Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jetpack: improve 2FA error in security settings #28738

Closed
joanrho opened this issue Nov 21, 2018 · 10 comments
Closed

Jetpack: improve 2FA error in security settings #28738

joanrho opened this issue Nov 21, 2018 · 10 comments
Assignees
Labels
2FA Two Factor Authentication / Multi Factor Authentication [Closed] Stale Jetpack [Type] Bug When a feature is broken and / or not performing as intended [Type] Enhancement Changes to an existing feature — removing, adding, or changing parts of it

Comments

@joanrho
Copy link
Contributor

joanrho commented Nov 21, 2018

Activating 2FA sometimes results in an error that doesn’t direct users to actionable next steps: "An unexpected error occurred. Please try again later.". Instead of this, let's improve the error message and link users to WordPress.com/me/security/two-step to try again.

Proposed improvements:

BEFORE:
screen shot 2018-12-18 at 3 17 07 pm

AFTER:

An unexpected error occurred while setting up 2-step authentication. Please try again

screen shot 2018-12-18 at 3 17 15 pm

ref: p6TEKc-2m8-p2 (RB / item 5.7)

@joanrho joanrho added [Type] Bug When a feature is broken and / or not performing as intended [Type] Enhancement Changes to an existing feature — removing, adding, or changing parts of it Jetpack labels Nov 21, 2018
@joanrho joanrho changed the title Security Settings: improve 2FA error Jetpack: improve 2FA error in security settings Nov 21, 2018
@keoshi keoshi self-assigned this Dec 17, 2018
@joanrho joanrho assigned joanrho and unassigned keoshi Dec 17, 2018
@joanrho
Copy link
Contributor Author

joanrho commented Dec 18, 2018

Hey @oskosk ! Would the resolution to this issue have any common bits related to the work you did on the custom notices in #10972?

@joanrho joanrho assigned oskosk and unassigned joanrho Dec 18, 2018
@oskosk
Copy link
Contributor

oskosk commented Dec 19, 2018

@joanrho. Note that by updating that toggle, one is not actually enabling/disabling 2 factor authentication. Only making Jetpack "require" it, be it enabled or not for any given user, not just the admin toggling that.

@oskosk
Copy link
Contributor

oskosk commented Dec 19, 2018

Question in the context of my previouse message ^. If this toggle is enabling the requirement for all users, does linking the error message to the administrator's page for enabling only their own 2 step auth still make sense ?

@oskosk
Copy link
Contributor

oskosk commented Dec 19, 2018

Moving conclusions from slack to this issue.

The user attempting to toggle that setting is not blocked under any condition from doing it. If they haven't enabled step auth, they still can toggle this setting as it's not related to just their user on the Jetpack site, but to any other too.

The error message in the screenshot here seems to be coming from another setting failing on save. Any information provided by a notice would be erroneous becase we know of no condition that would make the toggling fail for this particular setting. Thus, the "unexpected" notice is accurate.

I'm closing this issue.

@oskosk oskosk closed this as completed Dec 19, 2018
@rickybanister
Copy link

I think we should reopen this issue, or perhaps open a new issue to provide a clear pathway for the current admin user to set up 2fa after toggling on the requirement. At the minimum we should make it easy for the admin that requires 2fa to see a clickable-card appear that links them to wordpress.com/me to set up 2fa for themselves only.

It would be great if you could try to reproduce the error @joanrho is seeing @oskosk and pinpoint whether it's related to Akismet or something else. If customers are seeing that error or the conditions for it to show are reproduce-able then we need to track that down too.

Is that a fair assessment?

@joanrho joanrho reopened this Dec 19, 2018
@joanrho
Copy link
Contributor Author

joanrho commented Dec 19, 2018

@rickybanister thanks for your feedback, but I think you misunderstood the problem. From @oskosk and my discussion in Slack, 2FA IS in fact active, but the error is misleading in its message and is originating from a different source than Jetpack.

Reopening this issue, but we'll need to do more digging into the source of the error and next steps to take so the resolution is clearer from the user's perspective. Bumping to our Q1 onboarding focus, since this will exceed what we can close out for EV by this Friday.

@cathymcbride cathymcbride added the 2FA Two Factor Authentication / Multi Factor Authentication label Jan 28, 2021
@github-actions
Copy link

This issue is stale because it has been 180 days with no activity. You can keep the issue open by adding a comment. If you do, please provide additional context and explain why you’d like it to remain open. You can also close the issue yourself — if you do, please add a brief explanation and apply one of relevant issue close labels.

@keoshi
Copy link
Contributor

keoshi commented Jul 28, 2021

It would still be important to check what's happening and if we can improve the error message.

@github-actions
Copy link

This issue is stale because it has been 180 days with no activity. You can keep the issue open by adding a comment. If you do, please provide additional context and explain why you’d like it to remain open. You can also close the issue yourself — if you do, please add a brief explanation and apply one of relevant issue close labels.

@cuemarie
Copy link

👋 Hey folks! Since this issue has been inactive for quite some time, KitKat has made the decision to close it.

  • Internal reference, for more on this decision: pdqkMK-14B-p2

If you think this issue warrants another look, here are some next steps!

  1. Report anew: A new report with more current details and steps to replicate may be the best way to renew attention on this issue. Feel free to refer back to this closed issue in your report!
  2. Reopen: If you feel the issue still matches the context/history here, you can also reopen the issue and add fresh logs, screenshots and steps to reproduce.

Thanks for your involvement!

@cuemarie cuemarie closed this as not planned Won't fix, can't repro, duplicate, stale Aug 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2FA Two Factor Authentication / Multi Factor Authentication [Closed] Stale Jetpack [Type] Bug When a feature is broken and / or not performing as intended [Type] Enhancement Changes to an existing feature — removing, adding, or changing parts of it
Projects
None yet
Development

No branches or pull requests

6 participants