TOTP protection in Database Security (in addition to Password, Key File and YubiKey Challenge-Response) #12867
reneleonhardt
started this conversation in
Ideas
Replies: 1 comment
-
|
You cannot use totp to secure an offline encryption method. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I searched issues and discussions, apologies if this already has been proposed.
Database Settings 3. Security / Database Credentials
https://keepassxc.org/docs/KeePassXC_UserGuide#_database_settings
In addition and combinable to the
Master Password,Key FileandYubiKey Challenge-Response, it would be great if it would be possible to add a new protection method to databases:TOTPcodes.The secret could be randomly generated and maybe stored inside the database file (in a special internal entry), readable after all other protections successfully decrypted the database itself.
Alternatively it could be provided by the user as text (if storing inside the database or as yet another Key File isn't acceptable) upon QR code /
otpauthURL creation first, and then when unlocking the database.[If Touch ID could be easily used to create a secret instead of a user thinking of a new password, that would be nice too.]
Workflows
Setup
otpauthURL are shownUnlocking
This would allow more unlock combinations, or maybe even a fallback if the YubiKey has been forgotten at home while traveling.
Details
previous,currentandnextcodes are valid)Beta Was this translation helpful? Give feedback.
All reactions