You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: aspnetcore/blazor/security/webassembly/standalone-with-identity/qrcodes-for-authenticator-apps.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ Add the following class signatures to the `IAccountManagement` interface. The cl
135
135
136
136
* Log in with a 2FA TOTP code (`/login` endpoint): `LoginTwoFactorCodeAsync`
137
137
* Log in with a 2FA recovery code (`/login` endpoint): `LoginTwoFactorRecoveryCodeAsync`
138
-
* Make a 2FA management request (`/manage/2fa` endpoint): `TwoFactorRequest`
138
+
* Make a 2FA management request (`/manage/2fa` endpoint): `TwoFactorRequestAsync`
139
139
140
140
`Identity/IAccountManagement.cs` (paste the following code at the bottom of the interface):
141
141
@@ -150,7 +150,7 @@ public Task<FormResult> LoginTwoFactorRecoveryCodeAsync(
150
150
stringpassword,
151
151
stringtwoFactorRecoveryCode);
152
152
153
-
publicTask<TwoFactorResult>TwoFactorRequest(
153
+
publicTask<TwoFactorResult>TwoFactorRequestAsync(
154
154
TwoFactorRequesttwoFactorRequest);
155
155
```
156
156
@@ -300,18 +300,18 @@ public async Task<FormResult> LoginTwoFactorRecoveryCodeAsync(string email,
300
300
}
301
301
```
302
302
303
-
A `TwoFactorRequest` method is added, which is used to manage 2FA for the user:
303
+
A `TwoFactorRequestAsync` method is added, which is used to manage 2FA for the user:
304
304
305
305
* Reset the shared 2FA key when `TwoFactorRequest.ResetSharedKey` is `true`. Resetting the shared key implicitly disables two-factor authentication. This forces the user to prove that they can provide a valid TOTP code from their authenticator app to enable 2FA after receiving a new shared key.
306
306
* Reset the user's recovery codes when `TwoFactorRequest.ResetRecoveryCodes` is `true`.
307
307
* Forget the machine when `TwoFactorRequest.ForgetMachine` is `true`, which means that a new 2FA TOTP code is required on the next login attempt.
308
308
* Enable 2FA using a 2FA code from a TOTP authenticator app when `TwoFactorRequest.Enable` is `true` and `TwoFactorRequest.TwoFactorCode` has a valid TOTP value.
309
309
* Obtain 2FA status with an empty request when all of `TwoFactorRequest`'s properties are `null`.
310
310
311
-
Add the following `TwoFactorRequest` method to `Identity/CookieAuthenticationStateProvider.cs` (paste the following code at the bottom of the class file):
311
+
Add the following `TwoFactorRequestAsync` method to `Identity/CookieAuthenticationStateProvider.cs` (paste the following code at the bottom of the class file):
0 commit comments