PAM authentication is the simplest form of username/password authentication we can use with OpenVPN. A username and password using PAM, and a challenge request using a TOTP authentication app. This guide will add two more authentication steps. This guide assumes you have followed one of our server setup guides and you are already able to connect to the server we will be modifying using certificate/key authentication. You have a computer or phone with the Google or Microsoft Authenticator app installed. You already have a copy of Viscosity installed on your client device and already setup for this server.You have already an OpenVPN server running using one of our guides.You have root access to this installation.You have already installed the latest LTS version of Ubuntu ( 22.04 at time of writing).This guide will expand on setting up an OpenVPN server on Ubuntu by adding TOTP support to that server using Viscosity's built in Challenge/Request support. One type of 2FA is TOTP (Time-Based One-Time Password Algorithm) with an Authenticator application, for example Google or Microsoft Authenticator on your phone. This adds another security measure to prevent unwanted users connecting to your server. One way to do that is to use 2FA (Two Factor Authentication). See how to use GitHub for project planning with GitHub Issues, check out what's on the roadmap, and learn more in the docs.After setting up your own OpenVPN server, you may want to enhance it's security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |