- Viscosity vpn google authenticator install#
- Viscosity vpn google authenticator update#
- Viscosity vpn google authenticator verification#
Time synchronization, you can increase the window from its default Possible time-skew between the client and the server, we allow an extra Your chances to notice or even prevent man-in-the-middle attacks (y/n)īy default, tokens are good for 30 seconds and in order to compensate for Token? This restricts you to one login about every 30s, but it increases
Viscosity vpn google authenticator update#
Make sure to answer yes to the following question:ĭo you want me to update your "/home/$USER/.google_authenticator" file (y/n)īelow are three more questions you will be asked regarding how you want your tokens to function:ĭo you want to disallow multiple uses of the same authentication
Viscosity vpn google authenticator verification#
Google will now generate a URL, your secret key, verification code and some emergency new secret key is: UFMT4L562NPOXQY3 We do this by logging into whatever user will be using the VPN and issuing the following command:Īt this point you will be asked several questions, the first one is:ĭo you want authentication tokens to be time-based (y/n) After restarting openvpn we must generate the tokens we need for google-authenticator.Now lets restart openvpn so the changes take effect:.After making the changes on the server edit your client configuration file to include the following directive:.Use vi (or something similar) to edit the file and copy and paste the following configuration:Īuth pam_securetty.soĪuth required pam_google_authenticator.so forward_pass.Now we need to create the pam module that OpenVPN is expecting to use for authentication:.
Plugin /usr/lib/openvpn/openvpn-auth-pam.so openvpn We do this by adding the following line to your OpenVPN server configuration:
Viscosity vpn google authenticator install#
Yum install gcc python-devel subversion pam.i386 pam-devel.i386