l10n->t('Authenticate with a TOTP app'); } /** * Get the template for rending the 2FA provider view */ public function getTemplate(IUser $user): Template { return new Template('twofactor_totp', 'challenge'); } /** * Verify the given challenge */ public function verifyChallenge(IUser $user, string $challenge): bool { $challenge = preg_replace('/[^0-9]/', '', $challenge); try { $secret = $this->totp->getSecret($user); } catch (NoTotpSecretFoundException $e) { return false; } return $this->totp->validateSecret($secret, $challenge); } /** * Decides whether 2FA is enabled for the given user */ public function isTwoFactorAuthEnabledForUser(IUser $user): bool { return $this->totp->hasSecret($user); } public function getLightIcon(): String { return $this->urlGenerator->imagePath(Application::APP_ID, 'app.svg'); } public function getDarkIcon(): String { return $this->urlGenerator->imagePath(Application::APP_ID, 'app-dark.svg'); } public function getPersonalSettings(IUser $user): IPersonalProviderSettings { $this->initialState->provideInitialState('state', $this->totp->hasSecret($user) ? ITotp::STATE_ENABLED : ITotp::STATE_DISABLED); return new Personal(); } /** * Disable this provider for the given user. * * @param IUser $user the user to deactivate this provider for */ public function disableFor(IUser $user) { $this->totp->deleteSecret($user, true); } public function getLoginSetup(IUser $user): ILoginSetupProvider { return $this->container->query(AtLoginProvider::class); } }