Skip to content

Commit

Permalink
Merge pull request #209 from venth/duo_webauthn
Browse files Browse the repository at this point in the history
Switch from U2F to WebAuthn for DUO authentication
  • Loading branch information
pdecat authored Feb 9, 2022
2 parents 88761aa + de78b8a commit 3717053
Show file tree
Hide file tree
Showing 13 changed files with 176 additions and 276 deletions.
14 changes: 14 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
version: 2
updates:

# Maintain dependencies for GitHub Actions
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "daily"

# Maintain dependencies for poetry
- package-ecosystem: "pip"
directory: "/"
schedule:
interval: "daily"
3 changes: 2 additions & 1 deletion .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,8 @@ jobs:
artifacts: "dist/*"
token: ${{ secrets.GITHUB_TOKEN }}
draft: false
prerelease: steps.check-version.outputs.prerelease == 'true'
generateReleaseNotes: true
prerelease: ${{ steps.check-version.outputs.prerelease == 'true' }}

- name: Publish to PyPI
env:
Expand Down
17 changes: 8 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ As of version 0.2.0, this tool acts on the 'default' profile unless an alternate
### MFA integration

aws-adfs integrates with:
* [duo security](https://duo.com) MFA provider with support for FIDO U2F hardware authenticator
* [duo security](https://duo.com) MFA provider with support for FIDO U2F (CTAP1) / FIDO2 (CTAP2) hardware authenticators
* [Symantec VIP](https://vip.symantec.com/) MFA provider
* [RSA SecurID](https://www.rsa.com/) MFA provider

Expand Down Expand Up @@ -274,10 +274,6 @@ aws-adfs integrates with:
--sspi / --no-sspi Whether or not to use Kerberos SSO
authentication via SSPI (Windows only,
defaults to True).
--u2f-trigger-default / --no-u2f-trigger-default
Whether or not to also trigger the default
authentication method when U2F is available
(only works with Duo for now).
--help Show this message and exit.
```
```
Expand All @@ -299,7 +295,7 @@ aws-adfs integrates with:
Please setup preferred auth method in duo-security settings (settings' -> 'My Settings & Devices').
* USB FIDO U2F does not work in Windows Subsystem for Linux (WSL)
* USB FIDO2 does not work in Windows Subsystem for Linux (WSL)
`OSError: [Errno 2] No such file or directory: '/sys/class/hidraw'`
Expand All @@ -310,9 +306,9 @@ aws-adfs integrates with:
export AWS_SHARED_CREDENTIALS_FILE=/mnt/c/Users/username/.aws/credentials
```
* FIDO U2F devices are not detected on Windows 10 build 1903 or newer
* FIDO2 devices are not detected on Windows 10 build 1903 or newer
Running `aws-adfs` as Administrator is required since Windows 10 build 1903 to access FIDO U2F devices, cf. https://github.com/Yubico/python-fido2/issues/55)
Running `aws-adfs` as Administrator is required since Windows 10 build 1903 to access FIDO2 devices, cf. https://github.com/Yubico/python-fido2/issues/55)
* in cases of trouble with lxml please install
Expand Down Expand Up @@ -430,4 +426,7 @@ poetry run pytest
* [mikereinhold](https://github.com/mikereinhold) for: Feature credential process
* [pdecat](https://github.com/pdecat) for:
* Add --username-password-command command line parameter
* Add --print-console-signin-url, --console-role-arn and --console-external-id command line parameters
* Add --print-console-signin-url, --console-role-arn and --console-external-id command line parameters
* Update to fido2 v0.9.3
* Replace U2F by WebAuthn following Duo move from the former to the latter (compatible with FIDO U2F (CTAP1) by FIDO2 (CTAP2) authenticators)
* Remove --u2f-trigger-default/--no-u2f-trigger-default command line parameters
Loading

0 comments on commit 3717053

Please sign in to comment.