure to remember the machine the user has logged in to for a number of days.
To do this, set the :allow_remember_for_days
configuration:
2fa:
active_strategies: [totp]
enforced: false
allow_remember_for_days: 30
This will allow the user to set a checkbox upon entering her OTP to store an encrypted cookie on the machine to identify the second factor for these number of days.
To configure via environment variables, set the following option
OPENPROJECT_2FA_ALLOW__REMEMBER__FOR__DAYS=30
Deinstallation
Remove the line
gem "openproject-two_factor_authentication", git: "https://github.com/opf/openproject-two_factor_authentication", :branch => "stable/7"
from the file Gemfile.plugins
and run:
bundle install
Bug Reporting
If you find any bugs, you can create a bug ticket at https://openproject.org/projects/two-factor-authentication
Development
To contribute, you can create pull request on the official repository at
https://github.com/opf/openproject-two_factor_authentication
Development
For development you only have to make sure that:
- The strategy is enabled in the configuration
2fa:
active_strategies: [developer]
or set the ENV variable OPENPROJECT_2FA_ACTIVE__STRATEGIES=[developer]
.