U2F for cli?
Comments
-
We don't have anything to announce with regard to U2F, but it's certainly something that we can continue to evaluate as far the CLI after work on the beta is out of the way. It's not likely something that would be added specifically for the CLI though, as it would need to be involved at the account level, since it's an authentication technology. :)
0 -
When I started to play with the CLI, one of the most annoying features was certainly the need to grab my authentication code. As by default and without some additions, you have to log in really often that was really really a lack of time.
To improve that, I developed a bunch of scripts and a CLI authentication code provider, so for now, I am happy with that.
But I guess that it would be helpful for CLI newcomers that have enabled a second-factor authentication.
So, I can second that to be able to replace the authentication code by a Yubikey would be really helpful.
0 -
Just wanted to also second the request to support U2F in the CLI. Currently trying to lock down our AWS production environment by requiring Yubikey U2F to access anything, but having trouble securing the Access Keys. Having them stored in 1Password and requiring the Yubikey U2F to access would be ideal. I look forward to seeing any future progress!
0 -
Wanted to echo the request for U2F support in the CLI. I wish I could use my YubiKey to log in from the terminal instead of being forced to open Google Authenticator.
0 -
To everyone in this thread: We don't have any short-term plans to add U2F support to the CLI, but it is something we want to add eventually.
We did however add support for persistent MFA in version 0.6, so you'll only need to enter your 6 digit code one time, after which your device will remain authenticated and you'll only need the master password thereafter.
0