Two-factor authentication with openconnect

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jul 22, 2015 at 12:01 PM, Fabian J?ger
<fabian.jaeger at chungwasoft.com> wrote:
> Has anyone successfully used two-factor authentication with openconnect?
>
> I am wondering if there is any special care required on the client side? How is the second credential provided

There have been occasional posts on the list from users of gateways
that were set up to require cert + password, like this:

http://www.networkworld.com/article/2227087/cisco-subnet/how-to-guide--cisco-asa-sslvpn-using-certificates-for-2-factor-auth.html

Also, the ASA can be set up to prompt for a secondary password.  Don't
know if "local AAA" supports this, but the ASA can be configured to
use a wide variety of authentication backends.

On the old RSA-based system I used to use, a single password field was
used to transmit both a PIN + OTP to the gateway.  Users just needed
to know it wanted a tokencode rather than a password.  This is how
--token-mode=rsa works in the openconnect client.

In all cases, the VPN frontend should be able to handle 2FA just by
blindly rendering the form provided by libopenconnect.



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux