Jump to:navigation, search
Wiki





notempty
Dieser Artikel bezieht sich auf eine nicht mehr aktuelle Version!

notempty
Der Artikel für die neueste Version steht hier

notempty
Zu diesem Artikel gibt es bereits eine neuere Version, die sich allerdings auf eine Reseller-Preview bezieht








































































































De.png
En.png
Fr.png






Important notes when using the OTP method
Last adaptation to the version: 11.8.8
New:
  • Renegotiation is configured exclusively in the UTM
  • OTP token details added
  • Password and OTP code entry possible in different formats
notempty
This article refers to a Resellerpreview

11.8 11.7

Foreword

If the OTP method is activated, login is only possible by entering a correct OTP.

  • Hint:
    If the OTP method is active for the admin web interface and SSH console, each administrator must have this token to access the device.
  • Exception on user basis is not possible

    SSL-VPN:
    Since SSL VPN re-authenticates every hour, a new OTP must also be entered every hour.

    Renegotiation can be increased or completely disabled in the → VPN →SSL-VPN menu in the settings of a connection in the
    General{{{2}}}
    tab under Renegotiation.
    Of course, disabling is not recommended. A change is transmitted by the UTM to the SSL VPN clients.
    An adjustment in the clients has been necessary only up to version 11.8.
      

    Saving the password in the SSL VPN client is not possible because the password that is passed is composed of the static user password and the OTP.

    In case of malfunction of the OTP generator (smartphone or hardware token), the OTP can only be generated if there is access to the QR code or the secret code. This can be found under → Authentication →User Print OTP QR Codes

    If the OTP generator for administrator access fails, you require a printed version of the QR code.


    If this is not available, access to the UTM is only possible with physical access directly at the device (keyboard and monitor at the UTM).

    Printout of this code for the administrators as described in OTP Secret. File in the documentation.

    Hint:
    Since the OTP method is time-based, care must be taken to ensure that the time server in the UTM runs synchronously with the hardware or software token.

    The time of the UTM system can be checked in three ways:

    • Using the administration web interface: The time is shown in the widget selection if it is not expanded or in the network menu under server settings in the time settings section.
    • Using the CLI with the command system date get
    • Using the root console with the command date


    The system time can then be set using the following options:

    • Using the administration web interface in the network menu under the menu item server settings in the section time settings
    • Using the CLI with the command system date set date then seperated with spaces the current date and time in the format YYYY-MM-DD hh:mm:ss

    OTP - One-Time-Password

    Das One-Time-Password (OTP) ist ein zusätzlicher Authentifizierungs-Mechanismus der für zusätzliche Sicherheit bei der Anmeldung eines Benutzers sorgt.
    In der UTM setzen wir das Zeit-Basierte-Verfahren ein (TOTP = Time-based One Time Password). Hierbei wird aus dem Sharedsecret Code und der aktuellen Uhrzeit alle 30 Sekunden ein neuer OTP errechnet.

    Um dieses 6 stellige Passwort zu generieren, wird als Token eine Smartphone App gneutzt, wie z.B. der Google Authenticator. Dieser ist sowohl für Android als auch für iOS Geräte verfügbar.
    Andere Apps wie z.B. FreeOTP für Android sind ebenfalls möglich.

    Set up OTP

    Activation procedure

    1. Ensure that the time of the UTM and the token runs synchronously
    2. Transmission of the secret code to the token
    3. Activating the OTP method on the UTM
    4. Testing the login before the current session has ended

    If the method is activated, each user of the selected applications must additionally log in via OTP.
    Exceptions are not possible.

    Configure OTP user

    First, the users are created under → Authentication →Users as usual.
    See also User Management.

    The OTP code for this user can only be displayed after the user's entries have been saved.
    Display or change by clicking on the edit button in the user row in the tab

    OTP{{{2}}}
    on the right side.


    Create a code automatically

    The code can be created automatically by the Securepoint UTM and is available in two formats.
    On the one hand as a QR code, which can simply be photographed with the smartphone app, and on the other hand in text form to be entered using the keyboard.

    The button can be used to regenerate the code.


    Enter a code

    It is also possible to manually enter a 16-digit base32 or HEX encoded key with . This is required, for example, for a hardware token such as the OTP c200. Here you receive a code from the supplier, which must then be registered to the user.
    Note that when entering a HEX encoded key, the

    • format
      followed by the
    • validity period must be added in brackets

    before the key, e.g. hex(60)A6ABBEF26746BC4242AE1764C2863826B98DD210.




    OTP Secret

    For distribution to the users there is a possibility to print the created codes. Print OTP QR-Codes

    A document in PDF format will then be generated.


    Setting up Google Authenticator

    First, the Google Authenticator must be downloaded from the app store, installed and opened.

    Datei:AND GA OTPkto-en.png
    The first window contains a description about the 2 levels of authentication to Google Account. Tap on the settings button.

    The first window contains a description about the 2 levels of authentication to Google Account. Tap on the settings button.

    In the Add account window that appears, in the Add account manually section, select either Scan barcode or Enter key.

    For Scan barcode, an additional app for scanning barcodes called "Barcode Scanner" may be installed if it is not already on the smartphone.

    In order to automatically create an account, simply point the smartphone camera into the area of the printed or on-screen QR code.



    Datei:AND GA OTPkto2-en.png
    Add OTP account manually

    If the QR code is not to be scanned, the data can be entered manually under Enter key. Time-based must be selected here.



    In the following window, the account is then displayed with the OTP code.
    The code changes every 30 seconds.

    The time display on the right gives an overview of how long this OTP password remains active.


    Use of a hardware token

    The use of a hardware token is also possible.
    This should be a RFC 6238 compatible password generator.

    We currently support the https://www.mtrix.de/portfolio/feitian/otp/ Feithan OTP c200].
    A download link for the HEX code is sent by the supplier for this purpose, which must be registered with the user as described above.

    The following parameters must be used:

    • SHA algorithm: SHA1
    • Time interval: 30 seconds
    Optional: SEED programming
    Background on SEED programming: In case the token happens to be created in in non-trustworthy countries and you want to make sure that it does not already contain malicious code or is otherwise compromised upon delivery, Mtrix will reprogram it for 1.77 Euros.
      


    Be sure to enter the token key and not the token ID

    The ID is a serial number of the token and the key is a 32 to 40 character code as shown in the figure.(Here with a time interval of 60 seconds).


    Check OTP

    The can be used to test whether the app generated OTP works.

    In the newly opened window, enter the password that the app displays for this user and click OK.
    Please enter OTP code OTP Code

    If everything is set up correctly, a message will appear.
    Info: For locally created users, a user group must be selected. The permissions of this user group are not significant.


    Assign OTP to applications

    Under → Authentication →OTP you can select for which applications the users should additionally authenticate themselves with the one-time password.

    Web interfaces

    Off Admin Web Interface

    Off User web interface


    VPN
    (Roadwarrior connection)

    Off IPSec

    Off SSL-VPN


    Firewall

    Off SSH (console)


    Use OTP

    Web interface

    When logging in to the administration or user web interface, there is now an additional authentication field for the OT code.

    Here, in addition to the user name and password, the generated code is entered.


    VPN

    If the remote terminal allows a separate transmission of the OTP password (UTM from version 11.8), the following procedure can be followed:
    Start the SSL VPN connection on the client (on Windows: double-click the lock icon in the taskbar).
    Establish the connection by clicking on Datei:SSL-VPN-v2 Verbindung-aufbauen-en.png
    The connection is established in three steps:

    SSL-VPN-v2 Benutzername-en.png
    Enter username
    SSL-VPN-v2 Kennwort-en.png
    Enter password
    SSL-VPN-v2 OTP-en.png
    Enter OTP
    SSL-VPN-v2 Verbunden.png
    Verbunden













    Remote terminal does not allow separate transmission of the OTP code:

    If OTP is used in combination with an SSL VPN or Xauth VPN connection and the remote terminal does not support the separate transmission of the OTP code, the OTP code must be entered directly after the user password without spaces during the password query.

    This option is not available in UTM versions 11.8.0 to 11.8.3.4.

    SSL-VPN-v2 Benutzername-en.png
    Username
    SSL-VPN-v2 Kennwort-en.png
    PasswordOTP













    Example:

    Password:
    insecure
    OTP:
    123456
    password
    insecure123456

    Saving the password in the SSL VPN client is not possible because the password that is passed is composed of the static user password and the OTP.



    SSH connection

    Datei:UTMv11-8 SSH-Login-en.png
    SSH login with OTP under PuTTY and v11.8

    If access is used with an SSH console and OTP, the OTP code is requested in a separate row Pin.


    Remote terminal does not allow separate transmission of the OTP code:

    Datei:UTMv11-7 SSH-Login-en.png
    SSH login with OTP under PuTTY and v11.7.15

    When accessing with an SSH console and OTP, and the counterpart does not allow separate transmission of the OTP code, the OTP code is entered without spaces directly after the user password.
    This option is not available in UTM versions 11.8.0 to 11.8.3.4.

    Example:

    Password in UTM:
    insecure
    OTP:
    123456
    Password
    insecure123456