Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[docs] Add page on Multi-factor Authentication #14572

Closed

Conversation

jamesorlakin
Copy link
Contributor

Whilst debating enforcing MFA within our team, I realised there isn't a lot of context to the side effects of enabling it. Most of us use Git over HTTP and would need to add a token.

I plan to add another PR that adds a sentence to the UI about needing to generate a token when enabling MFA if HTTP is to be used.

@jamesorlakin jamesorlakin force-pushed the feature/mfaDocumentationPage branch from c96b60c to 7f83171 Compare February 4, 2021 20:14
@jolheiser
Copy link
Member

The API can still be used with 2FA by setting the X-Gitea-OTP header.

The docs mention this in API Usage.

@GiteaBot GiteaBot added the lgtm/need 2 This PR needs two approvals by maintainers to be considered for merging. label Feb 4, 2021
@jamesorlakin
Copy link
Contributor Author

Aah yes, I didn't spot that! I guess this still applies for the Git CLI though?

@jolheiser
Copy link
Member

Yes, currently over HTTP/S you would need an app token (or SSH).

@6543 6543 added the type/docs This PR mainly updates/creates documentation label Feb 4, 2021
> It must be kept secure and should only be used as a last resort.

The Gitea API supports providing the relevant TOTP password in the `X-Gitea-OTP` header, as described in [API Usage](https://docs.gitea.io/en-us/api-usage).
This should be used instead of an access token where possible.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as api is for automation ... it's more secure to use a token than basic-auth + TOTP!

you only have to make sure to name access token on creation properly and only use it for one thing! (CI, GitNex, ...)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

so you can precicely add and remove access application level based ...

## MFA Considerations

Enabling MFA on a user does affect how the Git HTTP protocol can be used with the Git CLI.
This interface does not support MFA, and trying to use a password normally will no longer be possible whilst MFA is enabled.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

did you mean Git CLI doesn't support MFA?

@denyskon
Copy link
Member

@jamesorlakin Are you still interested in this PR? If so, could you update it, as we recently changed our documentation system? This would involve a new file location and some changes inside frontmatter.

@denyskon denyskon added issue/needs-feedback For bugs, we need more details. For features, the feature must be described in more detail giteabot/update-branch Hint for the bot that it should update a PR with the latest state on main labels Jul 31, 2023
@GiteaBot GiteaBot removed the giteabot/update-branch Hint for the bot that it should update a PR with the latest state on main label Aug 3, 2023
@pull-request-size pull-request-size bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Aug 3, 2023
@lunny
Copy link
Member

lunny commented Aug 4, 2023

Some contents are outdated, maybe we need to create a new PR or update this one.

@lunny lunny mentioned this pull request Aug 22, 2023
@lunny
Copy link
Member

lunny commented Aug 22, 2023

replaced by #26654

@lunny lunny closed this Aug 22, 2023
techknowlogick added a commit that referenced this pull request Aug 23, 2023
copy and modified from #14572 

> Whilst debating enforcing MFA within our team, I realised there isn't
a lot of context to the side effects of enabling it. Most of us use Git
over HTTP and would need to add a token.

I plan to add another PR that adds a sentence to the UI about needing to
generate a token when enabling MFA if HTTP is to be used.

---------

Co-authored-by: techknowlogick <techknowlogick@gitea.io>
Co-authored-by: silverwind <me@silverwind.io>
@GiteaBot GiteaBot mentioned this pull request Aug 23, 2023
GiteaBot pushed a commit to GiteaBot/gitea that referenced this pull request Aug 23, 2023
copy and modified from go-gitea#14572 

> Whilst debating enforcing MFA within our team, I realised there isn't
a lot of context to the side effects of enabling it. Most of us use Git
over HTTP and would need to add a token.

I plan to add another PR that adds a sentence to the UI about needing to
generate a token when enabling MFA if HTTP is to be used.

---------

Co-authored-by: techknowlogick <techknowlogick@gitea.io>
Co-authored-by: silverwind <me@silverwind.io>
techknowlogick added a commit that referenced this pull request Aug 23, 2023
Backport #26654 by @lunny

copy and modified from #14572 

> Whilst debating enforcing MFA within our team, I realised there isn't
a lot of context to the side effects of enabling it. Most of us use Git
over HTTP and would need to add a token.

I plan to add another PR that adds a sentence to the UI about needing to
generate a token when enabling MFA if HTTP is to be used.

Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: techknowlogick <techknowlogick@gitea.io>
Co-authored-by: silverwind <me@silverwind.io>
@go-gitea go-gitea locked as resolved and limited conversation to collaborators Nov 20, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
issue/needs-feedback For bugs, we need more details. For features, the feature must be described in more detail lgtm/need 2 This PR needs two approvals by maintainers to be considered for merging. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. type/docs This PR mainly updates/creates documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants