Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nextcloud/twofactor_u2f
🔑 U2F second factor provider for Nextcloud
https://github.com/nextcloud/twofactor_u2f
nextcloud security two-factor u2f
Last synced: 15 days ago
JSON representation
🔑 U2F second factor provider for Nextcloud
- Host: GitHub
- URL: https://github.com/nextcloud/twofactor_u2f
- Owner: nextcloud
- License: agpl-3.0
- Archived: true
- Created: 2016-08-26T08:59:17.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2023-11-10T16:14:41.000Z (about 1 year ago)
- Last Synced: 2024-09-30T02:41:59.625Z (4 months ago)
- Topics: nextcloud, security, two-factor, u2f
- Language: JavaScript
- Homepage: https://apps.nextcloud.com/apps/twofactor_u2f
- Size: 8.61 MB
- Stars: 112
- Watchers: 10
- Forks: 27
- Open Issues: 28
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: COPYING
Awesome Lists containing this project
README
# ⚠️ Deprecated ⚠️ U2F second factor provider for Nextcloud
⚠️ The U2F standard has been deprecated and therefore this app will be discontinued. The [Two-Factor WebAuthn](https://apps.nextcloud.com/apps/twofactor_webauthn) app can be used as a replacement. [Here](https://github.com/nextcloud/twofactor_webauthn#migration-from-two-factor-u2f) you can find migration instructions.
![Downloads](https://img.shields.io/github/downloads/nextcloud/twofactor_u2f/total.svg)
![Scrutinizer Code Quality](https://scrutinizer-ci.com/g/nextcloud/twofactor_u2f/badges/quality-score.png?b=master)
![JavaScript Coverage Status](https://coveralls.io/repos/github/nextcloud/twofactor_u2f/badge.svg?branch=master)![](screenshots/challenge.png)
# Requirements
In order to use this app for authentication, you have to use a browser that supports the U2F standard:* Brave Browser
* Chromium
* Google Chrome
* Microsoft Edge
* Mozilla Firefox
* Opera## Login with external apps
Once you enable U2F with Two Factor U2F, your applications (for example your GNOME app) will need to login using device passwords. Which can be managed in your security settings.Official aplications such as the Android or IOS clients and desktop clients can use much safer tokens to login. Apps will automatically redirect you to a browser window to login as usual.
## Development Setup
This app uses [composer](https://getcomposer.org/) and [npm](https://www.npmjs.com/) to manage dependencies. Use
```bash
composer install
npm install
npm run build
```or if you're using [Krankerl](https://github.com/ChristophWurst/krankerl)
```bash
krankerl up
```to set up a development version of this app.
## Supported devices
As this App implements the U2F standard,
Every device supporting U2F should work fine. The following devices are known to work:* [Google Titan Security Key](https://support.google.com/titansecuritykey/answer/9115487?hl=en)
* [GoTrust IdenKey](https://www.gotrustid.com/idem-key)
* [Nitrokey FIDO U2F](https://shop.nitrokey.com/shop/product/nitrokey-fido-u2f-20)
* [SoloKey](https://github.com/solokeys/solo)
* HW version 2.1V
* [Yubikey 4 & 5 Series](https://www.yubico.com/products/yubikey-5-overview/)