Skip to content

Feature: TOTP 2FA for SSH connection #5280

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
bartonip opened this issue Dec 4, 2022 · 8 comments
Closed

Feature: TOTP 2FA for SSH connection #5280

bartonip opened this issue Dec 4, 2022 · 8 comments
Labels
stale This issue is like stale bread.

Comments

@bartonip
Copy link
Contributor

bartonip commented Dec 4, 2022

It would be great if on connection to a coder mediated SSH session we could choose if logging on requires the input of a 2FA code.

Ideally the authenticator app would be set up when the user first logs on and then the same authenticator can be used to login to the coder web panel and also any ssh sessions.

This would also make it much easier to meet new data security compliance items in Australia.

@ghuntley
Copy link
Contributor

ghuntley commented Dec 5, 2022

This would also make it much easier to meet new data security compliance items in Australia.

This particular item caught my eye @bartonip - any specifics re: new data security compliance items? (medibank/optus or something else...)

@bartonip
Copy link
Contributor Author

bartonip commented Dec 5, 2022

This particular item caught my eye @bartonip - any specifics re: new data security compliance items? (medibank/optus or something else...)

@ghuntley Our core product deals with health data and more and more of the gov agencies we deal with have new compliance items on source control and dev environment access as part of their conformance/compliance process.

@OffensiveBias-08-145
Copy link

There is the potential for this to be solved under a U2F FIDO2 implementation.

This would also benefit the use of pre-generated SSH keys stored on devices such as YubiKeys.

@bpmct
Copy link
Member

bpmct commented Feb 15, 2023

As a workaround, you can enforce 2FA in your identity provider + enforce short sessions with CODER_MAX_SESSION_EXPIRY and CODER_DISABLE_SESSION_EXPIRY_REFRESH. You can see these in coder-server --help.

With that being said, we are open to OSS contributions for Yubikey docs (#6226), webauthn support (#6170), or TOTP. We'd love to eventually focus on this, but have no concrete plans on our roadmap.

Additionally, if you have a strong requirement for one of these before you can adopt Coder, we'd like to hear from you since that can influence our roadmap: coder.com/contact.

@bartonip
Copy link
Contributor Author

Ironically I can't enforce 2FA in my IdP because of issue #4505. Some of our accounts were registered before we set up OIDC and now we are stuck with password only authentication.

@OffensiveBias-08-145
Copy link

Hey @bpmct

Currently in contact with Michael on your sales team.

The ideal use case would to be able to use the PGP and PIV stored on the Yubikey within each VM.

These are then used for mTLS, Tailscale, commit signing, etc.

@github-actions
Copy link

This issue is becoming stale. In order to keep the tracker readable and actionable, I'm going close to this issue in 7 days if there isn't more activity.

@github-actions github-actions bot added the stale This issue is like stale bread. label May 17, 2023
@OffensiveBias-08-145
Copy link

Sure thing!

Shoot me an email!

@github-actions github-actions bot removed the stale This issue is like stale bread. label May 18, 2023
@github-actions github-actions bot added the stale This issue is like stale bread. label Nov 14, 2023
@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Nov 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
stale This issue is like stale bread.
Projects
None yet
Development

No branches or pull requests

5 participants