User Tools

Site Tools


services:2fa

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
services:2fa [2021/03/22 16:50] deulservices:2fa [2022/01/12 10:34] – [Timeline] deul
Line 1: Line 1:
-======Two-Factor Authentication (2FA)======+======Two-Factor Authentication (2FA) @ STRW======
 {{ services:2fa_graphic.jpg?nolink&400|}} {{ services:2fa_graphic.jpg?nolink&400|}}
-=====Introduction=====+
 Please read this document carefully or jump to  Please read this document carefully or jump to 
-  * [[:services:2fa#first_time_access|here]]  +  * [[:services:2fa#first_time_access|First Time Access]]  
-  * [[:services:2fa#setup_ssh_keys||Setup ssh keys]] +  * [[:services:2fa#setup_ssh_keys|Setup ssh keys]] 
-====Why===+=====Introduction====== 
-After the recent increase in hacker activity and floods of phishing emails, it is clear that the Observatory Compute environment is under constant attack. One of the major deficiencies in our current setup is that it is enough to know a username and password to get access to a wide variety of resources and data. With the improper handling of phishing emails, but also when using public wifi services, it seems easy for people with not so good intentions to get account credential information. After that, there is no easy way to prevent misuse of accounts and computer resources. +  * [[:services:2fa:introduction|why, where and how]]
- +
-We need to put a stop to that, and the only way to do that is to introduce a second step in identifying that you are the rightful owner of the account credentials. This second step is provided throught the Two-Factor Authentication (2FA) mechanism. For this second verification, you need a physical device, for instance a smart phone or personal computer. +
- +
-====Where==== +
-In principle for every service where you need to identify yourself, 2FA is needed. In the beginning we will restrict 2FA to two major services: Web pages and ssh remote login. At a later stage 2FA will be implemented for other services as well. You will be informed well in advance. +
-===WEB Pages & 2FA === +
-For all Web pages where you need to login, we will enforce 2FA. This also, and in particular, includes webmail. The Observatory WEBsite has many pages shielded by authentication and each page will be individually added to the 2FA facility. +
-===ssh remote login & 2FA=== +
-One other major way to gain access to our resources and data is through the ssh protocol. So this means that using ''%%ssh%%'' to login from remote to the Observatory ssh gateway or to the local desktops or servers, you will be confronted with a second prompt to enter credentials. How this works is explained later on this page. In fact, 2FA is imposed on the ssh protocol, so ''%%scp%%'', ''%%sftp%%'', remote ''%%rsync%%'' and even tunnelier (Win) will also be affected. +
-====How==== +
-The 2FA protocol that we have implemented is based on the Time-based One Time Password (TOTP) mechanism and we are using RedHat developed tools to implement this. TOTP means that for a limited amount of time you get a passcode, which you have to provide to the authentication program as a second 'password' to gain access to the resource. Initially, at first use of 2FA, you have been given a private secret key and have stored that on your mobile device. Then, for each login, you use that mobile device to generate (time limited) passcodes. This passcode you present (type in) to the login procedure and after verification it gives you access to the restricted resource. Details on this process are described below.+
  
-======Timeline===== +[[:services:2fa:acronym|Note on acronyms]]
-We will not implement 2FA at the same time for all services, but will gradually enable 2FA according to [[services:2fa:timeline|this timeline]].+
  
 ======Working with 2FA ===== ======Working with 2FA =====
Line 35: Line 23:
   * [[services:2fa:continued|remaining setup]]   * [[services:2fa:continued|remaining setup]]
  
- +=====Browser Extension===== 
 +For several popular internet browsers (Edge, Firefox, Chrome, ...) there is a very convenient add-on/extension/plugin that can be installed on your Personal Computer to generate the 2FA passcodes. This also works for the Multi-Factor Authentication (MFA) of Leiden University uaccount services. After 2FA / MFA is activated, here are the steps to install and activate the browser extension: 
 +  * [[services:2fa:browserextension|Authenticator Extension]]
  
 =====Regular use of 2FA===== =====Regular use of 2FA=====
Line 97: Line 86:
   * Reset your password   * Reset your password
   * Re-initiate the 2FA process as described above in the 'First Time Access' section   * Re-initiate the 2FA process as described above in the 'First Time Access' section
 +====Error Message====
 +If you see **Two-factor authentication has not been setup for your account <accountname> yet.  Please refer to
 + the computer documentation on the institute webpage for the description and setup of 2FA**, this means your secret code has not trickled down to this system yet. It may take up to 30 minutes after setting up 2FA before all Observatory systems know about your secret key. Thus be patient ant try again in 30 minutes. 
 +
 ====Code not accepted==== ====Code not accepted====
-Note that the passcodes have a lifespan of 30 seconds and that both the Observatory computers and your Smart Phone or personal computer need to be in time sync. You must enter the 2FA app settings and select "Time synchronisation". After this the codes should work again. You might also have been just a bit too late confirming your passcode. In that case repeat the process of creating the passcode en entering it into the prompt/web form.+Note that the passcodes have a lifespan of 30 seconds and that both the Observatory computers and your Smart Phone or personal computer need to be in time sync. You must enter the 2FA app settings and select "**Time synchronisation**". After this the codes should work again. You might also have been just a bit too late confirming your passcode. In that case repeat the process of creating the passcode en entering it into the prompt/web form.
  
 In principle the system also allows passcodes that are from the previous or next timeslot. So you should have a total of 90 seconds to deliver a trusted passcode. This period is shortened if the Observatory time keeping differs slightly from your smart phone or personal computer time keeping. In principle the system also allows passcodes that are from the previous or next timeslot. So you should have a total of 90 seconds to deliver a trusted passcode. This period is shortened if the Observatory time keeping differs slightly from your smart phone or personal computer time keeping.
services/2fa.txt · Last modified: 2022/01/12 10:35 by deul