Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Wiki Replica
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Cecylia Bocovich
Wiki Replica
Commits
9e4dcd61
Verified
Commit
9e4dcd61
authored
3 years ago
by
anarcat
Browse files
Options
Downloads
Patches
Plain Diff
don't disable 2fa, generate backup codes instead
parent
15f13f74
No related branches found
Branches containing commit
Tags
tbb-9.5a12-build1
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
service/nextcloud.md
+10
-12
10 additions, 12 deletions
service/nextcloud.md
with
10 additions
and
12 deletions
service/nextcloud.md
+
10
−
12
View file @
9e4dcd61
...
...
@@ -295,14 +295,15 @@ TODO
# How-to
##
Disabl
ing 2FA for another user
##
Reset
ing 2FA for another user
If someone manages to lock themselves out of their two-factor
authentication, they might ask you for help. First, you need to make
absolutely sure they are who they say they are. Typically, this
happens with an OpenPGP signature of a message that states the current
date and the actual desire to reset the 2FA mechanisms. For example, a
message like this:
authentication, they might ask you for help.
First, you need to make absolutely sure they are who they say they
are. Typically, this happens with an OpenPGP signature of a message
that states the current date and the actual desire to reset the 2FA
mechanisms. For example, a message like this:
-----BEGIN PGP SIGNED MESSAGE-----
...
...
@@ -317,7 +318,7 @@ This is to ensure that such a message cannot be "replayed" by an
hostile party to reset 2FA for another user.
Once you have verified the person's identity correctly, you need to
"impersonate" the user and
disable
their 2FA, with the following path:
"impersonate" the user and
reset
their 2FA, with the following path:
1.
log into Nextcloud
2.
hit your avatar on the top-right
...
...
@@ -330,8 +331,5 @@ Once you have verified the person's identity correctly, you need to
7.
hit the avatar on the top-right again
8.
select "Settings"
9.
on the left menu, select "Security"
10.
disabling 2FA can take many forms here, either:
*
uncheck the "Enable TOTP' checkbox, if checked
*
if a device is present, you can remove it
*
or, even better, generate new backup codes and send them
(encrypted, of course) to the user
10.
click the "regenerate backup codes" button and send them one of
the codes, encrypted
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment