At the moment, Pi Connect uses a login at a web browser and a OTP password from a mobile phone authenticator app (Google, MS etc) at the id.raspberrypi.com web page to sign into a Raspberry Pi ID.
Whilst the 2FA is much appreciated for hardening against attack as the Pi is available worldwide, is there any intention to enable 2FA using a FIDO2 USB key (like a Yubikey) instead? This would remove the need to have a mobile phone (app) as 2FA and just a Yubikey-like token and a laptop/desktop to login to a remote RPi.
if not considered, can I please add this to the request pile of future features...?
Whilst the 2FA is much appreciated for hardening against attack as the Pi is available worldwide, is there any intention to enable 2FA using a FIDO2 USB key (like a Yubikey) instead? This would remove the need to have a mobile phone (app) as 2FA and just a Yubikey-like token and a laptop/desktop to login to a remote RPi.
if not considered, can I please add this to the request pile of future features...?
Statistics: Posted by dharmOS — Wed Apr 23, 2025 7:05 pm — Replies 0 — Views 28