-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MFA Cache #319
Comments
After thinking it over, I think this is simply not a good idea. There are plenty of alternative configurations to achieve an improved workflow, for example:
In regards to escalating privileges after authentication, this is easily resolved using sudo. Put all your root-permitted users in an Entra Id security group (called Sudoers, perhaps), then on the host run
Where 'e71148e2-cdd0-4f86-a47e-5d614539bdfa' is the object Id of the security group. I think I would recommend using passwordless + a suders security group. This would improve the work flow time, while still maintaining a high level of security. |
Summary
It would be great if a cache solution can be implemented in order to prevent back-to-back MFA requests when SSH-ing into a server and then attempting to escalate privileges, forcing another MFA session.
Problem Statement
Currently the flow when doing an authentication request is as such:
This would drastically slow down workflow as it takes about ~30 or so seconds for a user to go through the whole authentication flow.
Proposed Solution
As per our conversation in the Matrix chat, implementing a cache solution to cache users that are part of a specific group to not require MFA would solve the issue. MFA would be requested on initial login and then cached. That being said, it would be great if we can get the Cache TTL within the configuration file so it's not cached indefinitely and cause security concerns.
Benefits
This would improve UX and greatly improve speed.
The text was updated successfully, but these errors were encountered: