feat: show if user has 2fa or is federated user in api#3971
Merged
shreddedbacon merged 3 commits intomainfrom Sep 10, 2025
Merged
feat: show if user has 2fa or is federated user in api#3971shreddedbacon merged 3 commits intomainfrom
shreddedbacon merged 3 commits intomainfrom
Conversation
8cf49c5 to
b7bf3a7
Compare
shreddedbacon
commented
Sep 8, 2025
b7bf3a7 to
d79f349
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
General Checklist
Database Migrations
Description
Currently the only way to check if a user has 2fa enabled is to log in to keycloak as admin to check users individually. This is not ideal, as it can be time consuming and requires users to log in to keycloak directly, which we want to limit.
Another is detecting if a user is using an identity provider instead of direct user access.
This feature will now show if a user has 1 or more 2fa features enabled by setting a
has2faEnabledflag on their account in the API. It currently can detect if a user is using totp or webauthn, but the flag is just atrue|falseThe federated user check will also only detect if the user has any federated identities, and if so will flag the user as a federated user. This appears as
isFederatedUserwhich is also atrue|falseThe UI could also be extended to display this status so organization owners can see which of their users have 2fa enabled, or which are federated users (SSO).
Example in organization users page:
