debian-mirror-gitlab/doc/security/two_factor_authentication.md

173 lines
7.4 KiB
Markdown
Raw Normal View History

2019-09-04 21:01:54 +05:30
---
type: howto
2020-10-24 23:57:45 +05:30
stage: Manage
2022-04-04 11:22:00 +05:30
group: Authentication and Authorization
2021-02-22 17:27:13 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2019-09-04 21:01:54 +05:30
---
2019-09-30 21:07:59 +05:30
2021-11-11 11:23:49 +05:30
# Enforce two-factor authentication **(FREE SELF)**
2021-11-11 11:23:49 +05:30
Two-factor authentication (2FA) provides an additional level of security to your
users' GitLab account. When enabled, users are prompted for a code generated by an application in
addition to supplying their username and password to sign in.
2021-11-11 11:23:49 +05:30
Read more about [two-factor authentication (2FA)](../user/profile/account/two_factor_authentication.md)
2021-11-11 11:23:49 +05:30
## Enforce 2FA for all users
2021-01-29 00:20:46 +05:30
Users on GitLab can enable it without any administrator's intervention. If you
want to enforce everyone to set up 2FA, you can choose from two different ways:
2019-02-15 15:39:39 +05:30
- Enforce on next login.
- Suggest on next login, but allow a grace period before enforcing.
2021-06-08 01:23:25 +05:30
After the configured grace period has elapsed, users can sign in but
2021-09-04 01:27:46 +05:30
cannot leave the 2FA configuration area at `/-/profile/two_factor_auth`.
2019-09-04 21:01:54 +05:30
To enable 2FA for all users:
2021-11-11 11:23:49 +05:30
1. On the top bar, select **Menu > Admin**.
2021-09-04 01:27:46 +05:30
1. On the left sidebar, select **Settings > General** (`/admin/application_settings/general`).
2019-09-04 21:01:54 +05:30
1. Expand the **Sign-in restrictions** section, where you can configure both.
2021-01-29 00:20:46 +05:30
If you want 2FA enforcement to take effect during the next sign-in attempt,
change the grace period to `0`.
2016-04-02 18:10:28 +05:30
2021-11-11 11:23:49 +05:30
## Disable 2FA enforcement through rails console
Using the [rails console](../administration/operations/rails_console.md), enforcing 2FA for
all user can be disabled. Connect to the rails console and run:
```ruby
Gitlab::CurrentSettings.update!('require_two_factor_authentication': false)
```
## Enforce 2FA for all users in a group **(FREE)**
2016-04-02 18:10:28 +05:30
2021-11-18 22:05:49 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/merge_requests/24965) in GitLab 12.0, 2FA settings for a group are also applied to subgroups.
2021-06-08 01:23:25 +05:30
2021-11-11 11:23:49 +05:30
To enforce 2FA only for certain groups:
2016-04-02 18:10:28 +05:30
2021-09-04 01:27:46 +05:30
1. Go to the group's **Settings > General** page.
2022-03-02 08:16:31 +05:30
1. Expand the **Permissions and group features** section.
2021-11-18 22:05:49 +05:30
1. Select the **Require all users in this group to set up two-factor authentication** option.
2021-09-04 01:27:46 +05:30
You can also specify a grace period in the **Time before enforced** option.
2021-11-11 11:23:49 +05:30
To change this setting, you must be an administrator or owner of the group.
2019-09-04 21:01:54 +05:30
2017-08-17 22:00:37 +05:30
If you want to enforce 2FA only for certain groups, you can enable it in the
group settings and specify a grace period as above. To change this setting you
2021-11-11 11:23:49 +05:30
must be administrator or owner of the group.
2017-08-17 22:00:37 +05:30
2019-09-04 21:01:54 +05:30
The following are important notes about 2FA:
- Projects belonging to a 2FA-enabled group that
2019-09-30 21:07:59 +05:30
[is shared](../user/project/members/share_project_with_groups.md)
2019-09-04 21:01:54 +05:30
with a 2FA-disabled group will *not* require members of the 2FA-disabled group to use
2019-09-30 21:07:59 +05:30
2FA for the project. For example, if project *P* belongs to 2FA-enabled group *A* and
2019-09-04 21:01:54 +05:30
is shared with 2FA-disabled group *B*, members of group *B* can access project *P*
2019-09-30 21:07:59 +05:30
without 2FA. To ensure this scenario doesn't occur,
2021-04-17 20:07:23 +05:30
[prevent sharing of projects](../user/group/index.md#prevent-a-project-from-being-shared-with-groups)
2019-09-04 21:01:54 +05:30
for the 2FA-enabled group.
- If you add additional members to a project within a group or subgroup that has
2FA enabled, 2FA is **not** required for those individually added members.
- If there are multiple 2FA requirements (for example, group + all users, or multiple
2021-06-08 01:23:25 +05:30
groups) the shortest grace period is used.
2021-09-04 01:27:46 +05:30
- It is possible to disallow subgroups from setting up their own 2FA requirements:
1. Go to the top-level group's **Settings > General**.
2022-03-02 08:16:31 +05:30
1. Expand the **Permissions and group features** section.
2021-09-04 01:27:46 +05:30
1. Uncheck the **Allow subgroups to set up their own two-factor authentication rule** field.
This action causes all subgroups with 2FA requirements to stop requiring that from their members.
2017-08-17 22:00:37 +05:30
2021-11-11 11:23:49 +05:30
## Disable 2FA for everyone
2021-02-22 17:27:13 +05:30
WARNING:
2021-11-11 11:23:49 +05:30
Disabling 2FA for everyone does not disable the [enforce 2FA for all users](#enforce-2fa-for-all-users)
or [enforce 2FA for all users in a group](#enforce-2fa-for-all-users-in-a-group)
settings. You must also disable any enforced 2FA settings so users aren't asked to set up 2FA again
when they next sign in to GitLab.
2021-01-03 14:25:43 +05:30
There may be some special situations where you want to disable 2FA for everyone
2020-04-22 19:07:51 +05:30
even when forced 2FA is disabled. There is a Rake task for that:
2020-03-13 15:44:24 +05:30
```shell
2016-04-02 18:10:28 +05:30
# Omnibus installations
sudo gitlab-rake gitlab:two_factor:disable_for_all_users
2016-04-02 18:10:28 +05:30
# Installations from source
sudo -u git -H bundle exec rake gitlab:two_factor:disable_for_all_users RAILS_ENV=production
```
2021-02-22 17:27:13 +05:30
WARNING:
2021-06-08 01:23:25 +05:30
This is a permanent and irreversible action. Users have to
2019-09-04 21:01:54 +05:30
reactivate 2FA from scratch if they want to use it again.
2021-11-11 11:23:49 +05:30
## 2FA for Git over SSH operations **(PREMIUM)**
2021-02-22 17:27:13 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/270554) in GitLab 13.7.
2021-03-11 19:13:27 +05:30
> - [Moved](https://gitlab.com/gitlab-org/gitlab/-/issues/299088) from GitLab Free to GitLab Premium in 13.9.
2021-02-22 17:27:13 +05:30
> - It's [deployed behind a feature flag](../user/feature_flags.md), disabled by default.
> - It's disabled on GitLab.com.
> - It's not recommended for production use.
2021-11-11 11:23:49 +05:30
> - To use it in GitLab self-managed instances, ask a GitLab administrator to [enable it](#enable-or-disable-2fa-for-git-operations).
2021-02-22 17:27:13 +05:30
WARNING:
This feature might not be available to you. Check the **version history** note above for details.
2022-04-04 11:22:00 +05:30
Two-factor authentication can be enforced for Git over SSH operations. However, we recommend using
[ED25519_SK](../ssh/index.md#ed25519_sk-ssh-keys) or [ECDSA_SK](../ssh/index.md#ecdsa_sk-ssh-keys) SSH keys instead.
The one-time password (OTP) verification can be done using a command:
2021-02-22 17:27:13 +05:30
```shell
ssh git@<hostname> 2fa_verify
```
2021-11-11 11:23:49 +05:30
After the OTP is verified, Git over SSH operations can be used for a session duration of
2021-04-17 20:07:23 +05:30
15 minutes (default) with the associated SSH key.
### Security limitation
2FA does not protect users with compromised *private* SSH keys.
Once an OTP is verified, anyone can run Git over SSH with that private SSH key for
the configured [session duration](../user/admin_area/settings/account_and_limit_settings.md#customize-session-duration-for-git-operations-when-2fa-is-enabled).
2021-02-22 17:27:13 +05:30
2021-11-11 11:23:49 +05:30
### Enable or disable 2FA for Git operations
2021-02-22 17:27:13 +05:30
2021-11-11 11:23:49 +05:30
2FA for Git operations is under development and not
2021-02-22 17:27:13 +05:30
ready for production use. It is deployed behind a feature flag that is
**disabled by default**. [GitLab administrators with access to the GitLab Rails console](../administration/feature_flags.md)
can enable it.
To enable it:
```ruby
Feature.enable(:two_factor_for_cli)
```
To disable it:
```ruby
Feature.disable(:two_factor_for_cli)
```
2021-03-11 19:13:27 +05:30
The feature flag affects these features:
2021-11-11 11:23:49 +05:30
- [Two-factor Authentication (2FA) for Git over SSH operations](#2fa-for-git-over-ssh-operations).
2021-03-11 19:13:27 +05:30
- [Customize session duration for Git Operations when 2FA is enabled](../user/admin_area/settings/account_and_limit_settings.md#customize-session-duration-for-git-operations-when-2fa-is-enabled).
2021-09-04 01:27:46 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->