Sentry no longer supports SMS/text message based two-factor authentication for user accounts.
If you do not already have SMS 2FA enrolled on your user account, you will not be able to enroll in it. You will need to use one of our other two-factor options.
If you are already enrolled in SMS 2FA on your user account, it will continue to work as expected. For example, you will still receive a message with your one-time passcode when logging into Sentry. However, if you delete your SMS 2FA configuration you will not be able to set it back up. You’ll need to use one of our other two-factor options.
Sentry currently supports 2FA via an authenticator app like Authy, Google Authenticator, 1Password, or any TOTP compatible application.
We also support 2FA via hardware keys compatible with U2F/FIDO like a Yubikey, Titan Security Key, or Apple’s TouchID (requires Google Chrome).
On August 12th, 2022.
SMS two-factor authentication on self-hosted installations of Sentry will still be available and enabled as an option for your users by default.
If administrators wish to disable SMS two-factor enrollment for users, set the sms.disallow-new-enrollments
option to True
in your config.yml
.
To use SMS two-factor authentication on your self-hosted instance you will need a Twilio account and the appropriate configurations set in your config.yml
. For more details on configuration options, refer to our documentation
Two reasons: