From e96055bb7ecb76babb8bc6708a7b8d616d8babc1 Mon Sep 17 00:00:00 2001 From: Edward Vielmetti Date: Sun, 9 Apr 2017 09:34:00 -0400 Subject: [PATCH] Note standards compliance, RFC 6238. Time-Based One-Time Password Algorithm is the standard, so any 2FA program should work. I'll test with Duo's 2FA token as well, and will update in a separate PR to add that app. --- Using-Mastodon/2FA.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/Using-Mastodon/2FA.md b/Using-Mastodon/2FA.md index 663563a..8ec963c 100644 --- a/Using-Mastodon/2FA.md +++ b/Using-Mastodon/2FA.md @@ -1,8 +1,10 @@ -# 2-Factor Authentication +# Two Factor Authentication -2-Factor Authentication is a security mechanism that requires you to enter a computer generated code from your phone every time you log into Mastodon. +Two Factor Authentication is a security mechanism that requires you to enter a computer generated code from your phone every time you log into Mastodon. -We highly recommend that you set up 2-factor authentication as it prevents malicious users from logging into your account if they obtain your password. +We highly recommend that you set up two factor authentication as it prevents malicious users from logging into your account if they obtain your password. + +The two factor auth protocol used by Mastodon is an implementation of [RFC 6238](https://tools.ietf.org/html/rfc6238), TOTP: Time-Based One-Time Password Algorithm. ## Warning