Two-factor OATH authentication with Google Authenticator¶
Google Authenticator generates verification code as a dynamic component to a static password to increase account security.
Fudo Enterprise allows configuring default settings for the OATH authentication so they are automatically added to the user definition, when administrator selects OATH
as an active authentication method.
Protocols Supporting OATH Authentication Method¶
When logging in, OATH authentication can be performed either in Challenge-Response mode or by concatenating the dynamic code generated by Google Authenticator to the end of the static password defined in the authentication method, such as password481418.
Please note that not all protocols support this authentication method.
¶ Platform or Protocol Challenge-Response Mode Password + Dynamic Code Logging into Access Gateway available available Logging into Admin Panel available available VNC available available SSH available available RDP available available Telnet 3270 not available available Telnet 5250 not available available Telnet not available available MS SQL(TDS) not available not available HTTP/S not available not available TCP not available not available MySQL not available not available X11 not available not available Modbus not available not available
Configuring the OATH Authentication Method¶
In order to configure default settings for the OATH authentication method, follow the instruction:
- Select > > .
- Fill out the Issuer field.
- From the Token type field select
TOTP (time-base)
orHOTP (counter-base)
. - Fill out the Token length field.
- Input Time step if selected Token type was
TOTP (time-base)
. - Click .
In order to configure OATH as an active authentication method for a user, follow the steps:
- Select > .
- Find and click the user for whom you want to add the OATH authentication method.
- Scroll down to the Authentication section.
- From the Type drop-down list, select
OATH
. - Choose the first factor:
Password
orExternal authentication
.
If Password
is chosen:
- Enter password’s static part.
- Fields Token type, Token length and Time step will be filled out automatically as default settings claim. Their value is editable.
- Enter a secret that will be used by Google Authenticator. Note, that the secret must be a
Base32
encoded value. Alternatively, click . to generate it automatically. Click to show the QR code.
If External authentication
is chosen:
- Select External authentication source.
- Fields Token type, Token length and Time step will be filled out automatically as default settings claim. Their value is editable.
- Enter a secret that will be used by Google Authenticator. Note, that the secret must be a
Base32
encoded value. Alternatively, click . to generate it automatically. Click to show the QR code.
Note
The Initialized option serves for the user’s initialization via the QR code. When their static password as a First factor setting is filled or External authentication source if configured, the QR code is displayed during their first connection. After successful first authentication the Initialized option becomes checked and takes uneditable state.
- Click .
- Launch Google Authenticator and add new service.
Manual entry | QR Code |
---|---|
Note Click . on the user edit form in the Authentication section to reveal the secret.
|
|
- When logging in, the password string consists of a static password defined in the authentication method and dynamic part generated by the Google Authenticator, e.g.
password481418
.
Related topics: