Dell Wyse Enhanced Ubuntu Linux T50 Manual de usuario Pagina 118

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 220
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 117
Chapter 9. Authentication in ThinLinc
9.6. Using One Time Passwords
9.6.1. Introduction
In this section, we will describe how to configure ThinLinc for authentication against One Time
Password (OTP) servers, such as the NordicEdge One Time Password Server or RSA SecurID. By using
OTPs, you can increase the system security.
9.6.2. General Requirements
An OTP server which accepts the OTP twice. This is due to the ThinLinc architecture: The client first
contacts the master machine, and then the agent host. The NordicEdge One Time Password Server has
built-in support for ThinLinc. When using RSA SecurID, we recommend using the Steel-Belted
Radius server as a "Token Caching Server".
An user database (directory server) that is supported both by the operating system on the ThinLinc
servers, as well as the OTP server. We recommend using a LDAP directory server, such as Novell
eDirectory.
The operating systems on the ThinLinc servers must support the OTP servers authentication protocol.
We recommend using the RADIUS protocol, by using the pam_radius_auth PAM module from the
FreeRADIUS project (http://www.freeradius.org).
The SSH server on the ThinLinc servers must accept "keyboard-interactive" authentication. It’s
recommended to disable "password" authentication.
9.6.3. Configuration for NordicEdge One Time Password Server
This section describes how to deploy a OTP solution based on the NordicEdge One Time Password
Server. With this solution, OTPs are used in addition to normal passwords. Users should enter their
normal password in the ThinLinc client password input field, and the OTPs in the popup dialog that
follows.
The example below assumes that you are using LDAP and RADIUS. Step 2 through 8 should be
repeated on all ThinLinc servers.
1. Configure the OTP server, according to the OTP server documentation. Make sure to use an
appropriate "regenerate timeout" value. If this value is too short, authentication with the VSM agent
host might fail, even though authentication with the VSM server host succeeds.
2. Install pam_radius_auth. Some distributions, such as SUSE, includes this module.
3. Configure pam_radius_auth, by creating /etc/raddb/server . It should contain the OTP
server name, port, and a shared secret. Example:
myotpserver.example.com:1645 mysecret
4. Configure LDAP authentication according to your distribution’s documentation.
108
Vista de pagina 117
1 2 ... 113 114 115 116 117 118 119 120 121 122 123 ... 219 220

Comentarios a estos manuales

Sin comentarios