Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to email@example.com
Ubuntu 2FA/MFA module provides a secure way to login into the linux Ubuntu desktop logins, remote or local linux SSH servers that enhance the security and makes the brute force attacks more difficult. Two-Factor Authentication (2FA / MFA) adds an extra layer of security to increase the identity assurance and reduce risk and exposure to the company's server or Ubuntu (Linux) systems. The users will use their existing credentials (username and password) as their first factor and then they will be prompted for entering the configured second factor type. miniOrange can connect to the on-premise AD (Active Directory) so that user will use their AD credentials to authenticate themselves. miniOrange Ubuntu Two-Factor / Multi-factor Authentication (2FA) module can be installed on Linux operating systems to add Two-Factor or Multi-Factor authentication on the top of local and Remote SSH access.
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Shibboleth, Ping, Okta, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more.
miniOrange offers free help through a consultation call with our System Engineers to Install or Setup linux Ubuntu MFA / 2FA (Two-Factor Authentication) solution in your environment with 30 days Free trial.
For this, you need to just send us an email at firstname.lastname@example.org to book a slot and we'll help you setting it up in no time.
Note: Currently miniOrange only supports TOTP Methods (OTP OVER SMS, OTP OVER EMAIL, GOOGLE AUTHENTICATOR, MICROSOFT AUTHENTICATOR, AUTHY AUTHENTICATOR, YUBIKEY HARDWARE TOKEN ) for linux MFA.
chmod a+x miniorange_mfa.sh
Note:- If multifactor authentication does not work, run this command as root.
cp /etc/pam.d/common-auth.backup /etc/pam.d/common-auth
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Okta, Shibboleth, Ping, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more. You can configure your existing directory/user store or add users in miniOrange.
1. Create User in miniOrange
2. Bulk Upload Users in miniOrange via Uploading CSV File.
Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.
|Activate LDAP||All user authentications will be done with LDAP credentials if you Activate it|
|Sync users in miniOrange||Users will be created in miniOrange after authentication with LDAP|
|Fallback Authentication||If LDAP credentials fail then user will be authenticated through miniOrange|
|Allow users to change password||This allows your users to change their password. It updates the new credentials in your LDAP server|
|Enable administrator login||On enabling this, your miniOrange Administrator login authenticates using your LDAP server|
|Show IdP to users||If you enable this option, this IdP will be visible to users|
|Send Configured Attributes||If you enable this option, then only the attributes configured below will be sent in attributes at the time of login|
Refer our guide to setup LDAPS on windows server.
miniOrange integrates with various external user sources such as directories, identity providers, and etc.
Contact us or email us at email@example.com and we'll help you setting it up in no time.
Our Other Identity & Access Management Products
Seamless login for workforce and customer identity to cloud or on-premise appsLearn more
Secure access for identities with an additional layer of authenticationLearn more