At line 1 changed one line |
In CrushFTP version 10 we can integrate our One Time Password (__[OTP|OTP Settings]__) based authentication feature with Google's and Microsoft's software based token device __Google Authenticator and Microsoft Authenticator__, using Time based OTP (TOTP). The user can register a QR code into Google or Microsoft Authenticator app.\\ |
CrushFTP has One Time Password (__[OTP/MFA|OTP Settings]__) based authentication feature with Google's and Microsoft's software-based token device __Google Authenticator__ and __Microsoft Authenticator__, using Time based OTP (TOTP) / MFA. The user can register a QR code into their Authenticator app.\\ |
At line 4 changed one line |
You will need to enable one of our __[OTP|OTP Settings]__ methods, using SMS or Mail based OTP, and enable the __Validated logins__ checkbox. The user needs to be able to log in at least once, without OTP, or with the other __[OTP|OTP Settings]__ settings.\\ |
The config needs the URL set to "SMTP" and the checkbox for "Validated Logins" enabled.\\ |
At line 8 changed one line |
The second step is to configure the user account with __Two Factor Authentication__\\ |
Next enable the two factor __QR code generator__ which will appear in the user's __User Options__ menu when they are logged in.\\ |
At line 10 changed one line |
[attachments|servercfg002.png]\\ |
[attachments|enable_two_factor.png]\\ |
* You can also force two factor registration, then the user has no choice but to enroll in it at their next login. Set the customization flag "Two Factor: force Google Authenticator setup" to true. See the mini animated gif of the process below.\\ |
At line 12 changed one line |
and enable the two factor __QR code generator__ which will appear in the user's __User Options__ menu when they are logged in.\\ |
!!Client / token device configuration\\ |
The user will need to log in normally, generate the QR code from the client UI __User Options__ menu.\\ |
At line 14 changed one line |
[attachments|servercfg003.png]\\ |
[attachments|qr_otp.png]\\ |
At line 16 changed 2 lines |
!!Client / token device configuration\\ |
The user will need to log normally, generate the QR code from the client UI __User Options__ menu.\\ |
__This part must be done within 30 seconds or the QR code becomes invalid.__\\ |
1.) Once they are ready and have the Authenticator app open on their mobile device, they click __Ready To Scan__.\\ |
2.) Choose to scan the QR code, point the device towards the screen, and let it read in the QR code.\\ |
3.) Next click __Confirm__ to save the same code to the server's user configuration.\\ |
At line 19 changed one line |
[attachments|servercfg004.png]\\ |
Google Authenticator\\ |
[{Image src='tokencfg002.png' width='272px' height='..' align='left'}] [{Image src='tokencfg003.png' width='272px' height='..' align='left'}]\\ |
At line 21 changed 3 lines |
Then open __Authenticator__ on the mobile device, set up new account, choose barcode, point the device towards the screen, read in the QR code. Then save the user settings by clicking the __Confirm__ button in the UI. \\ |
\\ |
[{Image src='tokencfg001.png' width='272px' height='..' align='left'}] [{Image src='tokencfg002.png' width='272px' height='..' align='left'}] [{Image src='tokencfg003.png' width='272px' height='..' align='left'}]\\ |
Microsoft Authenticator\\ |
[{Image src='IMG_2500.jpg' width='272px' height='..' align='left'}] [{Image src='IMG_2501.jpg' width='272px' height='..' align='left'}] [{Image src='IMG_2502.jpg' width='272px' height='..' align='left'}]\\ |
At line 25 changed one line |
__WARNING:__ the QR code is valid for one minute, if the time window is missed you will need to generate new, or it will not save. Once a secret key has been saved from the QR code, and confirmed, it can only be reset by a server administrator. Its a one time process.\\ |
__WARNING:__ the QR code is valid for 30 seconds, if the time window is missed you will need to generate new, or it will not save. Once a secret key has been saved from the QR code, and confirmed, it can only be reset by a server administrator. It's a one-time process.\\ |
At line 43 changed one line |
The end-user logs in with username and password, and initializing the "Setup of 2 factor auth" via the User Options button, scans the QR code, and hits the Confirm button. |
The end-user logs in with username and password, and initializes the "Setup of 2 factor auth" via the User Options button, scans the QR code, and hits the Confirm button. |
At line 56 changed 2 lines |
The end-user logs in with username and password, and initializing the Setup of 2 factor auth via the User Optons button, scans the QR code, and hits the Confirm button. |
In the background CrushFTP writes the Two factor authentication Secret to the user account, but the Admin needs to activate the "Two factor OTP/SMS authentication" option for the user. |
The end-user logs in with username and password, and initializes the Setup of 2 factor auth via the User Options button, scans the QR code, and hits the Confirm button. |
In the background, CrushFTP writes the Two-factor authentication Secret to the user account, but the Admin needs to activate the "Two factor OTP/SMS authentication" option for the user. |
At line 65 added 9 lines |
\\ |
---- |
\\ |
Google Authenticator for Webinterface logins only, enrolling is not possible via FTP, SFTP. |
A hidden flag in __prefs.XML__ controls for which protocols OTP should be enabled by default |
{{{ |
<twofactor_secret_auto_otp_enable_protocols>ftp,ftps,sftp,http,https,webdav</twofactor_secret_auto_otp_enable_protocols> |
}}} |
\\ |