Daniel PC via FreeIPA-users <freeipa-users@lists.fedorahosted.org>
writes:

> Currently, I have 2FA implemented with password + FreeOTP as authentication 
> methods.
>
> I wonder if possible to implement ssh pub+priv keys instead of a password as 
> the first authentication factor.
>
> Has anyone implemented such thing?

That's possible, but not with FreeIPA.  On my Jump-Host I have the
following in /etc/ssh/sshd_config:

,----
| Match Group otpusers
|     AuthenticationMethods gssapi-with-mic publickey,keyboard-interactive:pam
`----

So I can login with Kerberos (and maybe with authentication indicators).

The second authentication stream uses pubkey and whatever is definded in
PAM. There I have:

,----
| # If the user is in group otpusers, we use the next rule, otherwise we skip
| # the call to pam_yubico.
| auth [default=1 success=ignore] pam_succeed_if.so quiet user ingroup otpusers
| auth sufficient pam_yubico.so id=<yubicoid> key=<appkey> 
urllist=https://yubico.example.org/ttype/yubikey 
authfile=/etc/yubikeys/authorized_yubikeys
`----

I use privacyidea to manage my 2FA tokens (here I use Yubikeys),
You could also use freeotp or something else - problem is to connect
token and user in the PAM stack,

Jochen

-- 
This space is intentionally left blank.
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

Reply via email to