Skip to content

Commit 7f83171

Browse files
committed
documentation: Add page on Multi-factor Authentication
1 parent 1ea4339 commit 7f83171

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
date: "2021-02-04T18:00:00+00:00"
3+
title: "Usage: Multi-factor Authentication (MFA)"
4+
slug: "multi-factor-authentication"
5+
weight: 15
6+
toc: false
7+
draft: false
8+
menu:
9+
sidebar:
10+
parent: "usage"
11+
name: "Multi-factor Authentication (MFA)"
12+
weight: 15
13+
identifier: "multi-factor-authentication"
14+
---
15+
16+
# Multi-factor Authentication (MFA)
17+
18+
Multi-factor Authentication (also referred to as MFA or 2FA) enhances security by requiring a time-sensitive set of credentials in addition to a password.
19+
If a password were later to be compromised, Gitea would still not allow a successful login and the account would remain secure.
20+
Gitea supports both TOTP (Time-based One-Time Password) tokens and FIDO-based hardware keys.
21+
22+
MFA can be configured within the "Security" tab of the user settings page.
23+
24+
## Using MFA
25+
26+
Enabling MFA on a user does affect how the Git HTTP protocol and the Gitea API can be used.
27+
These interfaces do not support MFA, and trying to use a password normally will no longer be possible whilst MFA is enabled.
28+
However, an access token can be generated within the "Applications" tab of the user settings page.
29+
This access token can be used as if it were a password in order to use these interfaces.
30+
31+
> **Warning** - By its very nature, an access token sidesteps the security benefits of MFA.
32+
> It must be kept secure and should only be used as a last resort.
33+
34+
Using Git over SSH is separate to the normal authentication process and will still function normally.

0 commit comments

Comments
 (0)