TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: AWS registering MFA will be required in 29 days

7 点作者 herodoturtle7 个月前
Hi folks,<p>When signing into our AWS console this morning we noticed this security popup - &quot;Registering MFA will be required in 29 days&quot;.<p>Below the notice is a list of options for registering for MFA, and I quote:<p>&gt; 1. Passkey or Security key: Authenticate using your fingerprint, face, or screen lock. Create a passkey on this device or use another device, like a FIDO2 security key.<p>&gt; 2. Authenticator app: Authenticate using a code generated by an app installed on your mobile device or computer.<p>&gt; 3. Hardware TOTP Token: Authenticate using a code generated by hardware TOTP token or other hardware devices.<p>Perhaps this is a dumb question, but why can&#x27;t we just use email for 2FA? (or maybe there is a way and we&#x27;ve just missed it?)<p>If email 2FA is not an option, which of the above 3 options would you recommend to minimise hassle?<p>(Option 1 looks simple but sounds like it&#x27;s limited to individual devices? Option 2 - the idea of installing an app - irks us. With option 3 would we each need a hardware token?)<p>Any guidance would be appreciated. Thanks.

5 条评论

YouWhy7 个月前
First of all, 2FA is a jolly good idea in terms of preventing account hijackings; relying on email&#x2F;SMS (texts) introduces multiple hazards that can reverse 2FA&#x27;s net benefit.<p>One configuration some people use is the KeePass desktop password manager, which supports storing TOTP seeds and has a nice UX for generating tokens; the password database file may be located as you see fit on a hard drive, DOK, cloud drive etc. Example of TOTP config for KeePass:<p><a href="https:&#x2F;&#x2F;www.fhtino.it&#x2F;docs&#x2F;keepass-totp--intro&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.fhtino.it&#x2F;docs&#x2F;keepass-totp--intro&#x2F;</a><p>Also, Keepass2Android can be used in similar vein from Android devices. iOS equivalents seem to exist as well.
mooreds7 个月前
I&#x27;d go with number 2 unless you want to buy everyone a hardware token (option number 3).<p>There are open source solutions (I&#x27;ve used <a href="https:&#x2F;&#x2F;2fas.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;2fas.com&#x2F;</a> ) and very common solutions (Google Authenticator).<p>You can even print out the QR code and put it in a secure location (safe, safe deposit box) as a break-glass in case everyone&#x27;s phones cease functioning.
评论 #41809747 未加载
xet77 个月前
At Linux, I manage local 2FA with Numberstation GUI. It can import export.<p>sudo apt install numberstation<p>I manage passwords with KeepassXC<p>sudo apt install keepassxc<p>There is also newer version with additional features:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;keepassxreboot&#x2F;keepassxc">https:&#x2F;&#x2F;github.com&#x2F;keepassxreboot&#x2F;keepassxc</a>
评论 #41816692 未加载
stephenr7 个月前
Thanks for posting this. I&#x27;m going to link back to this whenever anyone claims that using AWS&#x2F;etc means you don&#x27;t need any experienced infrastructure&#x2F;ops people.<p>As for the actual question: what browser&#x2F;password manager in 2024 doesn&#x27;t support both options 1 and 2?
评论 #41812142 未加载
dotps17 个月前
Personally I would do all of them.<p>I would make a passkey and stick it in Bitwarden so I have it with me on all my devices.<p>I would link my account to my authenticator app.<p>Then I would also register my yubikey I keep on my keychain.
评论 #41812112 未加载