- Require two-factor authentication for everyone in the The Astropy Project organization.- Members, billing managers, and outside collaborators who do not have two-factor authentication enabled for their personal account will be removed from the organization and will receive an email notifying them about the change.
https://github.com/astropy/astropy/graphs/contributors is NOT affected. That comes from git commit math, which is completely separate from GitHub org membership. You do not have to be a member of the org to contribute, so this concern about new and occasional contributors is misplaced. This policy only affects you if you are in the org membership AND you do not already have 2FA. I think most developers already have 2FA (I do not want to go into the debate of how secure it actually is but it is better than nothing).
--
You received this message because you are subscribed to the Google Groups "astropy-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to astropy-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/astropy-dev/1B6B8D5A-9C59-4257-B43C-9126F40497C6%40gwdg.de.
Users in your organization will soon be required to enable 2FA
... the "astropy" organization which contains 127 users that meet the updated criteria for the two-factor authentication requirement program. Of these 127 users, 82 already have 2FA enabled. Read on to learn what that means for your users, and how to prepare.
This enrollment is not related to your organization settings or account. It is based on the individual actions and privileges of your organization's users on GitHub.com, both within your organization and outside of it.
What is GitHub's required 2FA program?GitHub is expanding the 2FA program announced last year. When we launched this program in March, we only included users who had published an app, Action, or Package. Starting next week, we'll ask users who have published a release of a repository or manage critical repositories to also enable 2FA.
Why do these users have to enable 2FA?These users have taken an action on GitHub.com which now requires 2FA.
Users in this enrollment group have created a release or manage a critical OpenSSF repository. That means, the 127 users in your organization being added to the program have created a release at least once in the past, or are administrators of an OpenSSF repository. This release may have been from one of your Organizations, in another Organization, or in their own personal repositories.
In addition to the new enrollment group, we are enabling daily updates to the previous enrollment group, which included all accounts that have published an app, Action or Package. If a user publishes an app, Action, or Package for the first time, they will be enrolled in the 2FA program the next day, starting the 45-day enrollment process detailed in our March blog post.
Will any more of my members need to enable 2FA?More of your organization's members may take an action that puts them in this enrollment group or a previous one. At any time, you can review which users are required to enable 2FA by checking the People tab of your organization - it now shows users who are required to enable 2FA but have not yet done so. In the future, we'll continue to expand the set of users that require 2FA, and we'll reach out again when that occurs.
You should validate if service accounts you manage are in this rollout, by reviewing their associated email inbox for notifications across the next month. For help on setting up 2FA for shared service accounts, see "Setting up 2FA for service accounts".
Isn't SAML protection sufficient?SAML protects your organization data, but it doesn't stop an attacker from accessing your users' personal accounts. These accounts can be contributors outside of your organization, and need to be protected as well.
Making the software supply chain more secure is a team effort, and we couldn't do it without you. Your support of 2FA is an impactful step in keeping the world's software secure.
Thanks,
The GitHub Security Team