User Details
- User Since
- Jan 14 2019, 7:34 PM (254 w, 3 d)
- Roles
- Disabled
- LDAP User
- Dsharpe
- MediaWiki User
- DSharpe (WMF) [ Global Accounts ]
Jun 13 2022
Jun 9 2022
Done. Thank you!
Jun 5 2022
Done. Thank you!
Jun 2 2022
Done. Thank you!
May 26 2022
I don't know who owns or maintains this. https://gerrit.wikimedia.org/r/plugins/gitiles/operations/puppet/+log/refs/heads/production/modules/base/files/phaste.py shows some folks who have touched the code over the years.
May 16 2022
May 9 2022
1). What is the name of the entry in your authenticator app that you are getting the token values from?
2). Any time comparison should be between the time on the device your authenticator app is running on and the Phabricator server. The Phabricator server will be exactly on the current and correct UTC time at any given moment. Is the time on your device a little off, or exactly correct in your local timezone?
Done. Thank you!
May 7 2022
Done. Thank you!
May 5 2022
Done. Thank you and welcome aboard!
May 4 2022
Done. Thank you! Please let me know if you have any problems.
Done. Thank you and welcome aboard!
Apr 12 2022
Done. Thank you!
Apr 10 2022
Done. Thank you!
Apr 9 2022
Hello @Hokwelum ! The procedure we follow (step 7) to grant this access requires linking the intended Phabricator account with your staff account like Aklapper mentioned above. Are you okay with doing that, and if so, do you need instructions? Thank you!
Apr 7 2022
I follow https://office.wikimedia.org/wiki/Security/Procedures/Granting_Access_to_Security_Content_in_Phabricator for theses requests, which calls for adding folks to the right object under acl*security. I don't know what happened to that edit for jelto. For some recent requests from SRE folks, I have to also add them as a member of the security tag. Only the acl*security.membership seemed to be enough before.
Apr 4 2022
Their access should work now. I added them both to the acl, now I just added them both to the tag.
Done. Thank you!
Apr 1 2022
Done. Thank you!
Access to security-related content in Phabricator requires having 2FA set for your account in Phabricator.
Mar 31 2022
Done. Thank you!
Done. Thank you!
Mar 29 2022
Done. Thank you!
Mar 28 2022
Done. Thank you!
Mar 22 2022
Done. Thank you!
Mar 21 2022
Done. Thank you!
Mar 20 2022
Done. Thank you!
Feb 27 2022
Done. Thank you!
Done. Thank you!
Feb 14 2022
Feb 11 2022
Done. Thank you!
Feb 9 2022
Access to security-related content in Phabricator requires having 2FA set for your account in Phabricator.
Jan 25 2022
Because I couldn't think of a better way to do it, I added a personal calendar entry for myself to do this again next year. Thank you!
Jan 24 2022
Thanks for that list! Skipping over some folks who need access but might not actually update a task, I removed access for anyone that showed up somehow under the security acl who no longer need that level of access. Some accounts listed didn't show up under any of those groups under the security acl. and I had no edit to make for those.
Jan 20 2022
Done. Thanks again!
Done. Thank you!
Jan 18 2022
I can take this on, but I don't think I have access to run the query. I don't see a way to get the equivalent result through the Phabricator GUI.. Can the query results be added here, or should I pursue trying to get the least amount of access I would need to run that query myself?
Jan 17 2022
Done. Thank you!
Jan 13 2022
Done. Thank you!
Jan 11 2022
Done. Thank you!
@Aklapper I replied via email
@Zabe I added you as a subscriber to all of the Phabricator tasks you listed above that you weren't already subscribed to. Are there any more you need to see?
Jan 10 2022
Hi @Zabe! Thanks for reaching out and thank you for everything you do!
Done. Thank you!
Done. Thank you!
Hello @noarave! We require MFA (Settings-->Multi-Factor Auth) be set up for any account with access to security content in Phabricator. If you are okay with enabling that for your Phabricator account, please do so and reply back here.
Done. Thank you!
Jan 7 2022
Done. Thank you!
Done. Thank you!