sandstorm / neostwofactorauthentication
Installs: 11 036
Dependents: 0
Suggesters: 0
Security: 0
Stars: 12
Watchers: 10
Forks: 8
Open Issues: 4
Type:neos-package
Requires
- php: ^7.4 | ^8.0
- chillerlan/php-qrcode: ^4.3
- neos/fusion: *
- neos/fusion-afx: *
- neos/fusion-form: *
- neos/neos: ^5.3 | ^7.0 | ^8.0
- spomky-labs/otphp: ^10.0
- dev-main
- 1.4.0
- 1.3.0
- 1.2.3
- 1.2.2
- 1.2.1
- 1.2.0
- 1.1.2
- 1.1.1
- 1.1.0
- 1.0.5
- 1.0.4
- 1.0.3
- 1.0.2
- 1.0.1
- 1.0.0
- dev-feature/add-creation-date-to-second-factor-and-default-sorting-in-backend-module
- dev-feature/show-otp-secret-code-when-creating-new-second-factor
- dev-30-allow-administrators-to-remove-last-otp-of-other-users
- dev-22-bug-unable-to-remove-user-with-existing-second-factor
- dev-feature-enforce-2fa
- dev-support-neos-8.0
This package is auto-updated.
Last update: 2024-10-26 18:01:21 UTC
README
Extend the Neos backend login to support second factors. At the moment we only support TOTP tokens.
Support for WebAuthn is planed!
What this package does
Screen.Recording.2022-02-08.at.17.07.59.mov
This package allows all users to register their personal TOTP token (Authenticator App). As an Administrator you are able to delete those token for the users again, in case they locked them self out.
Settings
Enforce 2FA
To enforce the setup and usage of 2FA you can add the following to your Settings.yaml
.
Sandstorm: NeosTwoFactorAuthentication: # enforce 2FA for all users enforceTwoFactorAuthentication: true
With this setting, no user can login into the CMS without setting up a second factor first.
In addition, you can enforce 2FA for specific authentication providers and/or roles by adding following to your Settings.yaml
Sandstorm: NeosTwoFactorAuthentication: # enforce 2FA for specific authentication providers enforce2FAForAuthenticationProviders : ['Neos.Neos:Backend'] # enforce 2FA for specific roles enforce2FAForRoles: ['Neos.Neos:Administrator']
Issuer Naming
To override the default sitename as issuer label, you can define one via the configuration settings:
Sandstorm: NeosTwoFactorAuthentication: # (optional) if set this will be used as a naming convention for the TOTP. If empty the Site name will be used issuerName: ''
Tested 2FA apps
Thx to @Sebobo @Benjamin-K for creating a list of supported and testet apps!
iOS:
- Google Authenticator (used for development) ✅
- Authy ✅
- Microsoft Authenticator ✅
- 1Password ✅
Android:
- Google Authenticator ✅
- Microsoft Authenticator ✅
- Authy ✅
How we did it
- We introduced a new middleware
SecondFactorMiddleware
which handles 2FA on a NeosSession
basis.- This is an overview of the checks the
SecondFactorMiddleware
does for any request:┌─────────────────────────────┐ │ Request │ └─────────────────────────────┘ ▼ ... middleware chain ... ▼ ┌─────────────────────────────┐ │ SecurityEndpointMiddleware │ └─────────────────────────────┘ ▼ ┌───────────────────────────────────────────────────────────────────┐ │ SecondFactorMiddleware │ │ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 1. Skip, if no authentication tokens are present, because │ │ │ │ we're not on a secured route. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 2. Skip, if 'Neos.Backend:Backend' authentication token not │ │ │ │ present, because we only support second factors for Neos │ │ │ │ backend. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 3. Skip, if 'Neos.Backend:Backend' authentication token is │ │ │ │ not authenticated, because we need to be authenticated │ │ │ │ with the authentication provider of │ │ │ │ 'Neos.Backend:Backend' first. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 4. Skip, if second factor is not set up for account and not │ │ │ │ enforced via settings. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 5. Skip, if second factor is already authenticated. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 6. Redirect to 2FA login, if second factor is set up for │ │ │ │ account but not authenticated. │ │ │ │ Skip, if already on 2FA login route. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ 7. Redirect to 2FA setup, if second factor is not set up for│ │ │ │ account but is enforced by system. │ │ │ │ Skip, if already on 2FA setup route. │ │ │ └─────────────────────────────────────────────────────────────┘ │ │ ┌─────────────────────────────────────────────────────────────┐ │ │ │ X. Throw an error, because any check before should have │ │ │ │ succeeded. │ │ │ └─────────────────────────────────────────────────────────────┘ │ └───────────────────────────────────────────────────────────────────┘ ▼ ... middlewares ...
- This is an overview of the checks the
When updating Neos, those part will likely crash:
- the login screen for the second factor is a hard copy of the login screen from the
Neos.Neos
package- just replaced the username/password form with the form for the second factor
- maybe has to be replaced when neos gets updated
- hopefully the rest of this package is solid enough to survive the next mayor Neos versions ;)
Why not ...?
Enhance the UsernamePassword
authentication token
This actually has been the approach up until version 1.0.5.
One issue with this is the fact, that we want the user to be logged in with that token via the
PersistedUsernamePasswordProvider
, but at the same time to not be logged in with that token as long as 2FA is
not authenticated as well.
We found it hard to find a secure way to model the 2FA setup solution when 2FA is enforced, but the user does not have a
second factor enabled, yet.
The middleware approach makes a clear distinction between "Logging in" and "Second Factor Authentication", while still being session based and unable to bypass.
Set the authenticationStrategy to allTokens
The AuthenticationProviderManager requires to authorize all tokens at the same time otherwise, it will throw an Exception (see AuthenticationProviderManager Line 181
if ($this->authenticationStrategy === Context::AUTHENTICATE_ALL_TOKENS) { throw new AuthenticationRequiredException('Could not authenticate all tokens, but authenticationStrategy was set to "all".', 1222203912); }
)
This leads to an error where the AuthenticationProviderManager
throws exceptions before the user is able to enter any
credentials. The SecurityEntryPointMiddleware
catches those exceptions and redirects to the Neos Backend Login, which
causes the same exception again. We get caught in an endless redirect.
The Neos Flow Security Documentation
suggests how to implement a multi-factor-authentication, but this method seems like it was never tested. At the moment of writing
it seems like the authenticationStrategy: allTokens
flag is broken and not usable.