Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow users to manage MFA devices with SSO MFA, but require WebAuthn for other MFA checks #46720

Open
Joerger opened this issue Sep 18, 2024 · 0 comments
Labels
c-dx Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements

Comments

@Joerger
Copy link
Contributor

Joerger commented Sep 18, 2024

Customer idea:

Would it be possible to scope in being able to enforce WebAuthn for actual MFA, but allow users to reset/delete/add new MFA devices by reauthenticating with SSO? We frequently get requests from people to delete their existing user metadata to reset MFA when new laptops are provided to users because the old Touch ID for example is not available. It would be nice if a user could reset their Touch ID with on-time SSO.

Making this default behavior doesn't make sense in cases where we want to allow users to use SSO MFA for any MFA needs, so we'd need to add an option. For example:

second_factor_scopes:
  - scopes: [ admin_actions, session_mfa, ... ]
    second_factors: [ webauthn ]
  - scope: [ device_management ]
    second_factors: [ webauthn, sso ]

Related to RFD 155 - Scoped MFA and RFD 180 - SSO MFA

@Joerger Joerger added feature-request Used for new features in Teleport, improvements to current should be #enhancements c-dx Internal Customer Reference labels Sep 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c-dx Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements
Projects
None yet
Development

No branches or pull requests

1 participant