mirror of
https://github.com/binwiederhier/ntfy.git
synced 2026-05-09 08:26:00 +02:00
[GH-ISSUE #250] MFA push / Authy API compatibility #196
Labels
No labels
ai-generated
android-app
android-app
android-app
🪲 bug
build
build
dependencies
docs
enhancement
enhancement
🔥 HOT
in-progress 🏃
ios
prio:low
prio:low
pull-request
question
🔒 security
server
server
unified-push
web-app
website
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/ntfy#196
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @alexanderadam on GitHub (May 13, 2022).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/250
I'm not quite sure whether this is possible and whether the issue title explains properly what this is about.
The general idea is to improve usability for 2FA.
So for 2FA there's usually a separate app and once users are prompted to type their second factor they might have to unlock their mobile phone, open the authenticator app, search the platform and then they can actually start to type or copy the code.
The company Twilio created a smart solution for making this workflow easier: Authy.
Authy's workflow goes as follows:
This workflow sounds great and clearly removes friction. But it relies on a proprietary uncontrollable service. Such as most push notification infrastructure besides ntfy.
And this workflow obviously relies on push infrastructure anyway.
Therefore it would be nice to have a free solution to improve people's security.
Without knowing any details about Android development I would guess that it would need these things:
otpauth://totp/some_email_provider).I'm fully aware that this is a lot to ask but improving security and its usability for people believing in free software is a probably worth a try.
PS: Thank you so much for nfty 🙌
@Curid commented on GitHub (May 13, 2022):
You can use something like Authelia on your web server.
@alexanderadam commented on GitHub (May 13, 2022):
This issue is not about securing ntfy with an identity provider. It's about providing a Authy inspired/compatible API within ntfy and allowing to open an Android intent on OTP apps that will open a particular entry.
@Curid commented on GitHub (May 13, 2022):
You want to use ntfy to proxy OTP requests from back-end services to OTP apps?
@alexanderadam commented on GitHub (May 15, 2022):
I'm not quite sure what 'proxying' would mean in this context.
The way Authy works (and how I imagine this could work in a combination of ntfy and an OTP) is this:
example.org)example.org(there are some libraries to communicate with an Authy API)example.orgin your favourite OTP appSince ntfy already supports bringing push notifications from $somewhere via ntfy server to the ntfy Android client only two things are left to replace Authy with ntfy in this scenario:
example.org" (platform maintainers could probably even use official libs if the API would be compatible to the Authy API)example.org(maybe by opening a scheme like thisotprequest://example.org). OTP apps need to subscribe to these URLs (I also asked on andOTP whether this is possible)