Changes between Initial Version and Version 1 of 2faVPN


Ignore:
Timestamp:
03/02/17 12:06:31 (8 years ago)
Author:
dabantz@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • 2faVPN

    v1 v1  
     1Two factor authentication provides Increased assurance for privileged VPN access to UA network. 
     2As of March 2017 two VPNs require Duo two-factor authentication: 
     3[[br]] 
     4 
     5=== VPN authentication === 
     6VPNs use Duo's "Append Mode" to provide a second factor in addition to UA Password in the Password field. You enter your password, followed by a comma, then an indicator of your second factor. You can provide the second factor using !DuoMobile Push, telephone call-back, one-time passcodes (OTPs), or !YubiKey token. [[br]] 
     7 
     8==== !DuoMobile for second factor ==== 
     9 
     10 
     11 {{{ 
     12password,push             e.g., enTrenching?4flogged,push 
     13}}} 
     14 
     15pushes a login request to your smart phone with !DuoMobile app enrolled for UA; review the request and tap "Approve" on the phone to complete login.[[br]] 
     16==== One-time Passcodes for second factor==== 
     17{{{ 
     18password,OTPasscode      e.g., Licenser&6wiretapper,012345 
     19}}} 
     20where OTPasscode is a one-time passcode generated with !DuoMobile, or sent via SMS, or generated by your hardware token (see use of YubiKey section below for automated entry of OTPasscode).[[br]] 
     21 
     22==== Telephone call-back for second factor==== 
     23 {{{ 
     24password, phone#          e.g., BestialiZed^7picovolts,9075551234 
     25}}} 
     26will trigger a telephone call to the number (provided it has been enrolled and attached to your Duo account); you will be asked to touch a key on the telephone key pad to complete authentication. 
     27 
     28=== Use !YukiKey for 2FA with UA VPNs === 
     29 
     301. Obtain a !YubiKey supporting OTP in form factor that works for you: 
     31    https://www.yubico.com/products/yubikey-hardware/ 
     32 
     332. Download the !YubiKey Personalization Tool: 
     34    https://www.yubico.com/support/knowledge-base/categories/articles/yubikey-personalization-tools/ 
     35 
     363. Configure your !YubiKey for OTP in one of its two (virtual) slots*  
     37   (generally shipped already programmed for OTP in slot 1) using the Duo guide: 
     38    https://duo.com/docs/yubikey 
     39 
     404. Send the CSV string with digital serial no, 6 byte private id, 16 bit secret key (like this:) 
     41    {{{ 
     424475749, e7 fe 84 57 55 d4, 81 84 65 01 22 db e5 00 57 f9 68 92 7f 22 4b 6a 
     43}}} 
     44    to IAM or Security, noting your UA Username, which is the Duo account to which the token will be attached. 
     45 
     465. IAM or Security will upload the CSV string to import your token, and assign it to your ID at Duo 
     47 
     486. When integrated (step 5), you can use the !YubiKey to send the second factor passcode:  
     49    In the password field type your password followed by comma then touch your key*; that is, 
     50    {{{ 
     51password, 
     52}}}  
     53 then touch your key, which enters a one-time passcode.[[br]] 
     54  
     55 
     56---- 
     57 
     58 *Which of the !YubiKey's two (virtual) slots is used is determined by the duration of your touch. The first slot is used to generate the output when the !YubiKey button is touched between 0.3 to 1.5 seconds and released and the second slot is used if the button is touched between 2 to 5 seconds.