Baby Community
Well-known member
nice app. It is also within Xenforo. I think the only plus of this application is xenforo is set to 30 days, I can reduce it to 1 week thanks to this application.
Ya... similar to how you setup a two-factor authenticator code. You choose to add a new security key to your account, and as part of that you can use your phone, computer, a YubiKey, etc. It's not something you just toggle on without you telling it what you want to use as your security key(s) and it somehow magically uses your phone for facial recognition.Right, I wasn't sure what setting in your add-on is triggering that as a second authentication. So, you add the phone as a device, not just the 'verification code.' Probably makes more sense when configuring it directly.
I think you are confused about what a security key is. XenForo does not support security keys normally. It supports using an authenticator app to generate codes (again, that is something totally different).nice app. It is also within Xenforo. I think the only plus of this application is xenforo is set to 30 days, I can reduce it to 1 week thanks to this application.
And while using an authenticator app for 2FA is a lot more secure than using SMS, using a physical security key is even better from a security standpoint.
thanksI think you are confused about what a security key is. XenForo does not support security keys normally. It supports using an authenticator app to generate codes (again, that is something totally different).
Why You Should Use a Physical Key to Sign Into Your Accounts
The benefits of two-factor authentication (2FA) are clear: A person trying to get into your accounts will need something else besides your username andgizmodo.com
Security keys use cryptography with public/private keys similar to how cryptocurrency is secured, they don't generate a changing number.
This is purely a cosmetic change that reworks how XenForo presents two-step verification options to users.
It changes this:
View attachment 269027
...to this:
View attachment 269028
If you are talking about the prompt to perform a two-step authentication after they log-in, it definitely shouldn’t be an option for them there if they have no keys setup. Is this something you are able to replicate yourself?Is there a way to disable the prompts for users who have not enabled this key type? We have users who are seeing this prompt when they should not be; perhaps an enrollment toggle or path?
If you are talking about the prompt to perform a two-step authentication after they log-in, it definitely shouldn’t be an option for them there if they have no keys setup. Is this something you are able to replicate yourself?
Cloudflare said:We confirmed that three Cloudflare employees fell for the phishing message and entered their credentials. However, Cloudflare does not use TOTP codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Since the hard keys are tied to users and implement origin binding, even a sophisticated, real-time phishing operation like this cannot gather the information necessary to log in to any of our systems. While the attacker attempted to log in to our systems with the compromised username and password credentials, they could not get past the hard key requirement.
xf_tfa_trust
cookie. Just like you can't be logged into 2 accounts at the same time, you also can't have two different cookie values at the same time. So even if xf_tfa_trust
is left when you log out, it would be overwritten with a new value when you log in as a different account and you use the trust option.We use essential cookies to make this site work, and optional cookies to enhance your experience.