Releases: Bubka/2FAuth
v5.5.2
v5.5.1
Changed
- The Show next OTP user preference is enabled by default
Fixed
- issue #472 QR scan reader blocked by csp
v5.5.0
Announcement
Did you know that the 2FAuth official web browser extension has been released!?
The goal of this web extension is to offer an alternative way to interact with your 2FAuth server and to make 2FA account registration and OTP generation even easier and faster.
It's still in early (and beta) stage, but it's functional. For now, only OTP generation is supported, as well as the Search & Group features. Next step is to be able to capture QR codes in the browser pages. This will allow to register a 2FA account in 2FAuth during the 2FA enrollment process on the service website.
Feedback and bug reports (in this repository please) are very welcome.
Warning
This release drops PHP 8.2 support
Added
- It is now possible to define custom defaults for user preferences as well as to lock the preferences from being changed by users. This feature requires a bit of configuration, a dedicated page has been added to the documentation site to guide you through the process. (#413)
- A user preference to enable precalculation and display of the next OTP code.
Don't be surprised if you don't see the next code right after enabling this option, the code fades in slowly in order to maintain good readability of the current code. (#416) - New languages: Danish, Dutch, Italian, Korean, Portuguese (Brazilian)
Changed
- The version number has been removed from the footer and from the About page for unauthenticated users. (#432)
- 2FAuth now starts searching as soon as the user starts typing, without having to explicitly give focus to the search field. (#441)
Fixed
- issue #438 Sorting not working if "Service" is null
- issue #458 The
/up
route no longer creates sessions - issue #462 The check for new versions is no longer triggered whereas the Check for new version setting is disabled
- PR #455 Logo size overflow, by @BitSleek
- Multiple Race Condition in Group Management Feature. Credits to @bugdiscole
API [1.7.0]
- New
403
response for the PUT operation of path/api/v1/user/preferences/{name}
- New
409
response for the POST operation of path/api/v1/groups/{id}/assign
- New
locked
property in theuserPreference
model
v5.4.3
Fixed
- issue #408 Deleted icon is back after saving from the advanced form
- issue #417 Login page does not load after v5.4.1 update
- issue #418 Opening of the footer menu submits the advanced form
- issue #420 QR codes are cropped on small screens
- issue #421 Freeze when switching to Manage mode
- issue #423 Icon for accounts without an icon doesn't exist
Changed
- CSS styles are no longer loaded from tailwindcss.com in the
/up
view
v5.4.2
v5.4.1
Security release
- Fix XSS & SSRF vulnerabilities (thx to the XBOW team).
- Content Security Policy is now available and enable by default. CSP helps to prevent or minimize the risk of certain types of security threats.
If CSP is already enable on your server, you can set theCONTENT_SECURITY_POLICY
environment variable tofalse
to disable it at 2FAuth level.
v5.4.0
Changed
- The links in the footer (Settings, [Admin,] Sign out) have been replaced by the email address of the logged in user. Clicking on this email shows a navigation menu containing the links that were previously visible in the footer. The former display is still available if you don't like the new one, just uncheck the new Show email in footer user option in Settings. (#404)
Added
- Administrators can now configure 2FAuth to register 2FA icons in the database (see the new Store icons to database setting in the admin panel). When enabled, existing icons in the local file system are automatically registered in the database. These files are retained and then used for caching purposes only. 2FAuth will automatically re-create cache files if they are missing, so you only have to consider the database when backing up your instance. When disabled, 2FAuth will check that all registered icons in the database have a corresponding local file before flushing out the db icons table. (#364).
- The ability to export 2FA accounts as a list of otpauth URIs (#386).
Fixed
- Part of the content of some pages (such as the error page) could be hidden by the footer on small screens.
API [1.6.0]
- New
otpauth
query parameter for the GET operation of path/api/v1/twofaccounts/export
to force data export as otpauth URIs instead of the 2FAuth json format.
v5.3.2
Fixed
- issue #402 Error asking me to log out when using multiple devices, pressing back logs me in anyway
v5.3.1
Fixed
- issue #396 PROXY_HEADER_FOR_IP not working as intended
- issue #397 Base table or view not found: 1146 Table '2fauth.jobs' doesn't exist
- issue #399 Cannot set CACHE_DRIVER and SESSION_DRIVER to database
v5.3.0
Added
- The
/up
endpoint for health checks (#271). - A user preference to close the on-screen OTP after a predefined delay
- A user preference to automatically register a 2FA account immediately after a QR code scan. When enabled, there is no need to click the Save button anymore to save the account to the database.
- An admin setting to make SSO the only authentication method available (does not apply to admins). (#368).
- The ability to assign a 2FA account to a specific group directly from the advanced form (#372).
- A new Auth tab in the admin panel to gather settings related to authentication
- Proxy support for the OpenID connector (using
PROXY_FOR_OUTGOING_REQUESTS
), thanks to @rstefko (PR #367)
New env vars
A lot of new environment variables are available thanks to the Laravel 11 upgrade. They give more control over various features of the application:
ARGON_THREADS
: Number of threads that Argon2 will use to compute a hash.ARGON_TIME
: Maximum amount of time it may take to compute an Argon2 hash.ARGON_MEMORY
: Maximum memory (in kibibytes) that may be used to compute an Argon2 hash.DB_CHARSET
: The character set of the database.DB_COLLATION
: The collation of the database.HASH_DRIVER
: The hash algorithm used to hash user passwords.LOG_STACK
: The stack of log channels used when the log channel is set tostack
.LOG_DAILY_DAYS
: Number of log files to generate/rotate when using thedaily
log channel.LOG_SLACK_USERNAME
: The name of the user sending the log messages when using theslack
log channel.LOG_SLACK_EMOJI
: The Emoji code of the emoji used to illustrate log messages when using theslack
log channel.LOG_SYSLOG_FACILITY
: The syslog facility that provides a rough clue of where in a system the message originated.SESSION_TABLE
: Name of the table to be used to store sessions when using the databasesession
driver.SESSION_ENCRYPT
: Whether or not session data are encrypted before it is stored.
Please refer to the Configuration doc to find out when and how to use them.
Changed
- The Service data field is now encrypted in the database (#365).
- Upgrade to Laravel 11
Fixed
- issue #347 Sort with ignore case
- issue #349 "Show QR Code" feature returns wrong QR code
- issue #360 Can’t import QR Codes from Confluence 2FA
- issue #362 Cannot use SSO if app runs in subdirectory
API [1.5.0]
- New
group_id
property for POST and PUT operations of the/api/v1/twofaccounts
path