The Two Factor Authentication service is a secure authentication service intended for computing support staff in CSCF/MFCF to gain privileged access to the services that they maintain. Examples include gaining root access on Linux/Unix/OS X hosts, Domain Administrator login in a Windows AD forest, privileged access to a web-based application, and read/write access to a network device such as a switch/router or firewall. The service is designed to be used by other groups on campus as well, if the desire is there.
See TwoFactorArchitecture to learn about the achitecture of the service. See TwoFactorAuthenticationDirections for background information. There is also documentation on maintaining the service (access is restricted).
* TwoFactorGettingStarted - What to do when you are issued a token
The instructions below explain how to configure an HP switch to use the TwoFactor authentication service for login via the console, SSH, and telnet while allowing local accounts if the RADIUS servers are unreachable. Note that in this case, the RADIUS server does both the authentication and authorization. You'll need to provide twofactor-admin@cscf.cs with the userid of those admins you want to grant either read-only or administrative access.
config
context.
aaa authentication telnet login radius local aaa authentication telnet enable radius local aaa authentication ssh login radius local aaa authentication ssh enable radius local aaa authentication console login radius local aaa authentication console enable radius local aaa authentication login privilege-mode radius-server key [shared-secret] radius-server host 129.97.15.150 auth-port 11812 acct-port 11813 radius-server host 129.97.15.151 auth-port 11812 acct-port 11813 write mem
This solution requires a seperate domain within an AD forest, so to reduce the proliferation of hardware for domain controllers, you are advised to try out the virtualization offered by VMware or Xen.
manage_pam_configuration=yes
in the appropriate options file
pam.conf-$xh-arch
file
sudo auth required /software/pam-radius/lib/pam_radius_auth.so
visudo
to set the appropriate authorizations.
sudo-radius
installer package and install it on your computer(s)
visudo
to set the appropriate authorizations.
sources.list
gets packages from universe
apt-get install libpam-radius-auth
129.97.15.150
and 129.97.15.151
, with the secret, to /etc/pam_radius_auth.conf
/etc/pam.d/sudo
with something like the following:
auth sufficient pam_unix.so nullok_secure auth required pam_radius_auth.so account required pam_permit.so
For application servers run by CSCF where interactive login is restricted to CSCF staff, check-out TwoFactorWithLDAP.
-- JasonTestart - 17 Aug 2006