Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enforcing 2FA for all members of the organisation #3

Merged
merged 2 commits into from
Feb 2, 2024

Conversation

TiagoLucas22478
Copy link
Contributor

We're taking steps to further enhance the security of your projects and repositories, as part of our ongoing commitment to cybersecurity.

Following our previous communication on January 14th, shared through the eclipse.org-committers mailing list, and detailed in the associated support ticket, we are now enabling the requirement for two-factor authentication (2FA) across the entire GitHub organisation of your project.

We are pleased to report that your organisation was already in full compliance with this new requirement; all members already have 2FA enabled. Consequently, this policy enforcement will not necessitate any immediate changes on your part. However, it is important to mention that moving forward, all new committers or contributors, will be required to activate 2FA prior to their invitation to join the GitHub organisation.

Should you have any questions or face any challenges with this change, please do not hesitate to open a ticket on the HelpDesk, comment on the ticket tracking this initiative, or just add your comment to this pull request.

Thanks!

/cc @CamilleLetavernier @martin-fleck-at @ndoschek @planger @tortmayr

We're taking steps to further enhance the security of your projects and repositories, as part of our ongoing commitment to cybersecurity.

Following our previous communication on January 14th, shared through the eclipse.org-committers [mailing list](https://www.eclipse.org/lists/eclipse.org-committers/msg01409.html), and detailed in the associated [support ticket](https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/477#note_1610474), we are now enabling the requirement for two-factor authentication (2FA) across the entire GitHub organisation of your project.

**We are pleased to report that your organisation was already in full compliance with this new requirement; all members already have 2FA enabled**. Consequently, this policy enforcement will not necessitate any immediate changes on your part. However, it is important to mention that moving forward, all new committers or [contributors](https://www.eclipse.org/projects/handbook/#pmi-contributors), will be required to activate 2FA prior to their invitation to join the GitHub organisation.

Should you have any questions or face any challenges with this change, please do not hesitate to [open a ticket on the HelpDesk](https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/new), comment on the [ticket tracking this initiative](https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/477), or just add your comment to this pull request.

Thanks!


Signed-off-by: Tiago Lucas <[email protected]>
@TiagoLucas22478 TiagoLucas22478 requested review from a team as code owners February 2, 2024 10:26

This comment has been minimized.

Signed-off-by: Thomas Neidhart <[email protected]>
Copy link

github-actions bot commented Feb 2, 2024

Diff for bdb1c53:
Printing local diff:

Actions are indicated with the following symbols:
+   create
!   modify
!   forced update
-   delete

Organization ecd.glsp[id=eclipse-glsp]
  there have been 3 validation infos, enable verbose output with '-v' to to display them.

  
!   settings {
!     two_factor_requirement            = false -> true
!   }
  
  Note: setting 'two_factor_requirement' is read-only, will be skipped.
  
  Plan: 0 to add, 0 to change, 0 to delete.
Canonical Diff for bdb1c53:
Showing canonical diff:

Organization ecd.glsp[id=eclipse-glsp]

@netomi netomi merged commit 056a39f into eclipse-glsp:main Feb 2, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants