2FA: Implement two-factor authentication
Checklist
-
I have summed up the feature in concise words in the Summary section. -
I have completely described the feature in the Description section. -
I have completed the Blockers section.
Summary
Implementation of two-factor authentication, for example with TOTP or HOTP.
Description
Implementation of two-factor authentication, for example with TOTP or HOTP. This is the current security standard. Furthermore, in my opinion, it makes sense to protect packages that can interfere significantly with the system against hackers or attackers with an additional protection bar.
Edited by Marek Küthe