mirror of
https://github.com/bitwarden/help
synced 2026-01-05 01:53:14 +00:00
Misc 07 12 (#673)
* add APR to feature table * add APR to 2019-2020 plan diff * update enterprise 2019-2020 description * clarification in data-storage * faq re: requiring 2fa, org duo, etc. * 'why keep your server updated' description updates * Updated B.Extension TOTP Copy information
This commit is contained in:
committed by
GitHub
parent
d5fb45810e
commit
3e1237de7a
@@ -15,6 +15,10 @@ This article contains Frequently Asked Questions (FAQs) regarding **Two-step Log
|
||||
|
||||
**A:** Bitwarden does not support SMS 2FA due to vulnerabilities, including SIM hijacking. We do not recommend SMS 2FA for other accounts unless it is the only available method. Any second factor is recommended over having none, but most alternatives are safer than SMS 2FA.
|
||||
|
||||
### Q: Can I require my Organization's users to use Two-step Login?
|
||||
|
||||
**A:** You can require your Organization's users to use Two-step Login by enabling the [Two-step Login Policy]({{site.baseurl}}/article/policies/#two-step-login). Additionally, you can setup [Organization-wide Duo 2FA]({{site.baseurl}}/article/two-step-login-duo) to ensure that all of your users have a secure Two-step Login method at their disposal.
|
||||
|
||||
### Q: Is FIDO U2F or FIDO2 WebAuthn supported on my iOS or Android App?
|
||||
|
||||
**A:** At this time, due to platform/OS limitations, FIDO is **only supported for Web Vaults, Browser Extensions, and Windows Desktop Apps**, however we are currently investigating ways to implement this. In the meantime, we recommend enabling another [Two-step Login Method]({% link _articles/two-step-login/setup-two-step-login.md %}) for use with unsupported client applications.
|
||||
|
||||
Reference in New Issue
Block a user