CReDo Phase 2: Multi Factor Authentication implementation

Digital Twin Hub > Downloads > CReDo Phase 2: Multi Factor Authentication implementation

Download File

  • File Information
  • Size: 0
  • Type:

The Science and Technology Facilities Council (STFC) are a key partner in the CReDo project (Climate Resilience Demonstrator) and have played a key role in designing and providing the security infrastructure that enables data sharing between the project partners.

This document provides a high-level overview of the implementation of the Multi-Factor Authentication (MFA) enabled Proxy that has been developed for CReDo phase 2, the landing application and their supporting technology.

The MFA solution deployed in this second phase of the CReDo project follows the Authentication Factors Principle (AFP) that states that any authenticator factors should fall within one of the three following categories:

·         Knowledge, things a user knows (e.g., password).

·         Possession, things a user has (e.g., phone).

·         Inherence, things a user are (e.g., fingerprint)

To truly design solutions that are secure, it is imperative to have two or more MFA authentication methods from different categories. The current CReDo solution has a password (knowledge) and phone based onetime passcodes (possession). This reduces the chance of any attacker gaining access to an account.

This solution is a key and novel aspect of the security setup of CReDo. The Identity Access Management (IAM) system implemented enables Single Sign On (SSO) for a website portal and an SSH Linux terminal, with Multi-Factor Authentication (MFA) required for both. Unlike conventional SSH access requiring distinct identities, a novel use of OpenID Connect’s device code flow by STFC enables users to authenticate in the Linux terminal, unifying IAM SSO for both platforms. This eliminates the need for separate identities for website and SSH access, allowing a centralized Role-Based Access Control (RBAC) system to be established, streamlining administrative tasks. The solution offers a unified login for developers, permits real-time permission management, and facilitates admin control over user access and permissions across both the web portal and Linux terminal.

To learn more about how the CReDo team has designed and implemented this solution, please refer to this document.