@@ -62,6 +62,11 @@ General Settings
62
62
indefinitely in a state of having entered their password successfully but not
63
63
having passed two factor authentication. Set to ``0 `` to disable.
64
64
65
+ ``TOTP_ISSUER `` (default ``site name ``)
66
+ Changes the Site Name that is shown in the TOTP app after scanning the QR Code.
67
+ If not set, falls back to default site name.
68
+
69
+
65
70
Phone-related settings
66
71
----------------------
67
72
@@ -123,7 +128,7 @@ Next, add additional urls to your config:
123
128
124
129
# urls.py
125
130
from two_factor.gateways.twilio.urls import urlpatterns as tf_twilio_urls
126
-
131
+
127
132
urlpatterns = [
128
133
path(' ' , include(tf_twilio_urls)),
129
134
...
@@ -168,7 +173,7 @@ Start by providing a value for the following setting:
168
173
``TWO_FACTOR_WEBAUTHN_RP_NAME `` (default: ``None ``)
169
174
The human-palatable identifier for the `Relying Party `_. You **MUST ** name your application. Failing to do so will
170
175
raise an ``ImproperlyConfigured `` exception.
171
-
176
+
172
177
The defaults provided for all other settings should be enough to enable the use of fingerprint readers, security keys
173
178
and android phones (Chrome-based browsers only).
174
179
@@ -184,19 +189,19 @@ will be sent to your application after the authentication takes place:
184
189
A list of preferred communication transports that will be set for all registered authenticators. **This can be
185
190
used to optimize user interaction at authentication time. Its implementation is highly browser-dependent and may
186
191
even be disregarded. **
187
-
192
+
188
193
Chrome uses this to filter out credentials that do not use any of the transports listed.
189
194
For example, if set to ``['usb', 'internal'] `` Chrome will not attempt to authenticate the user with authenticators
190
195
that communicate using CaBLE (e.g., android phones).
191
-
196
+
192
197
Possible values for each element in the list are members of ``webauthn.helpers.structs.AuthenticatorTransport ``. The
193
198
default is to accept all transports.
194
199
195
200
``TWO_FACTOR_WEBAUTHN_UV_REQUIREMENT `` (default: ``'discouraged' ``)
196
201
The type of `User Verification `_ that is required. Verification ranges from a simple test of user presence such as
197
202
by touching a button to more thorough checks like using biometrics or requiring user PIN input.
198
203
Possible values: ``'discouraged' ``, ``'preferred' ``, ``'required' ``.
199
-
204
+
200
205
``TWO_FACTOR_WEBAUTHN_ATTESTATION_CONVEYANCE `` (default: ``'none' ``)
201
206
The type of `Attestation Conveyance `_. A `Relying Party `_ may want to verify attestations to ensure that
202
207
only authentication devices from certain approved vendors can be used. Depending on the level of conveyance, the
@@ -213,13 +218,13 @@ will be sent to your application after the authentication takes place:
213
218
``'fido-u2f' ``, ``'packed' `` and ``'tpm' `` do not come pre-configured with root certificates. Download the
214
219
additional certificates that you needed for your particular device and use the
215
220
``TWO_FACTOR_WEBAUTHN_PEM_ROOT_CERTS_BYTES_BY_FMT `` setting below.
216
-
221
+
217
222
``TWO_FACTOR_WEBAUTHN_PEM_ROOT_CERTS_BYTES_BY_FMT `` (default: ``None ``)
218
223
A mapping of attestation statement formats to lists of Root Certificates, provided as bytes. These will be used in
219
224
addition to those already provided by ``py_webauthn `` to verify attestation objects.
220
225
221
226
**Example: **
222
-
227
+
223
228
If you want to verify attestations made by a Yubikey, get `Yubico's root CA `_ and use it as follows:
224
229
225
230
.. code-block :: python
@@ -237,7 +242,7 @@ will be sent to your application after the authentication takes place:
237
242
AttestationFormat.FIDO_U2F : root_ca_list,
238
243
}
239
244
240
- The following settings control how the attributes for WebAuthn entities are built:
245
+ The following settings control how the attributes for WebAuthn entities are built:
241
246
242
247
``TWO_FACTOR_WEBAUTHN_ENTITIES_FORM_MIXIN `` (default: ``'two_factor.webauthn.utils.WebauthnEntitiesFormMixin' ``)
243
248
A mixin to provide WebAuthn entities (user and `Relying Party `_) needed during setup and authentication. Although
0 commit comments