Note: This feature has not been merged yet, so it is not available.
-
Multi-factor authentication (MFA) is a security process that requires
users to provide two or more verification factors to gain access to a system,
application, or account. This adds an extra layer of protection beyond
@@ -7,80 +5,60 @@
By requiring more than one verification method, MFA helps reduce the risk
of unauthorized access, even if someone has obtained your password. It’s
highly recommended for securing sensitive information stored in your notes.
-
Warning! OpenID and TOTP cannot be both used at the same time!
-
Log in with your Google Account with OpenID!
-
OpenID is a standardized way to let you log into websites using an account
- from another service, like Google, to verify your identity.
-
Why Time-based One Time Passwords?
-
TOTP (Time-Based One-Time Password) is a security feature that generates
- a unique, temporary code on your device, like a smartphone, which changes
- every 30 seconds. You use this code, along with your password, to log into
- your account, making it much harder for anyone else to access them.
-
Setup
-
TOTP
-
-
-
Start Trilium Notes normally.
-
-
-
Go to "Menu" -> "Options" -> "MFA"
-
-
-
Click the "Generate TOTP Secret" button
-
-
-
Copy the generated secret to your authentication app/extension
-
-
-
Set an environment variable "TOTP_SECRET" as the generated secret. Environment
- variables can be set with a .env file in the root directory, by defining
- them in the command line, or with a docker container.
# .env in the project root directory
-TOTP_ENABLED="true"
-TOTP_SECRET="secret"
Save the recovery codes. Recovery codes can be used once in place of the
+
+
Log in with your Google Account with OpenID!
+
OpenID is a standardized way to let you log into websites using an account
+ from another service, like Google, to verify your identity.
+
Why Time-based One Time Passwords?
+
TOTP (Time-Based One-Time Password) is a security feature that generates
+ a unique, temporary code on your device, like a smartphone, which changes
+ every 30 seconds. You use this code, along with your password, to log into
+ your account, making it much harder for anyone else to access them.
+
Setup
+
MFA can only be set up on a server instance.
+
+
TOTP
+
+
Go to "Menu" -> "Options" -> "MFA"
+
Click the “Enable Multi-Factor Authentication” checkbox if not checked
+
Choose “Time-Based One-Time Password (TOTP)” under MFA Method
+
Click the "Generate TOTP Secret" button
+
Copy the generated secret to your authentication app/extension
+
Click the "Generate Recovery Codes" button
+
Save the recovery codes. Recovery codes can be used once in place of the
TOTP if you loose access to your authenticator. After a rerecovery code
is used, it will show the unix timestamp when it was used in the MFA options
- tab.
-
-
-
Load the secret into an authentication app like google authenticator
-
-
-
OpenID
-
Currently only compatible with Google. Other services like Authentik and Auth0 are planned on being added.
-
-
In order to setup OpenID, you will need to setup a authentication provider.
- This requires a bit of extra setup. Follow these instructions to
- setup an OpenID service through google.
-
Set an environment variable "SSO_ENABLED" to true and add the client ID
- and secret you obtained from google. Environment variables can be set with
- a .env file in the root directory, by defining them in the command line,
- or with a docker container.
-
.env File
# .env in the project root directory
-SSO_ENABLED="true"
-BASE_URL="http://localhost:8080"
-CLIENT_ID=
-SECRET=
After you restart Trilium Notes, you will be redirected to Google's account
- selection page. Login to an account and Trilium Next will bind to that
- account, allowing you to login with it.
-
You can now login using your google account.
\ No newline at end of file
+ tab.
+
Re-login will be required after TOTP setup is finished (After you refreshing
+ the page).
+
+
OpenID
+
+
In order to setup OpenID, you will need to setup a authentication provider.
+ This requires a bit of extra setup. Follow these instructions to
+ setup an OpenID service through google.