mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 11:38:02 +00:00
Login MFA (#14025)
* Login MFA * ENT OSS segragation (#14088) * Delete method id if not used in an MFA enforcement config (#14063) * Delete an MFA methodID only if it is not used by an MFA enforcement config * Fixing a bug: mfa/validate is an unauthenticated path, and goes through the handleLoginRequest path * adding use_passcode field to DUO config (#14059) * add changelog * preventing replay attack on MFA passcodes (#14056) * preventing replay attack on MFA passcodes * using %w instead of %s for error * Improve CLI command for login mfa (#14106) CLI prints a warning message indicating the login request needs to get validated * adding the validity period of a passcode to error messages (#14115) * PR feedback * duo to handle preventing passcode reuse Co-authored-by: hghaf099 <83242695+hghaf099@users.noreply.github.com> Co-authored-by: hamid ghaf <hamid@hashicorp.com>
This commit is contained in:
@@ -146,6 +146,11 @@ func (c *WriteCommand) Run(args []string) int {
|
||||
return 0
|
||||
}
|
||||
|
||||
if secret != nil && secret.Auth != nil && secret.Auth.MFARequirement != nil {
|
||||
c.UI.Warn(wrapAtLength("A login request was issued that is subject to "+
|
||||
"MFA validation. Please make sure to validate the login by sending another "+
|
||||
"request to mfa/validate endpoint.") + "\n")
|
||||
}
|
||||
// Handle single field output
|
||||
if c.flagField != "" {
|
||||
return PrintRawField(c.UI, secret, c.flagField)
|
||||
|
||||
Reference in New Issue
Block a user