Skip to content

Expose TOTP secret for non-QR provisioning #6119

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Jul 1, 2019

Conversation

woodruffw
Copy link
Member

@woodruffw woodruffw commented Jun 28, 2019

For users who don't have the ability to or don't want to scan a QR code.

cc @nlhkabu @garyemiller

Closes #6114

@woodruffw woodruffw added the UX/UI design, user experience, user interface label Jun 28, 2019
@nlhkabu
Copy link
Contributor

nlhkabu commented Jun 29, 2019

Screenshot from 2019-06-29 07-16-08
Screenshot from 2019-06-29 07-16-00

@nlhkabu
Copy link
Contributor

nlhkabu commented Jun 29, 2019

ready to go on my side @woodruffw

@nlhkabu nlhkabu requested review from di and ewdurbin July 1, 2019 05:15
@ewdurbin ewdurbin merged commit dcd8643 into pypi:master Jul 1, 2019
@garyemiller
Copy link

Excellent! Works fine. Thanks for this new feature.

This prevents me having to share all my 2FA with Sprint, Google and Samsung.

@woodruffw woodruffw deleted the tob-expose-totp-secret branch July 1, 2019 21:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
UX/UI design, user experience, user interface
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Expose TOTP provisioning code for manual entry
4 participants