-
-
Notifications
You must be signed in to change notification settings - Fork 5.8k
[docs] Add page on Multi-factor Authentication #14572
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 2 commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
--- | ||
date: "2021-02-04T18:00:00+00:00" | ||
title: "Usage: Multi-factor Authentication (MFA)" | ||
slug: "multi-factor-authentication" | ||
weight: 15 | ||
toc: false | ||
draft: false | ||
menu: | ||
sidebar: | ||
parent: "usage" | ||
name: "Multi-factor Authentication (MFA)" | ||
weight: 15 | ||
identifier: "multi-factor-authentication" | ||
--- | ||
|
||
# Multi-factor Authentication (MFA) | ||
|
||
Multi-factor Authentication (also referred to as MFA or 2FA) enhances security by requiring a time-sensitive set of credentials in addition to a password. | ||
If a password were later to be compromised, Gitea would still not allow a successful login and the account would remain secure. | ||
Gitea supports both TOTP (Time-based One-Time Password) tokens and FIDO-based hardware keys. | ||
|
||
MFA can be configured within the "Security" tab of the user settings page. | ||
|
||
## MFA Considerations | ||
|
||
Enabling MFA on a user does affect how the Git HTTP protocol can be used with the Git CLI. | ||
This interface does not support MFA, and trying to use a password normally will no longer be possible whilst MFA is enabled. | ||
If SSH is not an option for Git operations, an access token can be generated within the "Applications" tab of the user settings page. | ||
This access token can be used as if it were a password in order to allow the Git CLI to function over HTTP. | ||
|
||
> **Warning** - By its very nature, an access token sidesteps the security benefits of MFA. | ||
> It must be kept secure and should only be used as a last resort. | ||
|
||
The Gitea API supports providing the relevant TOTP password in the `X-Gitea-OTP` header, as described in [API Usage](https://docs.gitea.io/en-us/api-usage). | ||
This should be used instead of an access token where possible. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. as api is for automation ... it's more secure to use a token than basic-auth + TOTP! you only have to make sure to name access token on creation properly and only use it for one thing! (CI, GitNex, ...) There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. so you can precicely add and remove access application level based ... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
did you mean Git CLI doesn't support MFA?