Skip to content

Two-Factor Auth #313

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
meichthys opened this issue Mar 2, 2020 · 29 comments
Open

Two-Factor Auth #313

meichthys opened this issue Mar 2, 2020 · 29 comments

Comments

@meichthys
Copy link

meichthys commented Mar 2, 2020

Two-Factor authorization would be a very welcomed feature in my book.

To be able to log into nginx-proxy-manager via 2FA as well as being able to provide 2FA for access to hosts - this would vastly improve the security of less secure or non-secure applications hiding behind the nginx proxy.

Something like Authelia should provide a good starting point.

@arejaytee
Copy link

+1 on this or implementing #137

@Rami-Pastrami
Copy link

Noting https://github.com/authelia/authelia for being maintained actively currently, and having more features

@KamistixX
Copy link

Authelia integration would be a massive feature

@james-d-elliott
Copy link

james-d-elliott commented May 1, 2020

One of the maintainers of Authelia here. We'd be willing to do some form of collab to help with this. Particularly with the access to the hosts section as that is the easiest part. I also think this would actually address a few of your issues all at once (I'll try to compile a list later and the reasons why).

Ideally if we did it I think the ideal place to do it is in the access tab as an alternate provider to the HTTP basic auth. Also it shouldn't be limited to Authelia in my opinion, people should be able to configure all aspects of the ngx_http_auth_request_module.

Authelia docs.

@KittyKatt
Copy link

This would actually bring me back to nginx-proxy-manager over some other solution as there's no other solution with as easy of a point and click interface as this, but vanilla nginx supports this with Authelia's guide so I've been sticking with that.

@Rami-Pastrami
Copy link

TBH I would even be happy for a guide to add Authelia to NginxProxyManager

@lazee486
Copy link

+1 I opened a request for voucher-proxy or keycloak before I found this one, but any route he goes with I'd be willing to try :) his interface is one of the best I've found for homelab!

@zero77
Copy link

zero77 commented Nov 25, 2020

Google provide a 2FA module that can be integrated with protocols like SSH and OpenVPN.
https://github.com/google/google-authenticator-libpam

@joe307bad
Copy link

@joe307bad
Copy link

Here is also a good tutorial on getting nginx-proxy-manager secured with Authelia.

@jeremy-chua
Copy link

IMHO, integration with most IdP will address this. SAML2 will be a common use case.
I'm using Azure AD for my hosted applications. MFA can be configured in Azure AD. I believe it will be similar for all IdP.

@apainter2
Copy link

apainter2 commented May 27, 2021

I too would love to see NPM support Google Authenticator/2FA.

Especially as I have NPM internet facing on a hosted VPS.

@kennylajara
Copy link

Is possible to make use of this Authenticator API implementation to easily integrate:
https://github.com/infiniteloopltd/AuthenticatorAPI.com

@meichthys
Copy link
Author

@kennylajara could you share how you implemented this?

@rickgitdone
Copy link

I also found this on git .. allows 2FA for any Web App.. Integration with any of these into one is a goal I am looking for ...
https://github.com/Arno0x/TwoFactorAuth

@LiaraAlis
Copy link

I think this is a very important feature. From my point of view this feature should be prioritized higher.

@anasnaguib
Copy link

I think this is a very important feature. hope it can be added soon.

@CrooLyyCheck
Copy link

Two-Factor authorization would be a very welcomed feature in my book.

To be able to log into nginx-proxy-manager via 2FA as well as being able to provide 2FA for access to hosts - this would vastly improve the security of less secure or non-secure applications hiding behind the nginx proxy.

Something like Authelia should provide a good starting point.

Also access list is good place to implement 2fa auth thru simple page instead HTTP auth form

Copy link

Issue is now considered stale. If you want to keep it open, please comment 👍

@github-actions github-actions bot added the stale label May 24, 2024
@timnolte
Copy link

If 2FA can't be done then implementing OpenID Connect for SSO authentication would be the next best thing.

@james-d-elliott
Copy link

It can technically already be integrated for backend apps already, just not the NPM frontend. I think having both would be a good addition however, and fully support the idea of OpenID Connect 1.0, in a lot of ways I prefer it. Me and the other Authelia devs would welcome a collaboration on this as well.

@github-actions github-actions bot removed the stale label Jul 11, 2024
@woliver99
Copy link

+1 I would like to see this implemented

@lazee486
Copy link

having to restrict the ip range that can access port 81 works, the number of homelabbers or people who spin this up on vps...a bit better security for the management interface would be good,

@jhedfors
Copy link

jhedfors commented Feb 1, 2025

+1 for implementation of basic 2FA would be awesome!

@ISnotes
Copy link

ISnotes commented Feb 8, 2025

+1

@theJoshMuller
Copy link

+1 Another vote for 2FA / TOTP

@WorstPIlot
Copy link

  • 1 for 2FA, i think it could make this project the best around

@VslVictor7
Copy link

+1

1 similar comment
@hdm-benni
Copy link

+1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests