Details
-
Feature Request
-
Resolution: Obsolete
-
Major
-
None
-
None
-
None
-
NEW
-
NEW
Description
Currently, Keycloak is limited to using Google Authenticator or FreeOTP as a two factor mechanism. There is some support for using a custom authenticator to implement alternative methods, but that lacks on UI aspects.
We should provide a number of enhancement to two factor authentication including:
- Ability to only ask for two factor mechanism every N days (trust machine option) (KEYCLOAK-242)
- Alternative/backup two factor mechanism to recover access and/or if user wants to regularly use alternative mechanisms (
KEYCLOAK-565) - Ability for admins to register two factor mechanisms for user (i.e. hardware tokens)
- Additional types built-in (i.e. SMS, email, printed backup codes, hardware tokens, Fido) (
KEYCLOAK-7159) - Ability for user to manage multiple mechanisms through account management console (
KEYCLOAK-565) - Configure OTP policy on authenticator and not on realm (
KEYCLOAK-1897)
Attachments
Issue Links
- is related to
-
KEYCLOAK-242 Trusted Device two factor authenticator
-
- Open
-
-
KEYCLOAK-847 Step-up Authentication
-
- Resolved
-
-
KEYCLOAK-188 Yubikey authenticator
-
- Closed
-
-
KEYCLOAK-240 Two factor authentication via email
-
- Closed
-
-
KEYCLOAK-241 Two factor authentication via SMS
-
- Closed
-
-
KEYCLOAK-1250 New Account Management Console
-
- Closed
-
-
KEYCLOAK-6270 Two factor authentication with backup codes
-
- Closed
-
-
KEYCLOAK-7159 W3C Web Authentication - Two Factor (preview)
-
- Closed
-
-
KEYCLOAK-1870 Support Hardware OTP Token Generators
-
- Closed
-
-
KEYCLOAK-1897 Support device / auth app specific OTP policy settings.
-
- Closed
-
-
KEYCLOAK-7957 Authentication by client source IP
-
- Closed
-
-
KEYCLOAK-7958 Require MFA only for a certain user group (or by condition in general)
-
- Closed
-
-
KEYCLOAK-565 Allow users to have multiple two factor authenticators
-
- Closed
-
-
KEYCLOAK-3540 Move Realm OTP policy to configuration options on OTP authenticator
-
- Closed
-