====== EECS Linux Systems And Duo Authentication ====== The University of Tennessee's chosen [[https://2fa.utk.edu|two-factor authentication]] system is Cisco System's [[https://duo.com|Duo]]. Virtually all university services require a password and either a Duo push notification or a Duo passcode for authentication. [[wp>Multi-factor authentication|Two-factor (2FA) authentication]] is an important tool to help mitigate the threat of compromised user accounts. Beginning in the Spring semester 2022, EECS IT will add two-factor authentication to many departmental IT services. \\ \\ From [[https://oit.utk.edu/accounts/2fa/|UT's two factor (2FA) authentication website]]: Passwords aren’t getting the job done to protect the university and you against cyber attacks.\\ \\ 2FA boosts protection of your account from hackers. We are all used to having one layer of security — our password — to protect our accounts. With 2FA, if the hackers have your password, they will still need your phone or passcode to get into your account.\\ \\ When using 2FA, you’ll be required to use two different sources (factors) to verify your identity:\\ \\ * __Something you know__ – your username and password, and * __Something you have__ – a phone or passcode, to authenticate and gain access to an account. For example, this may be a smartphone or tablet using an app or a hardware token device. This document will refer to the process of password/two-factor Duo authentication simply as "Duo authentication". However, a password is always required as well. ===== SSH Duo Authentication Rollout ===== Secure Shell (SSH) authentication to EECS Linux systems will require Duo authentication, either directly or by use of the [[https://utk.teamdynamix.com/TDClient/2277/OIT-Portal/KB/ArticleDet?ID=130338|UT VPN]]. EECS IT will begin rolling out Duo authentication for supported Linux systems during the Spring semester 2022. This deployment will happen in four phases: * **Phase I**: EECS Red Hat Enterprise Linux 8 in-person lab, specifically the [[systems:hydra|Hydra]] and [[systems:tesla|Tesla]] computers.\\ Timeline: Start of classes, Spring 2022. * **Phase II**: EECS Red Hat Enterprise Linux 7 virtual lab systems such as the [[systems:vlsi-virtual|VLSI lab]].\\ Timeline: Early Spring semester, 2022 * **Phase III**: EECS Red Hat Enterprise Linux 7 individual desktop systems.\\ Timeline: Spring 2022 * **Phase IV**: EECS IT-supported Linux research servers:\\ Timeline: TBD ===== Secure Shell (SSH) and Duo ===== ==== Where will DUO be required? ==== All SSH connections will prompt for Duo authentication with the following //exceptions//: * Connections from //trusted// EECS-IT supported Linux systems. E.g. connections from one Hydra lab system to another will not require Duo authentication. * Connections from the UT PulseSecure VPN. Since the VPN already requires Duo authentication, no additional two-factor is required. ==== Public Key Authentication ==== Public key authentication (aka SSH keys authentication, Pubkey authentication) bypasses the normal password and Duo authentication mechanism. Thus, public key authentication will be restricted to the same set of exceptions that are listed above, i.e. public key authentication will continue to work when logging on from a trusted system or the VPN. To make this clear, if you are currently using a public/private key pair to log into EECS Linux systems from home, you //will need to connect to UT's VPN// to ssh into EECS Linux systems. ==== SSH with Duo ==== Logging in to a system with Duo authentication enabled is not much different from a regular SSH password-based login. After authentication with their password, a user is presented with a Duo prompt where they can choose to enter a passcode (displayed in the Duo mobile app) or, if they have a mobile phone registered with Duo, receive a push notification or SMS.\\ === Text-based SSH === Shell/text-based SSH clients (OpenSSH in MacOS, Windows (both native and WSL), Linux, etc.) will see a prompt like this: {{::ssh_duo_login_text.png?600|SSH Duo Login}}\\ Simply enter a passcode or select one of the two options to continue. === GUI SSH === GUI SSH/SFTP clients must support the ''keyboard-interactive'' authentication method to be able to use Duo authentication. Verified working clients include: == Windows == * [[https://mobaxterm.mobatek.net/|MobaXTerm]] * [[https://www.putty.org/|PuTTY]] * [[https://winscp.net/eng/index.php|WinSCP]] * [[https://filezilla-project.org/|FileZilla]] - see below **Example (WinSCP)**:\\ {{::winscp_duo.png?400|}} == MacOS == * [[https://cyberduck.io/|Cyberduck]] * [[https://filezilla-project.org/|FileZilla]] - see below **Example (Cyberduck)**:\\ {{::duo_cyberduck.png?300|}} \\ Some SSH/SFTP clients, e.g. FileZilla, may require the authentication method to be manually selected. For Duo authentication this should be "keyboard-interactive" or "interactive". If you favorite client no longer works, look for this setting. It may be called Authentication Method, Logon Method, Logon Type, or something similar. **Example**: Manually setting the authentication method in [[https://filezilla-project.org/|FileZilla]]:\\ - Change authentication method (Logon Type):\\ {{::filezilla_logon_type.png?800|}} - Duo authentication should now proceed:\\ {{:filezilla_duo.png?200|}} ===== Other Login Types and Duo ===== ==== Remote Logins ==== In addition to secure shell, some EECS systems support other login types, for example RealVNC connectivity. EECS IT will begin to add Duo authentication to these services as well. This will happen either by adding Duo directly to those services that support it or by placing access to the service behind UT's VPN. More information will be added to this page as changes are made. ==== Local Logins ==== EECS IT currently has no plans to add Duo authentication to //most// local logins to EECS systems. (A local login, sometimes known as a "console" login, means typing your user name and password directly into the system's keyboard and using the system's screen.) Exceptions to this include systems that require extra security as determined by the system owner or by a system security plan. If you wish to add Duo authentication to your EECS desktop, please [[:start|contact]] the EECS IT Staff for assistance.