Files
gitea-pages/admin-guide/configuration/access/mfa.md

878 B

MFA - Multi Factor Authentication

MFA can be enabled on any standard system with following configuration:

# disable kerberos authentication
ssh_server::enable_gssapi: false

# #disable ssh key authentication
ssh_server::enable_public_key: false


aaa::radius_auth: true
aaa::radius_shared_secret: ENC[PKCS7,MIIBuQYJK...9Z82qA==]
aaa::radius_servers: [ 'nps01.psi.ch', 'nps02.psi.ch' ]
aaa::radius_timeout: 60

Beside this, ensure that ChallengeResponseAuthentication yes is set correctly in your sshd config (this is the default configuration - so if no changes where configured to sshd this should be ok!).

Prerequisite for this is, that your server can reach the RADIUS servers (in the example nps01.psi.ch and nps02.psi.ch) and that you received a shared secret from the RADIUS admin. (at the time of writing the RADIUS server are supported by group 9521)