Multi-factor Authentication
As part of our ongoing commitment to data security and compliance with NIST 800-171 requirements, MFA is now required for users who access Controlled Unclassified Information (CUI) in the wi-hpc
cluster, including dbGaP and NBDC datasets.
Quick Start
1. Log into cluster
ssh user@wi-hpc
2. Start the MFA Setup
google-authenticator
When prompted, with Do you want authentication tokens to be time-based (y/n)?
, type y
to accept.
3. Scan the QR Code
A QR-Code will now appear on your screen, open the Microsoft Authenticator application on your phone, and scan it (blue button in bottom left). A new entry will now appear on your Microsoft Authenticator app.
4. Enter Verification Code
Back in your terminal, enter in the 6-digit code from your device (make sure you refresh by swiping down on the app).
5. Save Emergency Scratch Codes
Emergency Scratch codes will appear in your terminal, make sure to save these somewhere safe (e.g., Bitwarden).
6. Confirm File Location
It will then ask you where to save the .google-authenicator
file. This defaults to your home directory, please accept this default with y
.
Warning
This file is unique to your account and must be kept private!
7. Final Prompts
Answer y
to all remaining prompts to complete the setup.
8. You're All Set
Finally, you will be setup for MFA on the wi-hpc
cluster.
Now, when you login, you will be prompted for a verification code as well as your password (hence MFA).
ssh user@wi-hpc
(user@wi-hpc) Verification code:
(user@wi-hpc) Password:
Info
If the login is not working, please try closing the Microsoft Authenticator application and re-open.
Info
You will only need to input your code once every 24 hours (if coming from the same IP address; in office vs. at home on VPN).
As always, please see Getting Help if you experience any issues and/or have any questions.
Troubleshooting/FAQ
Why do I need to do this
As part of our ongoing commitment to data security and compliance with NIST 800-171 requirements, we are implementing an important change for users who access Controlled Access Datasets (CAD), including dbGaP and NBDC datasets. We know it's an extra step, but this federal requirement for controlled access datasets helps keep our computing environment compliant and your research data secure. We appreciate your cooperation.
Can you apply MFA only to the directory instead of every login?
Unfortunately, it is not possible to set MFA only for a specific share/directory. It must be done at the login step.
We choose it to be a part of the SSH piece rather than just putting the whole HPC Cluster behind the VPN (even when in office) and require the MFA there. However, this would put a heavy traffic burden on the VPN possibly leading to more issues.
Login keeps asking for code/password
If the login is not working, please try closing the Microsoft Authenticator application and re-open.
I lost my code in Microsoft Authenticator / I got a new phone
If you deleted or lost your code in your Microsoft Authenticator app, use one of the Emergency Scratch codes to login. Once, logged in run google-authenticator
again to regenerate the QR code and overwrite your old config.
I use Bitvise as my SSH client
If you are using Bitvise as your SSH client (on Windows), under the "Authentication" section, select your Initial Method as password+kbdi. From there, you can input your password and/or your code. If you don't put any, you will be prompted for the code and password upon clicking Log In.