From 6f286d7717f419489a08a9918621f438256e397b Mon Sep 17 00:00:00 2001 From: GitLab Bot Date: Fri, 4 Nov 2022 03:11:18 +0000 Subject: Add latest changes from gitlab-org/gitlab@master --- doc/security/two_factor_authentication.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) (limited to 'doc/security') diff --git a/doc/security/two_factor_authentication.md b/doc/security/two_factor_authentication.md index e4d59b6b465..0343dc3f551 100644 --- a/doc/security/two_factor_authentication.md +++ b/doc/security/two_factor_authentication.md @@ -99,7 +99,7 @@ This is a permanent and irreversible action. Users must reactivate 2FA to use it ### For a single user -To disable 2FA for non-administrator users, we recommend using the [API endpoint](../api/users.md#disable-two-factor-authentication) +To disable 2FA for non-administrator users, you should use the [API endpoint](../api/users.md#disable-two-factor-authentication) instead of the Rails console. Using the [Rails console](../administration/operations/rails_console.md), 2FA for a single user can be disabled. Connect to the Rails console and run: @@ -113,7 +113,6 @@ user_to_disable = User.find_by_username('') TwoFactor::DestroyService.new(admin, user: user_to_disable).execute ``` -NOTE: The target user is notified that 2FA has been disabled. ### For all users -- cgit v1.2.1