10.7. Multi-Factor Authentication

When a user accesses resources located behind a Clavister firewall, security can be further strengthened by using multi-factor authentication. This is also sometimes referred to as 2-factor authentication or 2-step authentication. The first factor is usually a conventional username and password credential combination. The other factor is typically a multi-character code which is sometimes referred to as a one-time password (OTP).

Multi-Factor Support is Automatic

By default, cOS Core provides automatic support for multi-factor authentication by being able to recognize a RADIUS Access-Challenge message and displaying a special webpage to request that an additional code is entered. This webpage is predefined in cOS Core and has the Banner File name LoginChallenge. The code that the user enters might be sent to the user at the time of authentication by the RADIUS server, perhaps using SMS or email. Alternatively, the code might be generated by the user with a code generation application which has been previously synchronized with the server.

The PhenixID Authentication Server (PAS) software product is an example of a RADIUS server that provides multi-factor capabilities (PhenixID is a Clavister subsidiary).

Mobile VPN IPsec clients are also supported by multi-factor authentication when using the following authentication methods:

Clavister's own OneConnect client is an example of a VPN client that supports multi-factor authentication. It is discussed further in Section 11.7, OneConnect VPN.

Multi-Factor Processing Sequence

The sequence of processing for multi-factor authentication with cOS Core is as follows:

The diagram below illustrates all the steps up to this point. In this diagram, it is assumed that the RADIUS server sends an SMS message with a one-time code to the user's smartphone.

Multi-Factor Authentication

Figure 10.5. Multi-Factor Authentication

The process now completes with the following steps:

Notes on Multi-Factor Authentication

Some points to note about setting up multi-factor authentication with cOS Core are the following: