-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support self-service account deactivation/deletion for users #1876
Comments
This comment was originally posted by @hughns at matrix-org/matrix-authentication-service#1876 (comment). @pmaier1 we need some product input on this, please. Should the user be required to complete any additional verification step ahead of being able to delete their account? e.g. OTP via email and/or re-authenticate? Do you want the re-auth requirements to be configurable by the server admin? |
This comment was originally posted by @hughns at matrix-org/matrix-authentication-service#1876 (comment). @jaywink please can you confirm if this is needed or not for the Element One migration? If not I will change the phase on the issue in the project board. |
This comment was originally posted by @jaywink at matrix-org/matrix-authentication-service#1876 (comment).
@hughns This is not a blocker for EO, in fact we would actually want "An admin should be able to disable this function" to exist once MAS supports self-serve account deactivation. |
This comment was originally posted by @americanrefugee at matrix-org/matrix-authentication-service#1876 (comment). |
Account backed by a social-login account are a bit of a problem if we want to reauth. For a bit of context, without MAS, deactivation goes through an UIA-protected endpoint, exposed to client.
The thing is, the SSO-relogin itself doesn't do much, as most SSO will just… let the user go through with no reauthentication whatsoever. We can't rely on sending an email either, because the account doesn't necessarily have an email associated with them. So that made me think of how other platform deal with social-login backed accounts and deactivation in general? ![]() I think it would be fine for us to adopt something like this for two reasons:
So I'm tempted to just transform the 'password' field in this dialog to something like 'please re-enter your MXID to confirm' We could do this as a first implementation if we're alright with it. Ideally, we could have a grace period ('your account will be fully deleted in 24h') with an email notification, and a way to cancel this, but this would be significantly bigger to implement. |
(Worth noting that some SSO flows allows specifying that the user should reauth BTW for exactly these cases, not sure how common support for that is though)
FWIW I think the attack we care about here is if someone gets access to a logged in session |
This issue was originally created by @hughns at matrix-org/matrix-authentication-service#1876.
The self-service account UI should expose a UI to allow a user to delete their own account.
An admin should be able to disable this function if they choose. e.g. if deactivation is handled via an upstream IdP or some other means.
Open questions:
Relevant design screens:
The text was updated successfully, but these errors were encountered: