This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.
Two factor authnetication is considered be any two of the following.
1) Something you know
2) Something you have
3) Something you are
I want to know whether any of you would consider the following as two factor authentication...
A preconfigured copy of the cisco software VPN client including conenction details of an IPSec VPN (this includes the pre share key). And authentication to a windows domain configured on the VPN end point (a Cisco ASA).
One way to look at it is that the "something you have" is the Pre-configured Cisco VPN Client. And the "Something you know" is your Windows domain username and password.
What is the accepted wisdom on 2 factor authentication?
Can the Pre-configured VPN client be considered 1 of the authentication factors?
To me, strong authentication means at least some component of the authentication is out of band. Lots of folks think differently though.
Alternatively, you might call is weak[er] 2-factor;-) Does the "pre-configured client" mean that the software is somehow validated too? Will the shared key be the same for everyone? Will it ever change? An RSA token would be more secure. Still, it's certainly better than just a username/password. What are you trying to protect against?
The cisco vpn software client stores the IKE preshared key. This is the "something i have". This is the same key for everyone and is unlikely to change very often (if ever).
The username and password is the "something i know", and this is different for each user.
I know im going to be asked by auditors whenther we have 2 factor authentication for remote access vpn users. And I wanted to know if our current setup could be thought of as 2 factor.
Personally i dont think it is. And i agree that some kind of RSA token solution would be better.
we had that same setup and it did NOT pass for 2 factor, because the pre-shared key is not unique for every VPN user/machine. We had to implement RSA tokens to pass the audit. Your auditors may say the same.
Thank you to both of you for helping me with this issue. At least i know where i stand with the auditors. This will give me leverage tim implement additional token authentication.