Allow TFA requirement to be configured per user

Created on 1 November 2022, over 2 years ago
Updated 10 May 2024, 11 months ago

Problem/Motivation

Part of the rationale for me creating #3291024: Move TfaContext to a factory for overridability, and remove constructor from TfaContextInterface was to be able to decorate the proposed factory, and be able to return custom Context objects. These context objects were able to determine if TFA was required on a user level. Rather than only built-in conditions, or roles. This helped especially for use with testing frameworks. Where we can conditionally switch TFA on and off without uninstalling/decontructing TFA entirely.

Thankfully \Drupal\tfa\Form\TfaLoginForm has been reworked for the better. However it is still difficult to add this behavior, without subclassing TfaLoginForm, or using form alters. Adding this kind of behaviour via subclass/alters is encroaching on tfa.module too much, and is particularly fragile.

Steps to reproduce

Proposed resolution

I'd prefer not to subclass \Drupal\tfa\Form\TfaLoginForm, and update routing.

Instead I'd like to propose adding an event to determine whether TFA is enabled for a user.

The pieces already inside \Drupal\tfa\TfaLoginContextTrait::isTfaRequired can be moved to a first class listener. Then third parties have the option to modify the behaviour, and utilise/modify isPropagationStopped and weights.

Remaining tasks

Decide.
Implement.

User interface changes

Nil

API changes

New event.

Data model changes

Nil.

Feature request
Status

Needs work

Version

2.0

Component

Code

Created by

🇦🇺Australia dpi Perth, Australia

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

  • 🇺🇸United States cmlara

    I'm concerned that this change, as currently proposed, makes a critical area of the code potentially 'fail open', particularly around the fact that the login code now becomes dependent upon an external service (the event system) to take action to enable TFA. There is no integrity in "fire an event and check a response" that ensures our code (or any code) has actually executed to enforce TFA. We could claim that is the fault of local admins if a scenario like that does occur, however as this is a security module there is an onus on us as a project to have code that is harder to defeat.

    I can understand the use case where we might want to force TFA enabled for a user who otherwise would not, however the event system allowing TFA to be disabled even if the user is in a role that requires TFA, that concerns me both on security levels and UX design.

    @dpi
    I'm curious if you could elaborate a bit more on how this interferes with testing? Is this 'live environment' testing where a HOTP token or using a role that doesn't have TFA enabled is not viable?

  • 🇦🇺Australia dpi Perth, Australia

    @cmlara

    I'm curious if you could elaborate a bit more on how this interferes with testing?

    As in PHPUnit w/ DTT (live db snapshot).

    When dealing with a working site snapshot, we dont want to modify TFA and its config. So we'd rather disable TFA by opting into it when needed. Doing this in PHP is more efficient than currently where config needs to be modified and dealing with config resyncs or container rebuilds.

    I'm concerned that this change, as currently proposed, makes a critical area of the code potentially 'fail open'

    Maybe we can update the event itself to fail on neutral.

    As in, if in the final isEnforcingTfa, we can throw an Exception if nothing invoked either unEnforceTfa or enforceTfa on the event. The event class would be responsible for this.

    I think its pretty solid that things would work as is with a first class event subscriber, but above would add a safety net.

    Whats your opinion on this proposed solution?

  • 🇺🇸United States cmlara

    Maybe we can update the event itself to fail on neutral.

    That could be a good method, it would certainly remove the "it was fired and forgot" concern.

    Would it work for you if we kept the required roles portion as part of the LoginContext before we fire the event? Doing so would allow us to address my concerns about the UI and retaining the security of roles where TFA is 100% required while at the same time providing a method for site owners to make other roles/users required conditionally.

    Conceptually its wise to have a TFA system usually be as decoupled as much as possible from the system prompting for authentication, however we are already dependent upon external services, and we are never going to be able to fully isolate because of how we have to be structured with Drupal. I just want to make sure we keep a balance between security and functionality.

  • 🇮🇳India bhanu951

    Bhanu951 changed the visibility of the branch combined-3318456-3318452-3318453 to hidden.

  • 🇳🇱Netherlands eelkeblok Netherlands 🇳🇱

    Dropping into this issue because I have a challenge with automatically created test users for each role; some of these roles have TFA, but it is a pain to actually set it up for the test users every time. So, I am looking for ways to circumvent TFA just for these test users. Would this solution still allow that, or are you saying the setting for the roles is the baseline, and other code could add more restrictions on forcing users to use TFA, not less?

  • 🇺🇸United States cmlara

    Basically yes to the edit

    Re-summarizing my suggested compromise in hopes to make sure its more clear:

    Some sites might not have any roles as "TFA Required" inside the TFA provided configuration UI. These sites would enforce TFA required using the Event system. This would allow granular control, down to the user level and could depend upon any external factors a site owner desires on if TFA will be required for each login.

    Some sites might use only TFA required from the TFA configuration UI. These sites would know that these users would require TFA and that the event handler can not downgrade that requirement as it would never be called for these roles.

    Some sites might use both, protecting high level roles using the TFA UI which would not be allowed to be overridden by the event handler, while for users in all other roles it can be chosen by external factors.

  • 🇦🇹Austria jordik

    Coming here from Allow modules to skip TFA through a hook Closed: duplicate .

    The MR does not merge to the latest 2.x-dev.

    @dpi - an example of an event subscriber which allows a modules to skip TFA would be very helpful (for documentation).

Production build 0.71.5 2024