| 开发者 |
georgestephanis
valendesigns stevenkword extendwings sgrant aaroncampbell johnbillion stevegrunwell netweb kasparsd alihusnainarshad passoniate |
|---|---|
| 更新时间 | 2026年2月17日 21:21 |
| WordPress版本: | 6.9 |
| 版权: | GPL-2.0-or-later |
| 版权网址: | 版权信息 |
two_factor_providers filter overrides the available two-factor providers such as email and time-based one-time passwords. Array values are PHP classnames of the two-factor providers.two_factor_providers_for_user filter overrides the available two-factor providers for a specific user. Array values are instances of provider classes and the user object WP_User is available as the second argument.two_factor_enabled_providers_for_user filter overrides the list of two-factor providers enabled for a user. First argument is an array of enabled provider classnames as values, the second argument is the user ID.two_factor_user_authenticated action which receives the logged in WP_User object as the first argument for determining the logged in user right after the authentication workflow.two_factor_user_api_login_enable filter restricts authentication for REST API and XML-RPC to application passwords only. Provides the user ID as the second argument.two_factor_email_token_ttl filter overrides the time interval in seconds that an email token is considered after generation. Accepts the time in seconds as the first argument and the ID of the WP_User object being authenticated.two_factor_email_token_length filter overrides the default 8 character count for email tokens.two_factor_backup_code_length filter overrides the default 8 character count for backup codes. Provides the WP_User of the associated user as the second argument.two_factor_rest_api_can_edit_user filter overrides whether a user’s Two-Factor settings can be edited via the REST API. First argument is the current $can_edit boolean, the second argument is the user ID.two_factor_before_authentication_prompt action which receives the provider object and fires prior to the prompt shown on the authentication input form.two_factor_after_authentication_prompt action which receives the provider object and fires after the prompt shown on the authentication input form.two_factor_after_authentication_inputaction which receives the provider object and fires after the input shown on the authentication input form (if form contains no input, action fires immediately after two_factor_after_authentication_prompt).This plugin supports the last two major versions of WordPress and the minimum PHP version supported by those WordPress versions.
报告漏洞、功能建议或任何其他(非安全相关)的反馈最佳途径是在 GitHub Two Factor 的 issues 页面。在提交新问题之前,请搜索现有问题以检查是否有其他人报告了相同的反馈。
插件贡献者和 WordPress 社区非常重视安全漏洞。我们感谢您负责任地披露您发现的漏洞,并将竭尽全力解决您的贡献。 To report a security issue, please visit the WordPress HackerOne program.
This plugin is designed to work on a per-user basis, allowing each user to choose their preferred authentication methods. This approach provides maximum flexibility and security. Site administrators can still configure 2FA for other users by editing their profiles. For more information, see issue #437.
If you have backup codes enabled, you can use one of those to regain access. If you don't have backup codes or have used them all, you'll need to contact your site administrator to reset your account. This is why it's important to always enable backup codes and keep them in a secure location.
The plugin currently supports FIDO U2F, which is the predecessor to WebAuthn. For full WebAuthn support, you may want to look into additional plugins that extend this functionality. The current U2F implementation requires HTTPS and has browser compatibility limitations.
Yes. For passkeys and hardware security keys, you can install the Two-Factor Provider: WebAuthn plugin: https://wordpress.org/plugins/two-factor-provider-webauthn/ . It integrates directly with Two-Factor and adds WebAuthn-based authentication as an additional two-factor option for users.
@since docs by @masteradhoc in #781master by @kasparsd in #738missing_direct_file_access_protection by @masteradhoc in #760mismatched_plugin_name by @masteradhoc in #754MissingTranslatorsComment & MissingSingularPlaceholder by @masteradhoc in #758phpcs:ignore for falsepositives by @masteradhoc in #777otpauth link in QR code URL by @sjinks in #784WordPress.Security.EscapeOutput.OutputNotEscaped errors by @masteradhoc in #776