Enabling 2-Factor Authentication on the Appliance is currently supported with External Authentication to IPA.
In this guide we will cover how to manually configure a 7.1 Appliance’s external authentication to work with 2-Factor Authentication with IPA. This provides IPA Users access to the Appliance Administrative UI and the REST API using their IPA Password followed by a One-Time-Password.
The following is needed in order to enable 2-Factor-Authentication to the Appliance:
A CentOS/RHEL 7.1 based Appliance
IPA Server based on FreeIPA 4.1.0 or later
Login as admin, then in Configure→Configuration→Authentication
Set mode to External (httpd)
Check: Get User Groups from External Authentication (httpd)
Do Not Check: Enable Single Signon
Click Save.
The above steps need to be done on each UI and WebService enabled appliance.
in Configure→Configuration→Access Control
Using the Appliance Console, simply enable external authentication as you currently would to IPA.
Login to console as root
Run appliance_console
Summary screen should show External Auth as not configured, Press any key
From the Advanced Setting menu, select the menu item Configure External Authentication (httpd)
Enter the FQDN of the IPA Server, i.e. ipaserver.test.company.com
Enter the IPA Server domain, i.e. test.company.com
Enter the IPA Server realm, i.e. TEST.COMPANY.COM
Press enter to select the default IPA Server Principal, i.e. admin
Enter the Password of the IPA Server Principal
Review details, and Enter y to proceed.
Enabling 2-Factor Authentication is done using the IPA administrative UI.
The IPA administrator needs to change the User authentication types for the user from Password or Radius to Two factor authentication (password + OTP)
The previous can be done either per user or for all users from the IPA Server global Configuration under User Options.
The user logs into IPA, then from the OTP Tokens tab, add an OTP token - Time-based (TOTP) or Counter-based (HOTP).
Specifying a Description for the OTP, then clicking add, brings up a QR Code which can then be scanned into an app like FreeOTP for example.
Then from the main IPA login screen, the user can Synchronize the OTP Token by specifying their Username, password and then two OTP’s generated from the FreeOTP app.
After which, the user can login to FreeIPA using their Password+OTP.
Once the above is done, the user now needs to specify their IPA Username and their Password followed by their One-Time-Password as generated by the FreeOTP app, when:
Logging into the Appliance Administrative UI
Accessing the REST API