vault icon indicating copy to clipboard operation
vault copied to clipboard

TOTP UI Viewer

Open jplopezy opened this issue 3 years ago • 12 comments

Is your feature request related to a problem? Please describe.

The user who was associated with a custom totp (example: external MFA) can only read the token value by command line (vault read) or by API.

Describe the solution you'd like

The user when entering the Web UI should be able to "generate a token" (vault read totp/code/testuser)

Describe alternatives you've considered

I would like to have a custom secret engine that allows taking the output of the "vault read $path" command as a variable.

Explain any additional use-cases

The totp is a quick and easy way to implement a secret. It would be interesting if it is easy to consume through the Web UI

vault read totp/code/testuser = to click and generate

Additional context

None

jplopezy avatar Sep 30 '21 22:09 jplopezy

As an additional use case for this feature having a web interface to the totp interface will enable the ability to use it to provide 2fa support when used as a shared password store for non technical users (who are unable to use the api) to access shared accounts.

Tyler-Ward avatar Jan 24 '22 15:01 Tyler-Ward

It would also be useful if users could reset their OTP creds with a write to totp/keys/foo generate=true (if their policy allows it) and display the QR code, within the web UI.

But I agree: primary use case is to generate and display the TOTP tokens themselves.

candlerb avatar Feb 16 '22 09:02 candlerb

👍 on this feature request that will help users to get their TOTP generated token available on the webui without using the API.

JqckB avatar Feb 20 '22 23:02 JqckB

As an additional use case for this feature having a web interface to the totp interface will enable the ability to use it to provide 2fa support when used as a shared password store for non technical users (who are unable to use the api) to access shared accounts.

@Tyler-Ward , I'm just sandboxing vault and realized it is disabled to read topt codes from UI interface, however, i used to solve the problem you raise using the topt-tool-set, it works on client side and we host it in a s3 bucket, (it is not as secure as vault, since we need to keep the seed topt in a kind of excel spreedsheet, but works better exactly for those whom are not technician)

leandro-toledo-uux avatar Jun 06 '22 18:06 leandro-toledo-uux

We're trying to centralize on vault, and get away from random deployments of KeePass, etc. As part of this, we're trying to rely on the Vault web UI for our less technical users who still need access to secrets like corporate-owned vendor accounts. Enabling TOTP on these accounts when available is best practice.

Having the TOTP at least readable in the UI could significantly help us with broader adoption and use of Vault.

rjhornsby avatar Nov 23 '22 01:11 rjhornsby

Would sure like to see that enhancement and wondering if it's somewhere on the roadmap

shaidar avatar Jan 25 '23 19:01 shaidar

We implemented a poor man's workaround by adding the vault TOTP path for a given set of credentials to the corresponding kv entry. On the same screen, the vault web UI has a minimal shell where you can take that path and run commands like vault read path/to/totp/code without having to use the vault cli binary.

It would be ideal if it were easier for the user, but it's at least something.

rjhornsby avatar Jan 25 '23 19:01 rjhornsby

@rjhornsby Thanks for the info. Sounds like a good workaround until they hopefully have a UI in place.

shaidar avatar Jan 25 '23 19:01 shaidar

If not adding UI functionality, it would be great to at least be able to run a vault list totp/keys, similar to the API call, in the vault cli UI

shaidar avatar Jan 25 '23 20:01 shaidar

One option we've found, but this only works if you've enabled TOTP but haven't enforced it yet.

  • Create and assign a policy that grants users the capability to "update" to the path sys/mfa/method/totp (identity/mfa/method/totp for open source).

  • Once the user is logged in, they can click on their user menu (upper right) and click Multi-factor authentication. After entering the method_id for TOTP and clicking verify, they are presented with a QR code to scan for enrolling their TOTP smartphone app.

jsremba avatar Jun 12 '23 20:06 jsremba

Also requesting for this feature. Would simplify usage greatly.

msrn avatar Dec 13 '23 11:12 msrn