Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
My thinking here was that with client trust enabled (which is the default for new instances I believe), signing in with email and password on a new client requires the handling of the |
1dbe98d to
cfac443
Compare
| }) | ||
|
|
||
| await signUp.verifications.sendEmailCode() | ||
| if (!error) { |
There was a problem hiding this comment.
this is if the user has "verify at sign up" and "email verification code" enabled
they can have email link enabled - will need to think about this
TODO:
/email-passwordthe
email-passwordcustom flow guide examples are using totp (auth app) or backup codes. a few issues with this:email codes are probably a better route here instead of TOTP or backup codes, because email codes are the default second factor when you enable email address.
I've updated the examples to use email codes, and to point to the MFA guide if the user wants to see how to support other second factor strategies.
this led me to revamping the MFA guide, which is now called the second factor guide.
/email-password-mfa-->/second-factorthere are two ways that a second factor can be required for signing in: mfa, or client trust. this is why i've updated the introductory paragraph of the doc to read:
the guide goes on to explain that if the user has both enabled, client trust will use whatever mfa strategies are enabled (TOTP, SMS verification code). if mfa is not enabled, client trust will fallback to whatever verification strategy is enabled for the application (email code, email link, or SMS verification code).
I've revamped this guide in a way to explain that. and to cover all the different strategies that a user may have enabled for second factor verification.