[Halld-offline] Multi-Factor Authentication for Access to Scientific Computing Clusters
Alexander Austregesilo
aaustreg at jlab.org
Mon Jan 9 17:05:40 EST 2023
FYI
-------- Forwarded Message --------
Subject: [Jlab-scicomp-briefs] Multi-Factor Authentication for Access
to Scientific Computing Clusters
Date: Mon, 9 Jan 2023 15:08:17 +0000
From: Bryan Hess via Jlab-scicomp-briefs <jlab-scicomp-briefs at jlab.org>
Reply-To: Bryan Hess <bhess at jlab.org>
To: jlab-scicomp-briefs at jlab.org <jlab-scicomp-briefs at jlab.org>,
lqcd-users at jlab.org <lqcd-users at jlab.org>
On March 21st, 2023, SSH access to theFarm and LQCD computing
environment at JLab will require logins exclusively from multi-factor
authentication (MFA) login gateways.This will apply to all ifarm and QCD
interactive machines, both from off-site and from on-site. MFA gateways
suitable for this purpose will include the existing hallgw.jlab.org and
acclogin.jlab.org, and a new login gateway,
scilogin.jlab.org, established for this purpose.This is the same model
that is used for access to the experimental halls through
hallgw.jlab.org. A typical interactive login will require an MFA login
to one of the login gateways, followed by a standard (CUE password, or
SSH key) login to the desired ifarm or qcdi host.
In preparation for this, anyone with ifarm or qcdi access will be issued
MFA credentials in the coming weeks. This will come in the form of an
enrollment email to your JLabemail addressfrom
2factor at jlab.org. Supported clients include Google Authenticator,
Microsoft Authenticator, MobilePass client, and YubiKey hardware tokens.
Once you have MFA credentials, you may begin to use scilogin.jlab.org to
confirm that you are prepared for the cutover in March. Be sure to test
any SSH configuration you may have: ProxyJump, ControlMaster, or SSH
port forwarding are examples that are sometimes used.Please review the
‘Common Questions and Answers’ below for some tips and tricks to
streamline this process. If you have a scenario that you need
configuration assistance with when using with the new login gateways,
please contact helpdesk at jlab.org <mailto:helpdesk at jlab.org>.
If you have not accessed your JLab account for some time, please confirm
that you have access and that it has not been retired. You can forward
your JLab email to your preferred email account using this web page
<https://cc.jlab.org/pfeditor/edit> (authentication required, use your
JLab CUE account). If you no longer need access to your JLab account,
please contact helpdesk at jlab.org. <mailto:helpdesk at jlab.org>
*Common Questions and Answers*
*
*
*Q: Will SSH key-based logins work after March 21st?*
A:Although SSH keys to login to interactive machines will continue to
work,SSH loginsoriginating outside the environment must jump through an
MFA gateway, and MFA gateways will not support SSH key-based logins.
*Q: Where can I find information about two-factor enrollment?*
A: See the following Knowledge Base Articles
* SafeNet
<https://jlab.servicenowservices.com/sp?id=kb_article_view&sysparm_article=KB0011911>
* Google or Microsoft Authenticator
<https://jlab.servicenowservices.com/sp?id=kb_article_view&sysparm_article=KB0012313>
*Q: How can I avoid typing MFA onetime passwords repeatedly? How can I
use MFA once to create multiple windows on interactive machines?*
A:There are several tools for this that help to avoid needless password
entry.
1. tmux – tmux is available on many Linuxand BSD systems and allows you
to create multiple Unix shells in a single window, and to
disconnect/reconnect to them. It can be used on your local machine to
keep sessions open (assuming a stable network connection) as well as on
remote JLab systems to workwith multiple sessions after connecting just
once. An introduction is available here:
https://tmuxcheatsheet.com/quick-start/
<https://tmuxcheatsheet.com/quick-start/>
2.SSH singlesign-on (SSO) using ProxyJumpand ControlMaster– using SSH
configuration options, it is possible to create an SSO
environment between your remote desktop machine and the interactive
login nodes. The Knowledge Base article titled “(Open)SSH configuration
for Farm and QCD clusters
<https://jlab.servicenowservices.com/kb?id=kb_article_view&sysparm_article=KB0014918>”
outlines the needed components.
*Q: How can I use SCP or SFTP with this new configuration?*
A: This can be done using the same ProxyJump and
ControlMaster configuration
<https://jlab.servicenowservices.com/kb?id=kb_article_view&sysparm_article=KB0014918>shown
above.
*Q: What authenticators are supported? *
Software authenticators including Microsoft Authenticator, Google
Authenticator, and MobilePass app for iPhone or Android are supported.
HardwareYubiKey tokens issued by the helpdesk are also supported.
*Q: Is this the same MFA password as jupyterhub.jlab.org?*
It is not. The JupyterHub implementation uses a separate MFA instance,
creating a separate token. These may be merged ina future revision, but
currently is not the case.
*Q: Is SSH outbound from the ifarm or qcdi going to be blocked as part
of this work?*
A: No, outbound SSH will not be blocked. The firewall changes are being
made to inboundSSH from JLab or the Internet, which must pass through an
MFA gateway.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.jlab.org/pipermail/halld-offline/attachments/20230109/5563991b/attachment-0001.html>
-------------- next part --------------
--
This is an announcement-only list for Jefferson Lab Scientific Computing Updates .
Subscription and List Archive: https://mailman.jlab.org/mailman/listinfo/jlab-scicomp-briefs
For help: https://jlab.servicenowservices.com/scicomp
More information about the Halld-offline
mailing list