[RADIATOR] Authby LDAP and Authby OTP
Joe Honnold
Joe_Honnold at starkey.com
Tue Dec 22 08:38:42 CST 2015
Thanks for the reply. I will give it a shot and see what happens.
Cheers!
Joe.
On 12/22/15, 8:31 AM, "radiator-bounces at open.com.au on behalf of Heikki Vatiainen" <radiator-bounces at open.com.au on behalf of hvn at open.com.au> wrote:
>On 12/21/2015 05:23 AM, Joe Honnold wrote:
>
>> I am working on a project for sending users OTP’s to gain access. I
>> would like to have users authenticate to AD and once accepted use Authby
>> OTP to generate a token and send it to the user via SMS. The user
>> would then enter the OTP and gain access.
>> I have done a bit of researching and found a config that I am using as a
>> base. http://www.van-sluis.nl/?p=345
>
>There is one major difference between the example config you were using
>and what you want to achieve: note that the example AuthBy LDAP2 had this:
>
> # We don't do authentication. Authentication is done by OTP.
> NoCheckPassword
>
>> The Authby LDAP2 in my config is working as expected but the Authby OTP
>> is not. It is a bit confusing at this point as I am unsure how to debug
>> the Authby OTP failure to find the exact issue.
>
>I'd say the problem is that AuthBy OTP sees a password and thinks this
>is the OTP.
>
>> My expectation is that if the Authby OTP was working right a
>> one-password would be generated and the sent to the users mobile number
>> found in AD.
>>
>> Any ideas where to start with this one?
>
>I think the authentication flow needs to be changed with something like
>this:
>
><AuthBy LDAP2>
> # Add this, otherwise unchanged
> PostAuthHook sub {my $p = ${$_[0]}; $p->{DecodedPassword} = '';}
></AuthBy>
>
><AuthBy OTP>
> # Add this, otherwise unchanged
> AddToReply State=otp-check
></AuthBy>
>
># New Handler goes here: Verify the OTP
><Handler State=otp-check>
> AuthBy SSLVPN_OTP
></Handler>
>
><Handler Client-Identifier = juni-sslvpn>
> # Unchanged
></Handler>
>
>
>The idea is this:
>1) Request first hits the current Handler
>2) Once AuthBy LDAP2 is done, it clears the password
>3) AuthBy OTP sees the empty passwords and generates the OTP
>4) AuthBy OTP adds State in the Access-Challenge
>5) The Access-Request with OTP will now contain 'State=otp-check'
>request attribute
>6) The new Handler processes the request and does just the OTP verify
>
>Please note the above is untested, but I'd say it should match how the
>two phase authentication should go.
>
>Please let us know if the above helps,
>Heikki
>
>--
>Heikki Vatiainen <hvn at open.com.au>
>
>Radiator: the most portable, flexible and configurable RADIUS server
>anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
>Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
>TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
>DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
>NetWare etc.
>_______________________________________________
>radiator mailing list
>radiator at open.com.au
>http://www.open.com.au/mailman/listinfo/radiator
More information about the radiator
mailing list