HI Simo,
Thanks for the reply. Could you please elaborate or point me to some
documentation on how to set this up.
What I want to be able to achieve is that a user should login with a 2FA
once a day and all subsequent logins are allowed thru public key only.
Regards.
--Prashant
On 30 June 2015
On Tue, 2015-06-30 at 10:06 +0200, Sumit Bose wrote:
> On Tue, Jun 30, 2015 at 09:31:55AM +0200, Jakub Hrozek wrote:
> > On Tue, Jun 30, 2015 at 09:22:13AM +0200, Sumit Bose wrote:
> > > On Tue, Jun 30, 2015 at 09:09:19AM +0200, Jakub Hrozek wrote:
> > > > On Tue, Jun 30, 2015 at 11:34:55AM +0530,
On Tue, Jun 30, 2015 at 09:31:55AM +0200, Jakub Hrozek wrote:
> On Tue, Jun 30, 2015 at 09:22:13AM +0200, Sumit Bose wrote:
> > On Tue, Jun 30, 2015 at 09:09:19AM +0200, Jakub Hrozek wrote:
> > > On Tue, Jun 30, 2015 at 11:34:55AM +0530, Prashant Bapat wrote:
> > > > Hi,
> > > >
> > > > I was able
On Tue, Jun 30, 2015 at 09:22:13AM +0200, Sumit Bose wrote:
> On Tue, Jun 30, 2015 at 09:09:19AM +0200, Jakub Hrozek wrote:
> > On Tue, Jun 30, 2015 at 11:34:55AM +0530, Prashant Bapat wrote:
> > > Hi,
> > >
> > > I was able to set this up in a Fedora instance with SSSD and it works as
> > > expec
On Tue, Jun 30, 2015 at 11:34:55AM +0530, Prashant Bapat wrote:
>
> I was able to set this up in a Fedora instance with SSSD and it works as
> expected. SSHD first uses the public key and then prompts for password
> which is ofcourse password+OTP.
>
> However, having a user enter the password+OTP
On Tue, Jun 30, 2015 at 09:09:19AM +0200, Jakub Hrozek wrote:
> On Tue, Jun 30, 2015 at 11:34:55AM +0530, Prashant Bapat wrote:
> > Hi,
> >
> > I was able to set this up in a Fedora instance with SSSD and it works as
> > expected. SSHD first uses the public key and then prompts for password
> > wh
On Tue, Jun 30, 2015 at 11:34:55AM +0530, Prashant Bapat wrote:
> Hi,
>
> I was able to set this up in a Fedora instance with SSSD and it works as
> expected. SSHD first uses the public key and then prompts for password
> which is ofcourse password+OTP.
>
> However, having a user enter the passwo
Hi,
I was able to set this up in a Fedora instance with SSSD and it works as
expected. SSHD first uses the public key and then prompts for password
which is ofcourse password+OTP.
However, having a user enter the password+OTP every time he logs in during
the day is kind of inconvenient. Is it pos
Aah ok !
Unfortunately I'm using Amazon Linux and it does not support SSSD. I ended
up using nss-pam-ldap, nscd and nslcd.
However this looks promising. Only for the servers exposed to Internet I
could use CentOS/Fedora and this method of authentication. Let me try this
and come back to you.
Tha
- Original Message -
> Hi ,
>
> I'm exploring implementing a 2FA solution to my servers exposed to public.
> Mainly to secure SSH with 2FA. The SSH keys and users are already in
> FreeIPA.
>
> Is there a way to utilize the OTP inside FreeIPA during a user login to these
> servers ? A us
Hi ,
I'm exploring implementing a 2FA solution to my servers exposed to public.
Mainly to secure SSH with 2FA. The SSH keys and users are already in
FreeIPA.
Is there a way to utilize the OTP inside FreeIPA during a user login to
these servers ? A user will have to enter the TOTP code bases on wh
11 matches
Mail list logo