dxw / 2fa
WordPress plugin for 2 factor authentication (TOTP and SMS)
Installs: 19
Dependents: 0
Suggesters: 0
Security: 0
Stars: 6
Watchers: 21
Forks: 2
Open Issues: 7
Type:wordpress-plugin
Requires
- christian-riesen/otp: 1.*
- dxw/iguana: ^1.1
- endroid/qrcode: 1.5.0
- google/recaptcha: ~1.1
- twilio/sdk: 4.2.0
Requires (Dev)
- 10up/wp_mock: ^0.3.0
- dxw/phar-install: ^1.1
- friendsofphp/php-cs-fixer: ^2.14
- mockery/mockery: ^1.2
- peridot-php/leo: ^1.6
- peridot-php/peridot: ^1.19
- peridot-php/peridot-dot-reporter: ^1.0
- php-mock/php-mock-mockery: ^1.3
- dev-main
- v1.0.4
- v1.0.3
- v1.0.2
- v1.0.1
- v1.0.0
- dev-chore/migrate-to-php-8.3
- dev-dependabot/bundler/tests/nokogiri-1.16.5
- dev-renovate/configure
- dev-feature/add-dependabot-yml
- dev-bump-grunt-and-add-yarn-lock
- dev-fix/only-run-tests-once-mysql-ready
- dev-fix/update-nokogiri-cve-2020-26247
- dev-repo-audit/add-contributing-documentation
- dev-fix/tests
- dev-fix/add-license
- dev-feature/run-tests
- dev-feature/wp-cli
This package is auto-updated.
Last update: 2024-11-13 17:19:04 UTC
README
WordPress plugin for 2 factor authentication (TOTP and SMS)
Installation
At the moment this plugin must be installed on a multisite installation.
If you don't have a Twilio account, there's currently no way to hide SMS from the setup page.
To enable SMS authentication add these constants to your wp-config.php:
define('TWILIO_ACCOUNT_SID', 'AC...');
define('TWILIO_AUTH_TOKEN', '...');
define('TWILIO_NUMBER', '...');
You can find those here.
Usage
Super admins can decide which users must use 2FA. Users cannot opt to start using 2FA if it has not been enabled for their account.
Super admins can do this in two ways - setting an option on the user's profile to "enabled", or by checking the checkbox in the list of sites which forces all users of a site to use 2FA.
Users will then be forced to setup 2FA the next time they log in (it will not interrupt a user who is already logged in).
They have the option of using TOTP (apps like Google Authenticator) or SMS. And they can configure up to 2 devices (controlled by a constant).
Admins can also set the number of days users can skip requests for their second factor when logging in.
wp-cli command
% wp 2fa fails
% wp 2fa user alice
% wp 2fa reset bob
Tests
Unit tests and linter:
% composer install
% vendor/bin/peridot spec
% vendor/bin/php-cs-fixer fix --dry-run -v --diff
Integration tests:
% tests/run-with-docker.sh
Licence
MIT