Implementing SSH Multifactor Authentication Using Multiple, Layered Rules

How-to Implement Multifactor Authentication for SSH Connections.

    Implementing SSH multifactor authentication using multiple, layered rules allows for more granular Access Control such as controlling who and when endpoints may be accessed. This process requires four (4) primary steps:

    1. Rules Creation
    2. Policy Creation
    3. Policy Assignment
    4. Adding Policy to Endpoint

    Example Policy Rule #1

    (All IP addresses and all users must authenticate at all times.)

    1. Using the ZeroLock® Management Console (ZMC) go to CONTROL POLICIES | RULES.  The default rule currently allows all connections without any SSH authentication.   We  want to change that to require authentication.
      Current Default SSH MFA Policy Rule-1

    2. To create a rule requiring SSH Authentication, go to CONTROL POLICIES | RULES, then select ACTIONS drop-down menu.  From that menu click Add New Rule.
      Add New Rule 2.0.1

    3. When creating a new policy rule, it is recommended the Name and Description of the rule are clear and concise, so it’s function is easily understandable.  As this policy rule will require all IP addresses and users to authenticate at all times, the IP address and User fields are left blank, meaning the rule applies to all.
      New Rule and Description 2.0.1

    4. From the Rule Type drop-down menu, select SSH-MFA then CREATE.  The first rule has been created.
      SSH MFA Create 2.0.1


    Example Policy Rule #2

    (Specific IP addresses on specific days and at specific times do not require authentication)

    We also want to create a rule that is more specific but will NOT require SSH for a specific IP address on a specific hour of the day and a specific day of the week. This will be our Time-of-Day Rule. This type of rule may be needed for a maintenance window for a tool or appliance requiring SSH access.

    Rule requirements:

    • Time of day requirement = 2200-2300
    • Only from this IP address = 10.0.0.1
    • Only on Thursdays

    Return to the Actions | Add New Rule to create a Time-of-Day requirement.  

    Numbered New Policy Rule 2.0.0.1
    1. As before, ensure the Name and Description of the rule are clear and concise, so it’s function is easily understandable.  
    2. Again, the Rule Type is SSH-MFA.
    3. This is the source IP address of the person logging in.
    4. Use this field if the user logging is to be a specific user.
    5. Select the checkbox as this rule will apply Date and Time restrictions.
    6. Select the start and end dates for applying this rule.
    7. The day(s) of the week the rule is active.
    8. The start and end hours that the rule is active.
    9. Specify the actions that is to be taken if the rule is triggered.  Select Allow.
      1. Allow – the SSH session continues as normal.
      2. Authenticate – causes the SSH session to be subject to authentication.
      3. Reject – terminates the session immediately.
    10. Select CREATE to create the rule.

    Policy Creation (using the example policy rules created above)

    Policies consist of rules so to create a new SSH authentication policy we will add the two (2) rules we just created. This requires navigating to Policies | Add New Policy.

    1. Enter the Name and Description of the policy.
    2. Select Add Rules. On the Policy Rules screen, select the rules we just created and Click Add Selected.
    New Policy Numbered 2.0.1

     

    Adding 2 new Rules 2.0.1

    Order matters in how rules function.  It works like a firewall where the top rule is checked first, if that rule meets the criteria, it is triggered, and no other following rules are read.  

    To ensure the time-specific rule is applied, we have to place it first, so it’s read first.  If we don’t, the first rule read will be the rule requiring authentication at all times of day and our Time-of-Day rule will be ignored.

    Always have the more restrictive rules first, followed by the less restrictive ones with the least restrictive and default rules towards the bottom so there are always rules to fall back on.

    Order of New Rules 2.0.1

     


    Policy Assignment

    The final step is to assign the newly created SSH authentication policy to an Endpoint.  

    1. Go to  Systems Configuration | Config Profiles | Add New Profile as shown below.
      Add New Profile 2.0.1

    2. On selecting Add New Profile, the New Configuration Profile screen appears.   
      New Config Profile 2.0.1-1
    3. Add a Name and Description for this profile.   
    4. In the Default Control Policy box click on the Policy drop-down and select the new policy you just created.
    5. Select the create to complete the process.

    Adding Policy to Endpoint

    Once the configuration profile has been created, we have to apply it to an Endpoint.  

    1. Navigate to the Endpoints screen, select which endpoint you want to apply the new profile to, and click Actions.  On the drop-down select Set Endpoint Config.
      Set Endpoint Config 2.0.1

    2. Select the profile then click Set Configs.   
      Set Configs Close up 2.0.1

    3. Once the button is clicked all the rules and policies that were created are now applied to this endpoint.   
      Showing SSH authentication 2.0.1

     You have successfully applied a new policy to an endpoint.