vaultwarden yubikey updates.
This commit is contained in:
@@ -140,7 +140,7 @@ return True
|
||||
|
||||
### Current State
|
||||
|
||||
Vaultwarden deployment has WebAuthn enabled by default, but admin panel configuration may be needed.
|
||||
Vaultwarden deployment has WebAuthn support built-in. Configuration is done via the admin panel.
|
||||
|
||||
### Required Configuration
|
||||
|
||||
@@ -148,15 +148,24 @@ Vaultwarden deployment has WebAuthn enabled by default, but admin panel configur
|
||||
|
||||
Access admin panel at `https://vaultwarden.daviestechlabs.io/admin`:
|
||||
|
||||
```
|
||||
Settings → Advanced:
|
||||
Enable Web Vault: true (already set)
|
||||
|
||||
Two-Factor Authentication:
|
||||
Enable WebAuthn: true (verify this is set)
|
||||
```
|
||||
1. Navigate to **Settings** section
|
||||
2. Find **Yubikey** settings:
|
||||
- For WebAuthn/FIDO2: No additional configuration needed (enabled by default)
|
||||
- For Yubikey OTP: Requires Client ID and Secret Key from Yubico
|
||||
3. Find **Two-Factor Authentication** or **General** settings:
|
||||
- Verify WebAuthn is not disabled
|
||||
4. Click **Save** if any changes made
|
||||
|
||||
#### 2. Optional: Enable Yubikey OTP
|
||||
#### 2. User Setup (WebAuthn)
|
||||
|
||||
1. Log into Vaultwarden web vault
|
||||
2. Go to Settings → Security → Two-step Login
|
||||
3. Click Manage next to "FIDO2 WebAuthn"
|
||||
4. Click "Register new key"
|
||||
5. Insert Yubikey and touch when prompted
|
||||
6. Name the key (e.g., "Yubikey 5 NFC")
|
||||
|
||||
#### 3. Optional: Enable Yubikey OTP
|
||||
|
||||
If users want Yubikey OTP as an additional option (the 44-character string feature):
|
||||
|
||||
@@ -164,7 +173,16 @@ If users want Yubikey OTP as an additional option (the 44-character string featu
|
||||
|
||||
Visit: https://upgrade.yubico.com/getapikey/
|
||||
|
||||
**Step 2: Store credentials in Vault**
|
||||
**Step 2: Enter credentials in Admin Panel**
|
||||
|
||||
In the Vaultwarden admin panel → Yubikey section:
|
||||
- Enter **Client ID**
|
||||
- Enter **Secret Key**
|
||||
- Click **Save**
|
||||
|
||||
Alternatively, for GitOps management:
|
||||
|
||||
**Step 2b: Store credentials in Vault**
|
||||
|
||||
```bash
|
||||
vault kv put kv/vaultwarden-yubico \
|
||||
@@ -215,15 +233,6 @@ envFrom:
|
||||
|
||||
**Status:** ⏳ NOT IMPLEMENTED - Requires Yubico API credentials
|
||||
|
||||
#### 3. User Setup (WebAuthn - Already Available)
|
||||
|
||||
1. Log into Vaultwarden web vault
|
||||
2. Go to Settings → Security → Two-step Login
|
||||
3. Click Manage next to "FIDO2 WebAuthn"
|
||||
4. Click "Register new key"
|
||||
5. Insert Yubikey and touch when prompted
|
||||
6. Name the key (e.g., "Yubikey 5 NFC")
|
||||
|
||||
## MFA Requirements by User Group
|
||||
|
||||
| Group | MFA Requirement | Allowed Methods |
|
||||
|
||||
Reference in New Issue
Block a user