遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/7128)
<a href="https://www.bestpractices.dev/projects/7128"><img src="https://www.bestpractices.dev/projects/7128/badge"></a>
The Single Sign-On Multi-Factor portal for web apps
The about page has a dedicated bus factor section https://www.authelia.com/information/about/#bus-factor
All significant contributors are unassociated, and we have 5 significant contributors https://github.com/authelia/authelia/graphs/contributors
We are already considering to implement this via https://resuse.software
Repository on GitHub, which uses git. git is distributed.
This is identified via the Good First Issue label https://github.com/authelia/authelia/issues?q=is%3Aopen+is%3Aissue+label%3A%22Good+First+Issue%22
Our org members all use 2FA, and are required by org policy to use it. No external users can make modifications without an org member reviewing the changes. In addition GitHub from March 13th has required 2FA for all contributors to all GitHub repositories. https://github.blog/2023-03-09-raising-the-bar-for-software-security-github-2fa-begins-march-13/
We only use cryptographic 2FA.
The following guideline document outlines our code review requirements https://www.authelia.com/contributing/guidelines/pull-request/#review
All major contributions are reviewed by a primary maintainer and generative AI.
https://www.authelia.com/contributing/guidelines/pull-request/#review
All of our builds are reproducible with the same inputs.
警告:需要URL,但找不到URL。
The go test tool can be used with our tests https://www.authelia.com/contributing/development/build-and-test/
Our CI/CD pipeline is publicly visible at https://buildkite.com/authelia and performs both unit tests and integration tests with all of our external dependencies.
We currently do tests but do not meet the 90% requirement.
We currently do tests which cover code branches but do not meet the 80% requirement.
By default all connections require TLS1.2 or greater.
Found all required security hardening headers (GitHub). The site also has several hardening headers configured here https://github.com/authelia/authelia/blob/master/docs/layouts/index.headers
We have performed internal security reviews and regularly perform them.
However we'd really prefer an adequately qualified external party to perform them. As we're a non-profit the cost associated is prohibitive at the moment. We have however had an informal audit via a third party which identified one issue which was fixed. We're actively looking for sponsorship. https://www.authelia.com/contributing/prologue/financial/#sponsorship
We enforce PIE and full relocation read-only. https://www.authelia.com/overview/security/measures/#protections-against-return-oriented-programming-attacks-and-general-hardening
This is on our list of items to implement via go test -fuzz. https://go.dev/doc/security/fuzz/
We run several tests using subtests to enable easy comprehensive static and some basic dynamic testing.
后退