Amir Zarrinkafsh
683c4a70bf
fix(web): improve 2fa enrollment process ( #1706 )
...
* refactor(web): improve 2fa enrollment process
This PR will change some of the wording and colours for the 2FA processes in order to provide more clarity and address some accessibility issues for end users.
The following is a summary of the changes:
* One-Time Password ⭢ Time-based One-Time Password
* Security Key ⭢ Security Key - U2F
![Screenshot_2021-02-02-09-36-17](https://user-images.githubusercontent.com/3339418/107138185-17656100-6967-11eb-8fac-9e75c7a82d09.png )
* QRCode ⭢ QR Code
![Screenshot_2021-02-07-05-07-25](https://user-images.githubusercontent.com/3339418/107138196-29df9a80-6967-11eb-811f-d77c9bb0159e.png )
* `Not registered yet?` text to display `Lost device?` if a user has already registered a device of said type
![Screenshot_2021-02-02-10-24-54](https://user-images.githubusercontent.com/3339418/107138205-395ee380-6967-11eb-8826-83e1438dd146.png )
* Change button and text colour in e-mails that Authelia generates
* Change Authelia email footer to be more security conscious
![Screenshot_2021-02-07-04-51-40](https://user-images.githubusercontent.com/3339418/107138211-4085f180-6967-11eb-890b-9d931bd1ce76.png )
The docs have also been updated to clarify the 2fa device enrollment limitation which only allows users to register one of each device type concurrently.
Closes #1560 .
2021-02-12 16:59:42 +11:00
James Elliott
365304a684
[FEATURE] Add Optional Check for Session Username on VerifyGet ( #1427 )
...
* Adding the Session-Username header to the /api/verify endpoint when using cookie auth will check the value stored in the session store for the username and the header value are the same.
* use strings.EqualFold to compare case insensitively
* add docs
* add unit tests
* invalidate session if it is theoretically hijacked and log it as a warning (can only be determined if the header doesn't match the cookie)
* add example PAM script
* go mod tidy
* go mod bump to 1.15
2020-12-02 10:03:44 +11:00
Clément Michaud
85933dd25d
Document future possibility to use alternative 1FA methods. ( #1000 )
2020-05-10 07:46:28 +10:00
James Elliott
b0b3d61954
[DOCS] Adjust yaml snippets and misc adjustments ( #855 )
...
* [DOCS] Adjust yaml snippets
* use two spaces
* use yaml syntax highlighting
* other misc uniformity changes
* fix misc grammar
* add responsible disclosure link
Co-Authored-By: Amir Zarrinkafsh <nightah@me.com>
2020-04-11 14:46:07 +10:00
Amir Zarrinkafsh
f3fd79d731
[DOCS] Review all docs and adjust since the initial refactoring ( #698 )
...
* [DOCS] Review all docs and adjust since the initial refactoring
* [DOCS] Minor tweaks
2020-03-10 09:37:46 +11:00
James Elliott
ffc87c1006
[DOCS] Fix Docs Links ( #674 )
...
- Fixed a few broken links
2020-03-01 16:58:26 +11:00
Clément Michaud
b5a9e0f047
[DOCS] Update links in README to reference docs.authelia.com. ( #667 )
...
* [DOCS] Update links in README to reference docs.authelia.com.
* Move report section of security to the top level page.
* Fix ordering of sub-pages of 2FA feature.
2020-03-01 00:27:23 +01:00
Clément Michaud
adf7bbaf5b
[DOCS] Bootstrap new documentation website based on just-the-docs ( #659 )
2020-02-29 01:43:59 +01:00