Traditional password-based authentication methods are based on “one-factor” authentication, where a user confirms an identity using a memorized password. Reliance on one-factor authentication exposes enterprises to increased security risks; passwords may be stolen, guessed, cracked, replayed, or compromised in other ways by unsolicited users by using Man in the Middle Attack.
Two factor authentication increases the security by adding an additional step to the basic log-in procedure which requires the user to have both the password and RSA Secure ID credentials from a hardware token before being able to access a device. Two factor authentication with RADIUS is supported with RSA Manager over PEAP and PAP protocols, and with Google Authenticator over PAP protocol. The authentication proceeds as four basic steps:
First, each hardware token is assigned to a user. It generates an authentication code every 60 seconds using built-in clock and the card‘s random key (seed). This seed is 128 bits long, is different for each hardware-token, and is loaded into the RSA Secure ID server (RSA Authentication Manager). The token hardware is designed to be tamper-resistant to deter reverse engineering of the token. SLX-OS only supports an RSA ID key fob as a secondary authentication token.
Secondly, the RSA Authentication Manager authenticates the user‘s password or PIN and token‘s combination. It takes the clock time as the input value for the encryption process and it is encrypted with the seed record. The resulting value is the token.
Third, the RSA Agent receives authentication requests and forwards them to the RSA Authentication Manager through a secure channel. Based on the response from the Authentication Manager, agents either allow or deny user access.
Finally, the RSA RADIUS Server forwards the user‘s user ID and passes code to the RSA Authentication Manager, which verifies that the user ID exists and that the pass code is correct for that user at that specific time.
Note
RADIUS two factor authentication does not support Challenge Handshake Authentication Protocol (CHAP).Welcome to Console Server Management Server HQ1-4E23-TS1 login: muser34 Password: **************** <-----For example password/8675309 device#