Skip to content

The Step Up Authentication app allows you to trigger a second factor authentication for Single Sign On (SSO) accounts in Nextcloud.

License

Notifications You must be signed in to change notification settings

SUNET/nextcloud-stepupauth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Step up authentication for Nextcloud 🚀 🔒

The Step Up Authentication app allows you to trigger a second factor authentication for Single Sign On (SSO) accounts.

Accounts created in Nextcloud with a SSO provider (saml, ldap, global site selector) can not currently use native Nextcloud Multi Factor Authentication (MFA). Nextcloud expects an Identity Provider (IdP) to do MFA prior to logging in to Nextcloud. This is confusing to users who can still see the settings for MFA in their security settings and it is not allways feasable for IdPs to implement MFA. Instead this app allows administrators to enable users to do step up authentication in Nextcloud, that is, provide a higher level of assurance of identity within Nextcloud, than what is provided by the IdP.

The only thing that this app does is to provide the same behaviour for SSO accounts as for local accounts. That means that you can configure groups in which users are required to have (or be excluded from having) MFA configured for their account. Users who are required to have MFA enabled, but have not yet configured a provider, will be prompted upon first login after requirement is enabled. The users can also voluntarily enable and disable MFA providers on their own volition if no external requirements are enforced. The documentation for MFA in Nextcloud is available here:

Testing status

These uses-cases has been manually tested with 0.2.0 version of the app

Use-case Expected Environments Description Expected Behaviour Actual Behaviour (OS/Client combo tested)
Web logon without MFA provider configured, no MFA required group membership All* User has no configuration options set that would trigger an MFA flow User is logged in without any questions about MFA As expected (8,20)
Web logon without MFA provider configured, MFA required group membership present " User belongs to a group that forces MFA User has to configure a second factor on first login. As expected (8)
Web logon with TOTP provider configured " User has configured a time based one time password. User is prompted for one time password on login. As expected (8,16)
Web logon with Webauthn provider configured " User has configured a Webauthn provider, such as a yubikey. User is prompted for the  Webauthn device. As expected (8,16)
Web logon with multiple Webauthn providers configured " User has configured multiple Webauthn providers, such as multiple yubikeys. User is prompted for the  Webauthn device. As expected (8)
Web logon with TOTP and Webauthn provider configured " User has configured both time based one time password and a Webauthn provider, such as yubikey. User is asked to select which second factor to use, and is subsequently prompted for that factor, As expected (8)
Web logon with TOTP and multiple Webauthn providers configured " User has configured both time based one time password and multiple Webauthn provider, such as multiple yubikeys. User is asked to select which second factor to use, and is subsequently prompted for that factor, As expected (8)
Admin twofactorauth:disable " The administrator disables one of several of the MFA providers for a user This triggers the use case corresponding the the remaining configured providers, upon next login. As expected (8)
Admin twofactorauth:disable " The administrator disables all of the MFA providers for a user This triggers the use case "Web logon without MFA provider configured, no MFA required group membership" for the user upon next login. As expected (8)
Admin twofactorauth:enforce " The administrator enforces MFA for a user without MFA This triggers the use case "Web logon without MFA provider configured,  MFA required group membership present" upon next login. As expected (8)
Desktop client logon - Single sign on with application token Windows/Linux/Mac/(Mobile) The user has a single sign on account, and logs in using an app token, created in the security settings. The user is allowed in, with only the app token, no second factor is ever prompted for. As expected (9,18)
Desktop client logon - Single sign on, normal case (not using app token) " The user has a single sign on account, and logs in using the IdP. Depending on configuration of the user account, the same flow as the browser case is triggered, except that Webauthn devices are not supported by the webview, and will not be concided configured by the desktop client. As expected (3,9,18)
WebDAV access Windows/Linux/Mac/Python/Rclone The user has a single sign on account, and logs in using an app token, created in the security settings. The user is allowed in, with only the app token, no second factor is ever prompted for. As expected (10)
Receiving file local file shares Browser/Desktop client The user receives a file share from someone on the same node. The file is immediately synced (depending on file size settings in desktop client, which may modify this behavior) As expected (8)
Receiving federated file shares " The user receives a file share from someone on another node. The file is synced upon accept of share (depending on file size settings in desktop client, which may modify this behavior) As expected (8,16,18)
Sending local file shares " The user shares a file with another user on the same node. The share is immediately accepted by the user. As expected (8)
Sending federated file shares " The user shares a file with someone on another node. The remote user is notified of the share, and can except if deemed appropriate. As expected (8,16,18)
File access in home folder Browser/Desktop client The user access a file in the root of the file system (primary storage) The user can create, delete and modify files if quota is sufficient. As expected (8)
File access in personal S3-buckets Browser/Desktop client The user access a file in an external s3 mount, only visible to them. The user can create, delete and modify files in all cases. As expected (8)
File access in system S3-buckets Browser/Desktop client The user access a file in an external s3 mount,  visible to them and their collaborators as well as admins. The user can create, delete and modify files depending on access rules. As expected (8)

*All means:

  • OS
    • Android
    • iOS
    • Linux
    • Mac
    • Windows
  • Client
    • Chromium based
    • Firefox
    • Nextcloud client
    • Rclone
    • Safari

Combinations:

Number OS Client
1 Android Chromium
2 Android Firefox
3 Android Nextcloud
4 Android Rclone
5 iOS Nextcloud
6 iOS Safari
7 Linux Chromium
8 Linux Firefox
9 Linux Nextcloud
10 Linux Rclone
11 Mac Chromium
12 Mac Firefox
13 Mac Nextcloud
14 Mac Rclone
15 Mac Safari
16 Windows Chromium
17 Windows Firefox
18 Windows Nextcloud
19 Windows Rclone
20 Windows Webdav

Operating systems and client combinations actually tested are mentioned in the column "Actual behaviour", we expect to test more combinations with time, see #1.

About

The Step Up Authentication app allows you to trigger a second factor authentication for Single Sign On (SSO) accounts in Nextcloud.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published