-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce 2FA for privileged accounts #6
Comments
Related: |
Rough idea:
Requiring a hardware key for the highest privilege group would prevent phishing. Most folks will never buy one though, so it’s important to not push it too hard. Maybe we give frequent contributors a coupon code so they can buy one on mercantile.w.org for the cost of shipping, or half price or something. |
To facilitate this, we may want to reorganize |
The upstream PR needs a good amount of work IMO, so in this case it might be better if we build those parts here for the MVP, and contribute them upstream later. So this would do 3 things:
|
Some of this belongs in later iterations IMO. Some of the underlying code probably needs to be in place (eg to avoid bypassing 2FA for accounts that have already enabled it), but 100% opt-in should be fine for the initial MVP release. |
👍🏻 I disabled the 2FA requirement in production environments in d00ba1b, and moved this issue to the Iteration 1 milestone.
d00ba1b made 2FA opt-in, but shouldn't prevent anyone from setting it up, or using it once it's enabled. |
Core/Meta committers, super-admins, project leaders, committers to plugins w/ > 50k active installs, etc should be required to use 2FA of some kind. How strict we are should depend on what kind of access they have.
capes.php
to make it easier to work withRelated:
The text was updated successfully, but these errors were encountered: