Skip to content

Releases: mkalioby/django-mfa2

v3.1.1

11 Jul 10:47

Choose a tag to compare

v3.1.1 (HotFix)

  • Fix: Issue #100, Issue related to error message when jsonfield isn't installed on django < 3.1.

v3.1

23 Jun 16:32

Choose a tag to compare

3.1

  • Upgraded to fido==1.2.0
  • Added: CSP Compliance (optional), thanks to @lvanbuiten, to under CSP refer to van Buiten
  • Fix: issue when finding the user based on credential id.
  • Fix: Move key delete to be POST call. Thanks to @AndreasDickow

v3.1rc1

16 May 10:31
ece0a0d

Choose a tag to compare

v3.1rc1 Pre-release
Pre-release
  • Upgraded to fido==1.2.0
  • Added: CSP Compliance (optional), thanks to @lvanbuiten, to under CSP refer to van Buiten
  • Fix: issue when finding the user based on credential id.
  • Fix: Move key delete to be POST call. Thanks to @AndreasDickow

v3.0

15 Jul 10:59
829426b

Choose a tag to compare

v3.0

This is a major cleanup and CSS adjustments so please test before deployment.

  • Updated to fido2==1.1.3
  • Removed: CBOR and exchange is done in JSON now.
  • Removed: simplejson package from dependencies.
  • Email OTP is always 6 numbers.
  • Better support for bootstrap 4 and 5.
  • Added: the following settings
    • MFA_FIDO2_RESIDENT_KEY: Defaults to Discouraged which was the old behaviour
    • MFA_FIDO2_AUTHENTICATOR_ATTACHMENT: If you like to have a PLATFORM Authenticator, Defaults to NONE
    • MFA_FIDO2_USER_VERIFICATION: If you need User Verification
    • MFA_FIDO2_ATTESTATION_PREFERENCE: If you like to have an Attention
    • MFA_ENFORCE_EMAIL_TOKEN: if you want the user to receive OTP by email without enrolling, if this the case, the system admins shall make sure that emails are valid.
    • MFA_SHOW_OTP_IN_EMAIL_SUBJECT: If you like to show the OTP in the email subject
    • MFA_OTP_EMAIL_SUBJECT: The subject of the email after the token allows placeholder '%s' for otp

v3.0b2

04 Jul 13:34
0c3a1e9

Choose a tag to compare

v3.0b2 Pre-release
Pre-release
  • Updated to fido2==1.1.3
  • Removed: CBOR and exchange is done in JSON now.
  • Removed: simplejson package from dependencies.
  • Email OTP is always 6 numbers.
  • Better support for bootstrap 4 and 5.
  • Added: the following settings
    • MFA_FIDO2_RESIDENT_KEY: Defaults to Discouraged which was the old behaviour
    • MFA_FIDO2_AUTHENTICATOR_ATTACHMENT: If you like to have a PLATFORM Authenticator, Defaults to NONE
    • MFA_FIDO2_USER_VERIFICATION: If you need User Verification
    • MFA_FIDO2_ATTESTATION_PREFERENCE: If you like to have an Attention
    • MFA_ENFORCE_EMAIL_TOKEN: if you want the user to receive OTP by email without enrolling, if this the case, the system admins shall make sure that emails are valid.
    • MFA_SHOW_OTP_IN_EMAIL_SUBJECT: If you like to show the OTP in the email subject
    • MFA_OTP_EMAIL_SUBJECT: The subject of the email after the token allows placeholder '%s' for otp

v3.0b1

28 Jun 11:33

Choose a tag to compare

v3.0b1 Pre-release
Pre-release

3.0 (Beta)

  • Updated to fido2==1.1.3
  • Removed: CBOR and exchange is done in JSON now
  • Allows using WebAuthn (passkeys) as a single factor for login
  • Added: the following settings
    • MFA_FIDO2_RESIDENT_KEY: Defaults to Discouraged which was the old behaviour
    • MFA_FIDO2_AUTHENTICATOR_ATTACHMENT: If you like to have a PLATFORM Authenticator, Defaults to NONE
    • MFA_FIDO2_USER_VERIFICATION: If you need User Verification
    • MFA_FIDO2_ATTESTATION_PREFERENCE: If you like to have an Attention

v2.9.0

27 May 05:56
d90c40b

Choose a tag to compare

  • Add: Set black as code formatter
  • Add: Add Pyre as a type checker
  • Add: Add pre-commit hooks
  • Upgrade: fido to be 1.1.0 as minimum

v2.8.0

25 Dec 11:15
be3cf69

Choose a tag to compare

2.8.0

  • Support For Django 4.0+ JSONField
  • Removed jsonfield package from requirements

2.7.0

  • Fixed #70
  • Add QR Code for trusted device link
  • Better formatting for trusted device start page.

v2.6.1 - Security Update

10 Oct 14:38

Choose a tag to compare

2.6.1

  • Fix: CVE-2022-42731: related to the possibility of registration replay attack.
    Thanks to 'SSE (Secure Systems Engineering)'

v2.5.1 - Security Updated

10 Oct 14:18

Choose a tag to compare

2.5.1

  • Fix: CVE-2022-42731: related to the possibility of registration replay attack thanks to 'SSE (Secure Systems Engineering)'