Replies: 7 comments 2 replies
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Thank you for raising this important topic, ljharb. Agreed. Being able to do publishing fully from the terminal and without having to authenticate in a web browser is a workflow it'd be a pain to lose and arguably a reduction in security for some environments. |
Beta Was this translation helpful? Give feedback.
-
Forcing people into passkeys is a bad idea. The passkey authentication flow is clunky in it's current incarnation, in addition to this the current state of passkey management is unsatisfactory for many, in that it shepherds the user into a keystore that is in many ways a walled garden, especially in browser contexts. Keys cannot easily be transferred across vendors in many cases, additionally the device sharing functionality that the major vendors (such as Apple & Google) have implemented, mean that in effect the passkey is only as secure as the vendor account password + some security questions. The real benefits of webauthn, namely device-bound hardware keys, is not exposed/available in most cases. Whilst this remains the case, I would argue there isn't enough in favour of them to completely remove TOTP as an option, in addition to the other aforementioned reasons. |
Beta Was this translation helpful? Give feedback.
-
TOTP should remain supported for CI/CD workflows that rely on token-based authentication. |
Beta Was this translation helpful? Give feedback.
-
I vote for keeping TOTP alongside adding new authentication methods. TOTP is extremely handy for semi-automatic package publishing when you copy your one-time password into the terminal from KeePass2, which stores literally all my passwords and TOTP secrets. At the same time, I think adding PassKeys is a timely decision. When the number of services using PassKeys becomes high enough and the tools and technology itself mature, I’ll consider migrating. But currently, I don’t think PassKeys could make my UX with NPM either easier or more secure. Please don’t force migration from TOTP. It’s better to nudge people to enable 2FA at least. There’s nothing worse for the popularization of 2FA than tools that change too quickly, breaking support for previous technologies in favor of the newest ones. |
Beta Was this translation helpful? Give feedback.
-
TOTP: zero money |
Beta Was this translation helpful? Give feedback.
-
I'm not familiar with security key. From npm document page ( https://docs.npmjs.com/configuring-two-factor-authentication ) said:
However, I don't have any physical key, no web cam, no fingerprint scanner. So, my Windows Hello has no available to any of these. Then what option is left for someone like this? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
Personally, I see this as a very harmful decision. It will kill my workflow; having to open a web browser is very disruptive (which is why i still use TOTP and not web auth), and my existing "publish from CI" setups that DO securely use two factors (as opposed to the automation/granular token-based workflows that use a single factor) rely on a TOTP.
Please do not remove this highly critical feature.
Beta Was this translation helpful? Give feedback.
All reactions