expose 2F fail counter in SSO admin

Bug #1055692 reported by Selene ToyKeeper
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Canonical SSO provider
Confirmed
Undecided
Selene ToyKeeper

Bug Description

When users fail their 2F login too many times (~20), SSO suspends their account. Then it requires an admin to help get their access back. This is fine.

However, the counter used to track failed 2F attempts isn't exposed in the admin UI, so users can get re-suspended immediately after being re-activated. This should probably be exposed so admins can reset it while re-activating the account.

The relevant variable is account.twofactor_attempts .

tags: added: twofactor
Changed in canonical-identity-provider:
milestone: none → public-rollout
tags: added: u1-support
removed: os-support
Julien Funk (jaboing)
tags: added: u1-by-support
tags: removed: u1-support
a59ff5 (a59ff5a59ff5)
Changed in canonical-identity-provider:
status: Confirmed → Fix Released
Colin Watson (cjwatson)
Changed in canonical-identity-provider:
status: Fix Released → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.