From d95a313dad7b0acb0d47232d72836b5b719f40c3 Mon Sep 17 00:00:00 2001
From: JYC333 <22962980+JYC333@users.noreply.github.com>
Date: Fri, 16 May 2025 10:41:32 +0800
Subject: [PATCH 1/5] update MFA docs
---
.../Multi-Factor Authentication.html | 90 ++++++-------------
.../User Guide/Note Types/Code.html | 2 +-
.../Multi-Factor Authentication.md | 78 ++++------------
3 files changed, 48 insertions(+), 122 deletions(-)
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
index f9a809a86..362a5d1f8 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
@@ -1,5 +1,3 @@
-
Note: This feature has not been merged yet, so it is not available.
-
Multi-factor authentication (MFA) is a security process that requires
users to provide two or more verification factors to gain access to a system,
application, or account. This adds an extra layer of protection beyond
@@ -7,7 +5,8 @@
By requiring more than one verification method, MFA helps reduce the risk
of unauthorized access, even if someone has obtained your password. It’s
highly recommended for securing sensitive information stored in your notes.
-Warning! OpenID and TOTP cannot be both used at the same time!
+Warning : OpenID and TOTP cannot be both used at the same
+ time!
Log in with your Google Account with OpenID!
OpenID is a standardized way to let you log into websites using an account
from another service, like Google, to verify your identity.
@@ -17,48 +16,21 @@
every 30 seconds. You use this code, along with your password, to log into
your account, making it much harder for anyone else to access them.
Setup
+MFA can only setup on server instance.
TOTP
-
- Start Trilium Notes normally.
-
-
- Go to "Menu" -> "Options" -> "MFA"
-
-
- Click the "Generate TOTP Secret" button
-
-
- Copy the generated secret to your authentication app/extension
-
-
- Set an environment variable "TOTP_SECRET" as the generated secret. Environment
- variables can be set with a .env file in the root directory, by defining
- them in the command line, or with a docker container.
# .env in the project root directory
-TOTP_ENABLED="true"
-TOTP_SECRET="secret"
# Terminal/CLI
-export TOTP_ENABLED="true"
-export TOTP_SECRET="secret"
# Docker
-docker run -p 8080:8080 -v ~/trilium-data:/home/node/trilium-data -e TOTP_ENABLED="true" -e TOTP_SECRET="secret" triliumnext/notes:[VERSION]
-
-
- Restart Trilium
-
-
- Go to "Options" -> "MFA"
-
-
- Click the "Generate Recovery Codes" button
-
-
- Save the recovery codes. Recovery codes can be used once in place of the
- TOTP if you loose access to your authenticator. After a rerecovery code
- is used, it will show the unix timestamp when it was used in the MFA options
- tab.
-
-
- Load the secret into an authentication app like google authenticator
-
+ Go to "Menu" -> "Options" -> "MFA"
+ Click the “Enable Multi-Factor Authentication” checkbox if not checked
+ Choose “Time-Based One-Time Password (TOTP)” under MFA Method
+ Click the "Generate TOTP Secret" button
+ Copy the generated secret to your authentication app/extension
+ Click the "Generate Recovery Codes" button
+ Save the recovery codes. Recovery codes can be used once in place of the
+ TOTP if you loose access to your authenticator. After a rerecovery code
+ is used, it will show the unix timestamp when it was used in the MFA options
+ tab.
+ Re-login will be required after TOTP setup is finished (After you refreshing
+ the page).
OpenID
Currently only compatible with Google. Other services like Authentik and Auth0 are planned on being added.
@@ -66,21 +38,17 @@ docker run -p 8080:8080 -v ~/trilium-data:/home/node/trilium-data -e TOTP_ENABLE
In order to setup OpenID, you will need to setup a authentication provider.
This requires a bit of extra setup. Follow these instructions to
setup an OpenID service through google.
-Set an environment variable "SSO_ENABLED" to true and add the client ID
- and secret you obtained from google. Environment variables can be set with
- a .env file in the root directory, by defining them in the command line,
- or with a docker container.
-.env File # .env in the project root directory
-SSO_ENABLED="true"
-BASE_URL="http://localhost:8080"
-CLIENT_ID=
-SECRET=
-Environment variable (linux) export SSO_ENABLED="true"
-export BASE_URL="http://localhost:8080"
-export CLIENT_ID=
-export SECRET=
-Docker docker run -d -p 8080:8080 -v ~/trilium-data:/home/node/trilium-data -e SSO_ENABLED="true" -e BASE_URL="http://localhost:8080" -e CLIENT_ID= -e SECRET= triliumnext/notes:[VERSION]
-After you restart Trilium Notes, you will be redirected to Google's account
- selection page. Login to an account and Trilium Next will bind to that
- account, allowing you to login with it.
-You can now login using your google account.
\ No newline at end of file
+
+ Set the oauthBaseUrl
, oauthClientId
and oauthClientSecret
in
+ the config.ini
file, which located under the Trilium data folder.
+
+ You can also setup through environment variables (TRILIUM_OAUTH_BASE_URL
, TRILIUM_OAUTH_CLIENT_ID
and TRILIUM_OAUTH_CLIENT_SECRET
),
+ but the recommanded way is setup through config.ini
file.
+
+
+ Restart the server
+ Go to "Menu" -> "Options" -> "MFA"
+ Click the “Enable Multi-Factor Authentication” checkbox if not checked
+ Choose “OAuth/OpenID” under MFA Method
+ Refresh the page and login through OpenID provider
+
\ No newline at end of file
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Note Types/Code.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Note Types/Code.html
index d84f08784..95e10fd24 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Note Types/Code.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Note Types/Code.html
@@ -40,7 +40,7 @@
Color schemes
Since Trilium 0.94.0 the colors of code notes can be customized by going
Options → Code Notes and looking for the Appearance section.
+ class="reference-link" href="#root/_help_4TIF1oA4VQRO">Options → Code Notes and looking for the Appearance section.
Why are there only a few themes whereas the code block themes for text notes have a lot?
diff --git a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
index a5ce30da6..ceeac36d2 100644
--- a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
+++ b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
@@ -1,11 +1,9 @@
# Multi-Factor Authentication
-**Note: This feature has not been merged yet, so it is not available.**
-
Multi-factor authentication (MFA) is a security process that requires users to provide two or more verification factors to gain access to a system, application, or account. This adds an extra layer of protection beyond just using a password.
By requiring more than one verification method, MFA helps reduce the risk of unauthorized access, even if someone has obtained your password. It’s highly recommended for securing sensitive information stored in your notes.
-Warning! OpenID and TOTP cannot be both used at the same time!
+**Warning**: OpenID and TOTP cannot be both used at the same time!
## Log in with your Google Account with OpenID!
@@ -17,35 +15,18 @@ TOTP (Time-Based One-Time Password) is a security feature that generates a uniqu
## Setup
+MFA can only setup on server instance.
+
### TOTP
-1. Start Trilium Notes normally.
-2. Go to "Menu" -> "Options" -> "MFA"
-3. Click the "Generate TOTP Secret" button
-4. Copy the generated secret to your authentication app/extension
-5. Set an environment variable "TOTP\_SECRET" as the generated secret. Environment variables can be set with a .env file in the root directory, by defining them in the command line, or with a docker container.
-
- ```
- # .env in the project root directory
- TOTP_ENABLED="true"
- TOTP_SECRET="secret"
- ```
-
- ```
- # Terminal/CLI
- export TOTP_ENABLED="true"
- export TOTP_SECRET="secret"
- ```
-
- ```
- # Docker
- docker run -p 8080:8080 -v ~/trilium-data:/home/node/trilium-data -e TOTP_ENABLED="true" -e TOTP_SECRET="secret" triliumnext/notes:[VERSION]
- ```
-6. Restart Trilium
-7. Go to "Options" -> "MFA"
-8. Click the "Generate Recovery Codes" button
-9. Save the recovery codes. Recovery codes can be used once in place of the TOTP if you loose access to your authenticator. After a rerecovery code is used, it will show the unix timestamp when it was used in the MFA options tab.
-10. Load the secret into an authentication app like google authenticator
+1. Go to "Menu" -> "Options" -> "MFA"
+2. Click the “Enable Multi-Factor Authentication” checkbox if not checked
+3. Choose “Time-Based One-Time Password (TOTP)” under MFA Method
+4. Click the "Generate TOTP Secret" button
+5. Copy the generated secret to your authentication app/extension
+6. Click the "Generate Recovery Codes" button
+7. Save the recovery codes. Recovery codes can be used once in place of the TOTP if you loose access to your authenticator. After a rerecovery code is used, it will show the unix timestamp when it was used in the MFA options tab.
+8. Re-login will be required after TOTP setup is finished (After you refreshing the page).
### OpenID
@@ -53,33 +34,10 @@ _Currently only compatible with Google. Other services like Authentik and Auth0
In order to setup OpenID, you will need to setup a authentication provider. This requires a bit of extra setup. Follow [these instructions](https://developers.google.com/identity/openid-connect/openid-connect) to setup an OpenID service through google.
-Set an environment variable "SSO\_ENABLED" to true and add the client ID and secret you obtained from google. Environment variables can be set with a .env file in the root directory, by defining them in the command line, or with a docker container.
-
-#### .env File
-
-```
-# .env in the project root directory
-SSO_ENABLED="true"
-BASE_URL="http://localhost:8080"
-CLIENT_ID=
-SECRET=
-```
-
-#### Environment variable (linux)
-
-```
-export SSO_ENABLED="true"
-export BASE_URL="http://localhost:8080"
-export CLIENT_ID=
-export SECRET=
-```
-
-#### Docker
-
-```
-docker run -d -p 8080:8080 -v ~/trilium-data:/home/node/trilium-data -e SSO_ENABLED="true" -e BASE_URL="http://localhost:8080" -e CLIENT_ID= -e SECRET= triliumnext/notes:[VERSION]
-```
-
-After you restart Trilium Notes, you will be redirected to Google's account selection page. Login to an account and Trilium Next will bind to that account, allowing you to login with it.
-
-You can now login using your google account.
\ No newline at end of file
+1. Set the `oauthBaseUrl`, `oauthClientId` and `oauthClientSecret` in the `config.ini` file, which located under the Trilium data folder.
+ 1. You can also setup through environment variables (`TRILIUM_OAUTH_BASE_URL`, `TRILIUM_OAUTH_CLIENT_ID` and `TRILIUM_OAUTH_CLIENT_SECRET`), but the recommanded way is setup through `config.ini` file.
+2. Restart the server
+3. Go to "Menu" -> "Options" -> "MFA"
+4. Click the “Enable Multi-Factor Authentication” checkbox if not checked
+5. Choose “OAuth/OpenID” under MFA Method
+6. Refresh the page and login through OpenID provider
\ No newline at end of file
From 479ef6348079bfb0624b39a6dd359be8202c914e Mon Sep 17 00:00:00 2001
From: JYC333 <22962980+JYC333@users.noreply.github.com>
Date: Fri, 16 May 2025 11:02:06 +0800
Subject: [PATCH 2/5] update MFA docs
---
.../Server Installation/Multi-Factor Authentication.html | 6 +++---
.../Server Installation/Multi-Factor Authentication.md | 4 ++--
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
index 362a5d1f8..0ec7a8756 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
@@ -40,10 +40,10 @@
setup an OpenID service through google.
Set the oauthBaseUrl
, oauthClientId
and oauthClientSecret
in
- the config.ini
file, which located under the Trilium data folder.
+ the config.ini
file (check Configuration (config.ini or environment variables) for
+ more information).
- You can also setup through environment variables (TRILIUM_OAUTH_BASE_URL
, TRILIUM_OAUTH_CLIENT_ID
and TRILIUM_OAUTH_CLIENT_SECRET
),
- but the recommanded way is setup through config.ini
file.
+ You can also setup through environment variables (TRILIUM_OAUTH_BASE_URL
, TRILIUM_OAUTH_CLIENT_ID
and TRILIUM_OAUTH_CLIENT_SECRET
).
Restart the server
diff --git a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
index ceeac36d2..f3cbe1335 100644
--- a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
+++ b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
@@ -34,8 +34,8 @@ _Currently only compatible with Google. Other services like Authentik and Auth0
In order to setup OpenID, you will need to setup a authentication provider. This requires a bit of extra setup. Follow [these instructions](https://developers.google.com/identity/openid-connect/openid-connect) to setup an OpenID service through google.
-1. Set the `oauthBaseUrl`, `oauthClientId` and `oauthClientSecret` in the `config.ini` file, which located under the Trilium data folder.
- 1. You can also setup through environment variables (`TRILIUM_OAUTH_BASE_URL`, `TRILIUM_OAUTH_CLIENT_ID` and `TRILIUM_OAUTH_CLIENT_SECRET`), but the recommanded way is setup through `config.ini` file.
+1. Set the `oauthBaseUrl`, `oauthClientId` and `oauthClientSecret` in the `config.ini` file (check Configuration (config.ini or environment variables) for more information).
+ 1. You can also setup through environment variables (`TRILIUM_OAUTH_BASE_URL`, `TRILIUM_OAUTH_CLIENT_ID` and `TRILIUM_OAUTH_CLIENT_SECRET`).
2. Restart the server
3. Go to "Menu" -> "Options" -> "MFA"
4. Click the “Enable Multi-Factor Authentication” checkbox if not checked
From 2f3f8b31cf1e66862ef14b1f750c267b238ccd85 Mon Sep 17 00:00:00 2001
From: JYC333 <22962980+JYC333@users.noreply.github.com>
Date: Sat, 17 May 2025 10:13:00 +0800
Subject: [PATCH 3/5] improve MFA docs
---
.../Server Installation/Multi-Factor Authentication.html | 2 +-
docs/User Guide/!!!meta.json | 7 +++++++
.../Server Installation/Multi-Factor Authentication.md | 2 +-
3 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
index 0ec7a8756..d7b14e017 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
@@ -16,7 +16,7 @@
every 30 seconds. You use this code, along with your password, to log into
your account, making it much harder for anyone else to access them.
Setup
-MFA can only setup on server instance.
+MFA can only be set up on a server instance.
TOTP
Go to "Menu" -> "Options" -> "MFA"
diff --git a/docs/User Guide/!!!meta.json b/docs/User Guide/!!!meta.json
index 2a19d33a0..3acbe598c 100644
--- a/docs/User Guide/!!!meta.json
+++ b/docs/User Guide/!!!meta.json
@@ -666,6 +666,13 @@
"type": "text",
"mime": "text/markdown",
"attributes": [
+ {
+ "type": "relation",
+ "name": "internalLink",
+ "value": "Gzjqa934BdH4",
+ "isInheritable": false,
+ "position": 10
+ },
{
"type": "label",
"name": "shareAlias",
diff --git a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
index f3cbe1335..a25269bdf 100644
--- a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
+++ b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
@@ -15,7 +15,7 @@ TOTP (Time-Based One-Time Password) is a security feature that generates a uniqu
## Setup
-MFA can only setup on server instance.
+MFA can only be set up on a server instance.
### TOTP
From 4dcb697a8fe346e810b2aaf07c50deaa9aa7e5db Mon Sep 17 00:00:00 2001
From: JYC333 <22962980+JYC333@users.noreply.github.com>
Date: Sat, 17 May 2025 15:26:51 +0800
Subject: [PATCH 4/5] use admonition
---
.../Multi-Factor Authentication.html | 98 ++++++++++---------
.../Multi-Factor Authentication.md | 6 +-
2 files changed, 55 insertions(+), 49 deletions(-)
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
index d7b14e017..303adb93c 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
@@ -5,50 +5,54 @@
By requiring more than one verification method, MFA helps reduce the risk
of unauthorized access, even if someone has obtained your password. It’s
highly recommended for securing sensitive information stored in your notes.
-Warning : OpenID and TOTP cannot be both used at the same
- time!
-Log in with your Google Account with OpenID!
-OpenID is a standardized way to let you log into websites using an account
- from another service, like Google, to verify your identity.
-Why Time-based One Time Passwords?
-TOTP (Time-Based One-Time Password) is a security feature that generates
- a unique, temporary code on your device, like a smartphone, which changes
- every 30 seconds. You use this code, along with your password, to log into
- your account, making it much harder for anyone else to access them.
-Setup
-MFA can only be set up on a server instance.
-TOTP
-
- Go to "Menu" -> "Options" -> "MFA"
- Click the “Enable Multi-Factor Authentication” checkbox if not checked
- Choose “Time-Based One-Time Password (TOTP)” under MFA Method
- Click the "Generate TOTP Secret" button
- Copy the generated secret to your authentication app/extension
- Click the "Generate Recovery Codes" button
- Save the recovery codes. Recovery codes can be used once in place of the
- TOTP if you loose access to your authenticator. After a rerecovery code
- is used, it will show the unix timestamp when it was used in the MFA options
- tab.
- Re-login will be required after TOTP setup is finished (After you refreshing
- the page).
-
-OpenID
-Currently only compatible with Google. Other services like Authentik and Auth0 are planned on being added.
-
-In order to setup OpenID, you will need to setup a authentication provider.
- This requires a bit of extra setup. Follow these instructions to
- setup an OpenID service through google.
-
- Set the oauthBaseUrl
, oauthClientId
and oauthClientSecret
in
- the config.ini
file (check Configuration (config.ini or environment variables) for
- more information).
-
- You can also setup through environment variables (TRILIUM_OAUTH_BASE_URL
, TRILIUM_OAUTH_CLIENT_ID
and TRILIUM_OAUTH_CLIENT_SECRET
).
-
-
- Restart the server
- Go to "Menu" -> "Options" -> "MFA"
- Click the “Enable Multi-Factor Authentication” checkbox if not checked
- Choose “OAuth/OpenID” under MFA Method
- Refresh the page and login through OpenID provider
-
\ No newline at end of file
+
+ Log in with your Google Account with OpenID!
+ OpenID is a standardized way to let you log into websites using an account
+ from another service, like Google, to verify your identity.
+ Why Time-based One Time Passwords?
+ TOTP (Time-Based One-Time Password) is a security feature that generates
+ a unique, temporary code on your device, like a smartphone, which changes
+ every 30 seconds. You use this code, along with your password, to log into
+ your account, making it much harder for anyone else to access them.
+ Setup
+ MFA can only be set up on a server instance.
+ TOTP
+
+ Go to "Menu" -> "Options" -> "MFA"
+ Click the “Enable Multi-Factor Authentication” checkbox if not checked
+ Choose “Time-Based One-Time Password (TOTP)” under MFA Method
+ Click the "Generate TOTP Secret" button
+ Copy the generated secret to your authentication app/extension
+ Click the "Generate Recovery Codes" button
+ Save the recovery codes. Recovery codes can be used once in place of the
+ TOTP if you loose access to your authenticator. After a rerecovery code
+ is used, it will show the unix timestamp when it was used in the MFA options
+ tab.
+ Re-login will be required after TOTP setup is finished (After you refreshing
+ the page).
+
+ OpenID
+
+ Currently only compatible with Google. Other services like Authentik and
+ Auth0 are planned on being added.
+
+ In order to setup OpenID, you will need to setup a authentication provider.
+ This requires a bit of extra setup. Follow these instructions to
+ setup an OpenID service through google.
+
+ Set the oauthBaseUrl
, oauthClientId
and oauthClientSecret
in
+ the config.ini
file (check Configuration (config.ini or environment variables) for
+ more information).
+
+ You can also setup through environment variables (TRILIUM_OAUTH_BASE_URL
, TRILIUM_OAUTH_CLIENT_ID
and TRILIUM_OAUTH_CLIENT_SECRET
).
+
+
+ Restart the server
+ Go to "Menu" -> "Options" -> "MFA"
+ Click the “Enable Multi-Factor Authentication” checkbox if not checked
+ Choose “OAuth/OpenID” under MFA Method
+ Refresh the page and login through OpenID provider
+
\ No newline at end of file
diff --git a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
index a25269bdf..fdfc61a2c 100644
--- a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
+++ b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
@@ -3,7 +3,8 @@ Multi-factor authentication (MFA) is a security process that requires users to p
By requiring more than one verification method, MFA helps reduce the risk of unauthorized access, even if someone has obtained your password. It’s highly recommended for securing sensitive information stored in your notes.
-**Warning**: OpenID and TOTP cannot be both used at the same time!
+> [!WARNING]
+> OpenID and TOTP cannot be both used at the same time!
## Log in with your Google Account with OpenID!
@@ -30,7 +31,8 @@ MFA can only be set up on a server instance.
### OpenID
-_Currently only compatible with Google. Other services like Authentik and Auth0 are planned on being added._
+> [!NOTE]
+> Currently only compatible with Google. Other services like Authentik and Auth0 are planned on being added.
In order to setup OpenID, you will need to setup a authentication provider. This requires a bit of extra setup. Follow [these instructions](https://developers.google.com/identity/openid-connect/openid-connect) to setup an OpenID service through google.
From 3222765bb6160dcfc7cfbe9d3b4e6214fafdfc68 Mon Sep 17 00:00:00 2001
From: JYC333 <22962980+JYC333@users.noreply.github.com>
Date: Sat, 17 May 2025 16:00:15 +0800
Subject: [PATCH 5/5] add sync known issue
---
.../Server Installation/Multi-Factor Authentication.html | 6 ++++++
.../Server Installation/Multi-Factor Authentication.md | 3 +++
2 files changed, 9 insertions(+)
diff --git a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
index 303adb93c..8145def6a 100644
--- a/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
+++ b/apps/server/src/assets/doc_notes/en/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.html
@@ -19,6 +19,12 @@ class="admonition warning">
your account, making it much harder for anyone else to access them.
Setup
MFA can only be set up on a server instance.
+
+ When Multi-Factor Authentication (MFA) is enabled on a server instance,
+ a new desktop instance may fail to sync with it. As a temporary workaround,
+ you can disable MFA to complete the initial sync, then re-enable MFA afterward.
+ This issue will be addressed in a future release.
+
TOTP
Go to "Menu" -> "Options" -> "MFA"
diff --git a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
index fdfc61a2c..a2bf3f7e4 100644
--- a/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
+++ b/docs/User Guide/User Guide/Installation & Setup/Server Installation/Multi-Factor Authentication.md
@@ -18,6 +18,9 @@ TOTP (Time-Based One-Time Password) is a security feature that generates a uniqu
MFA can only be set up on a server instance.
+> [!NOTE]
+> When Multi-Factor Authentication (MFA) is enabled on a server instance, a new desktop instance may fail to sync with it. As a temporary workaround, you can disable MFA to complete the initial sync, then re-enable MFA afterward. This issue will be addressed in a future release.
+
### TOTP
1. Go to "Menu" -> "Options" -> "MFA"