Laravel Two-Factor Authentication
Introduction
This package allow you to enable two-factor authentication in your Laravel applications very easily, without the need to add middleware or any modification to your routes. It stores tokens in your database in a distinct table, so you don't need to alter your users
table. Notify users about their token via mail, SMS or any custom channel.
Includes native conditionnal check to trigger or not 2FA : you may skip the check when the user is using a known browser, IP address, IP Geo location, or any custom rule.
This package was inspired by the srmklive/laravel-twofactor-authentication package, which supports the Authy 2FA auth.
Installation
- Use composer to install the package :
composer require hydrat-agency/laravel-2fa
- Add the service provider to your
providers
array inconfig/app.php
file like so:
'providers' => [
[...]
/*
* Package Service Providers...
*/
Hydrat\Laravel2FA\Laravel2FAServiceProvider::class,
],
- Run the following command to publish assets :
php artisan vendor:publish --provider "Hydrat\Laravel2FA\Laravel2FAServiceProvider"
- Run the following command to migrate database :
php artisan migrate
- Add the following lines in your User model (e.g
App\Models\User.php
)
- Before the class declaration, add these lines:
use Hydrat\Laravel2FA\TwoFactorAuthenticatable;
use Hydrat\Laravel2FA\Contracts\TwoFactorAuthenticatableContract;
- Alter the class definition to implements the
TwoFactorAuthenticatableContract
contract :
class User extends Authenticatable implements AuthenticatableContract,
AuthorizableContract,
CanResetPasswordContract,
TwoFactorAuthenticatableContract
- Add the
TwoFactorAuthenticatable
trait :
use Authenticatable,
Authorizable,
CanResetPassword,
TwoFactorAuthenticatable;
-
Make sure your user model is using the Notifiable trait.
-
You need to change the login workflow by adding the
authenticated
method to yourapp\Http\Controllers\Auth\LoginController.php
class.
namespace App\Http\Controllers\Auth;
use Hydrat\Laravel2FA\TwoFactorAuth;
class LoginController extends Controller
{
/** [...] **/
/**
* The user has been authenticated.
*
* @param \Illuminate\Http\Request $request
* @param mixed $user
* @return mixed
*/
protected function authenticated(Request $request, $user)
{
# Trigger 2FA if necessary.
if (TwoFactorAuth::getDriver()->mustTrigger($request, $user)) {
return TwoFactorAuth::getDriver()->trigger($request, $user);
}
# If not, do the usual job.
return redirect()->intended($this->redirectPath());
}
/**
* The user has been authenticated.
*
* @param \Illuminate\Http\Request $request
* @param mixed $user
* @return mixed
*/
protected function authenticated(Request $request, $user)
{
return TwoFactorAuth::getDriver()->maybeTrigger($request, $user)
?: redirect()->intended($this->redirectPath());
}
That's it ! Now you want to personalize your view and see the configuration section.
Building the view
When you published the package assets, a new resources/views/auth/2fa/token.blade.php
file has been created. It's up to you how you design this page, but you MUST keep the token
form input name and send the form to the route('auth.2fa.store')
route.
You may notice a $reason
variable which tells you why the 2FA auth has been triggered. It's up to you to display it to the user or not, based on your app needs.
Configuration
All configurations are set in the config/laravel-2fa.php
file which have been created when you published the package.
Built-in
First of all, you will need to choose which policies applies. A Policy
job is to check if the two-factor auth must occur, or if it can be skipped (e.g : the browser is known ? skeep the two-factor auth).
The policies are defined in the policy
key. Rules can be combined, with an order of priority. Each policy is called, and tells the driver if it should trigger the two-factor auth. When a policy requires a two-factor auth, the check stop and its returned message
will be used as the $reason
in the view (see Building the view section).
If none of policies triggers, or if the policy
array is empty, the two-factor authentication is skipped and the user logs in normally.
return [
'policy' => [
'browser', // first check if we know the browser
'geoip', // if so, check if we know the user ip location
// if so, no more rules : skip 2FA.
],
];
Built-in policies are :
Policy name | Description |
---|---|
always |
The 2FA always triggers when logging in. |
browser |
Skip 2FA if we know the browser (using a cookie). |
geoip |
Skip 2FA if we know the IP address location (based on country, region, city or timezone) |
ip |
Skip 2FA if we know the IP address. |
Some policies has additionnal settings, which are self-documented in the configuration file.
return [
/*
|--------------------------------------------------------------------------
| The 2FA package options.
|--------------------------------------------------------------------------
|
| Here you may specify the package options, such as policies parameters.
|
*/
'options' => [
# 2FA token lifetime in minutes.
'token_lifetime' => 10,
'policies' => [
# Can be one of "country", "region", "city", "time_zone".
'geoip' => 'country',
# Cookie expiration time in minutes (default 30 days).
'browser' => 30 * 1440,
],
],
];
Cutom notification
This package uses the laravel notifications system. The built-in notification TwoFactorToken
sends the two-factor token to the user via mail.
You can extend this notification and configure other channels such as SMS by extending this class :
namespace App\Notifications;
use Hydrat\Laravel2FA\Notifications\TwoFactorToken as BaseTwoFactorToken;
class TwoFactorToken extends BaseTwoFactorToken
{
/**
* Get the notification's delivery channels.
*
* @param mixed $notifiable
* @return array
*/
public function via($notifiable)
{
return [
'nexmo',
];
}
/**
* Get the Vonage / SMS representation of the notification.
*
* @param mixed $notifiable
* @return NexmoMessage
*/
public function toNexmo($notifiable)
{
return (new NexmoMessage)
->content('Your two-factor token is ' . $this->token)
->from('MYAPP');
}
}
You'll need to change the notification
configuration key to specify your new notification class :
return [
[...]
/*
|--------------------------------------------------------------------------
| The 2FA notification containing the token.
|--------------------------------------------------------------------------
|
| Here you may specify an alternative notification to use.
|
*/
'notification' => \App\Notifications\TwoFactorToken::class,
];
Custom policies
If you are not satisfied by built-in policies, you may overwrite an existing policy or create you own.
All policies MUST extending the AbstractPolicy
.
To overwrite an existing policy, you may directly extend the policy class :
namespace App\Auth\Policies;
use Hydrat\Laravel2FA\Policies\IpPolicy as BaseIpPolicy;
class IpPolicy extends BaseIpPolicy
{
/**
* Check that the request passes the policy.
* If this return false, the 2FA Auth will be triggered.
*
* @return bool
*/
public function passes(): bool
{
# Passes the check if the user didn't activate IpPolicy on his account.
if ( ! $this->user->hasTwoFactorAuthActiveForIp()) {
return true;
}
# Else, run the IpPolicy check.
return parent::passes();
}
/**
* The reason sent to the Notification and the frontend view,
* to tell the user why the 2FA check was triggered.
*
* @return string
*/
public function message(): string
{
return $this->message ?: __('your account activated 2FA for unknown IP adresses.');
}
}
Then, change the mapping
array in the settings :
return [
[...]
'mapping' => [
[...]
'ip' => \Auth\Policies\IpPolicy::class,
],
];
passes()
method :
/**
* The incomming request at login.
*
* @var \Illuminate\Http\Request
*/
protected $request = null;
/**
* The user that just loggued in.
*
* @var \Hydrat\Laravel2FA\Contracts\TwoFactorAuthenticatableContract
*/
protected $user = null;
/**
* The login attempt, with UID and IP address data.
*
* @var \Hydrat\Laravel2FA\Models\LoginAttempt
*/
protected $attempt = null;
Creating a policy is trivial. For example, let's say your user might activate 2FA for their account in settings. You could create a policy which verify if the user activated 2FA, and if so fails the passes()
method, which result in triggering the 2FA auth :
namespace App\Auth\Policies;
use Hydrat\Laravel2FA\Policies\AbstractPolicy;
class ActivePolicy extends AbstractPolicy
{
/**
* Check that the request passes the policy.
* If this return false, the 2FA Auth will be triggered.
*
* @return bool
*/
public function passes(): bool
{
return $this->user->hasTwoFactorAuthActive() ? false : true;
}
/**
* The reason sent to the Notification and the frontend view,
* to tell the user why the 2FA check was triggered.
*
* @return string
*/
public function message(): string
{
return $this->message ?: __('your account activated the 2FA auth');
}
}
You may also have different checks which results in different $reason
messages :
namespace App\Auth\Policies;
use Hydrat\Laravel2FA\Policies\AbstractPolicy;
class ActivePolicy extends AbstractPolicy
{
/**
* Check that the request passes the policy.
* If this return false, the 2FA Auth will be triggered.
*
* @return bool
*/
public function passes(): bool
{
if ($this->user->hasTwoFactorAuthActive()) {
$this->message = __('your account activated the 2FA auth');
return false;
}
if ($this->user->didntSpecifyTwoAuthActive()) {
$this->message = __('2FA auth is activated by default');
return false;
}
if (anyReason()) {
return false; // will use the default reason used in message() method.
}
return true;
}
/**
* The reason sent to the Notification and the frontend view,
* to tell the user why the 2FA check was triggered.
*
* @return string
*/
public function message(): string
{
return $this->message ?: __('2FA auth is automatically activated for your account');
}
}
After creating your policy, you may use it in configuration file :
return [
'policy' => [
\Auth\Policies\ActivePolicy::class,
],
];
Event better, you can create a shortname to keep your policy
array clean !
return [
'policy' => [
'active', // your new rule !
'browser', // if 2FA is not activated for the account, will check anyways if the browser is known
],
[...]
'mapping' => [
[...]
'active' => \Auth\Policies\ActivePolicy::class,
],
];
Some policies need to perform actions when a user successfully log in with 2FA complete (e.g: write a cookie or something in the database). You can define your callback in the onSucceed()
method of your Policy :
/**
* An action to perform on successful 2FA login.
* May be used to remember stuff for the next policy check.
*
* @return void
*/
public function onSucceed(): void
{
Cookie::queue(
'2fa_remember',
$this->attempt->uid,
1440
);
}
Custom driver
If you need more flexibility in the whole process, you can extend the BaseDriver
class and change its workflow by overwriting any method.
namespace App\Auth\Drivers;
use Hydrat\Laravel2FA\Drivers\BaseDriver;
use Hydrat\Laravel2FA\Contracts\TwoFactorAuthenticatableContract as Authenticatable;
class CustomDriver extends BaseDriver
{
/**
* Check if must trigger 2FA token for this user.
*
* @param \Illuminate\Http\Request $request
* @param \Hydrat\Laravel2FA\Contracts\TwoFactorAuthenticatableContract $user
*
* @return bool
*/
public function mustTrigger(Request $request, Authenticatable $user): bool
{
// custom workflow.
}
}
Don't forget to update the driver
key in the config file :
return [
'driver' => \App\Auth\Drivers\CustomDriver::class;
];
Contribute
Feel free to contribute to the package !
First contribution guide