On 04/04/2022 10:21, Hugo Osvaldo Barrera via aur-general wrote:
On Sun, 3 Apr 2022, at 12:07, Ben Denhartog via aur-general wrote:
2) Use a proper password manager to store your OTPURI and generate the
tokens, as well as for storing your recovery codes. I'd recommend
gopass if GPG, self management, and VCS sounds appealing, and 1Password
if you'd rather have someone else handle the technicals.


Storing the password and the TOTP secret in the same password manager
moves both factors into the same store, kinda negating the point of using
two-factor.

3) WEB3 aims to provide such decentralized login based on some device
you control as you are saying you want. Whether or not it replaces the
current authentication model is another matter entirely.

So, something like a Yubikey using WebAuthN/FIDO? This is not uncommon
online, and very handy since the second factory is a fully-offline
device which requires a physical tap to log in. I see keycloak DOES
support this; maybe it's a matter of enabling it?

Our keycloak supports webauthn and TOTP and you can add multiple two factors. I myself have my both yubikeys (one backup) and phone configured (aegis). Keycloak is getting support for authenticaton codes which can be stored on paper (or encrypted usb stick). [1]

https://github.com/keycloak/keycloak/discussions/8518

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to