- Go to LDAP admin and create an user.
- Create the new user record in LDAP using either a template LDIF or manually in LDAP with a temporary password. User IDs must use firstname_lastname format (full name)
- Existing system admin user goes to home.netspective.com
- Existing system admin uses record from step 2 (user/pw) to login via “su – new_user” or through console
- su user
- This login via su should create new account with temporary password from LDAP sync
- Enter the google-authenticator command to get the secret key for that new user.
- Your new secret key is: XXXXXXXXXXXYour verification code is 99999Your emergency scratch codes are:11111111
Do you want me to update your “~/.google_authenticator” file (y/n) y
Do you want to disallow multiple uses of the same authentication
token? This restricts you to one login about every 30s, but it increases
your chances to notice or even prevent man-in-the-middle attacks (y/n) n
By default, tokens are good for 30 seconds and in order to compensate for
possible time-skew between the client and the server, we allow an extra
token before and after the current time. If you experience problems with poor
time synchronization, you can increase the window from its default
size of 1:30min to about 4min. Do you want to do so (y/n) y
If the computer that you are logging into isn’t hardened against brute-force
login attempts, you can enable rate-limiting for the authentication module.
By default, this limits attackers to no more than 3 login attempts every 30s.
Do you want to enable rate-limiting (y/n) y
- Provide the new user with the above secret key and temporary password.
- Ask new user to login, via TFA (two factor authentication)