<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MFA for SSH access to OnTap in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147063#M32721</link>
    <description>&lt;P&gt;My take on the documentation is that no matter what method of primary authentication you're using, local account or LDAP/NIS, the second factor can only be&amp;nbsp;&lt;EM&gt;publickey.&lt;/EM&gt; If you want to use an external Identity Provider other than AD/LDAP/NIS, the only applications supported are&amp;nbsp;&lt;EM&gt;http&lt;/EM&gt; and&amp;nbsp;&lt;EM&gt;ontapi,&lt;/EM&gt; not &lt;EM&gt;ssh&lt;/EM&gt;. You can verify this yourself by going to the command line and typing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;security login create -user-or-group-name "domain\group" -application ontapi -authentication-method ?&lt;/PRE&gt;
&lt;P&gt;Then do the same as above but swap&amp;nbsp;&lt;EM&gt;ontapi&lt;/EM&gt; for any of the other applications.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 01:00:25 GMT</pubDate>
    <dc:creator>CHRISMAKI</dc:creator>
    <dc:date>2019-03-13T01:00:25Z</dc:date>
    <item>
      <title>MFA for SSH access to OnTap</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147023#M32711</link>
      <description>&lt;P&gt;I have been reading about this lately. It says in the documentation that only local accounts are supported but also seeems to say that LDAP/NIS are supported. I maintain an Active Directory domain in my enterprise, and while domain authentication is not supported for MFA/SSH, could I instead configure LDAP to point to my AD domain and leverage that to support MFA for CLI access via SSH? We use Ping&amp;nbsp;MFA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 12:44:55 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147023#M32711</guid>
      <dc:creator>DinoBob</dc:creator>
      <dc:date>2025-06-04T12:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for SSH access to OnTap</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147063#M32721</link>
      <description>&lt;P&gt;My take on the documentation is that no matter what method of primary authentication you're using, local account or LDAP/NIS, the second factor can only be&amp;nbsp;&lt;EM&gt;publickey.&lt;/EM&gt; If you want to use an external Identity Provider other than AD/LDAP/NIS, the only applications supported are&amp;nbsp;&lt;EM&gt;http&lt;/EM&gt; and&amp;nbsp;&lt;EM&gt;ontapi,&lt;/EM&gt; not &lt;EM&gt;ssh&lt;/EM&gt;. You can verify this yourself by going to the command line and typing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;security login create -user-or-group-name "domain\group" -application ontapi -authentication-method ?&lt;/PRE&gt;
&lt;P&gt;Then do the same as above but swap&amp;nbsp;&lt;EM&gt;ontapi&lt;/EM&gt; for any of the other applications.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 01:00:25 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147063#M32721</guid>
      <dc:creator>CHRISMAKI</dc:creator>
      <dc:date>2019-03-13T01:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for SSH access to OnTap</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147166#M32740</link>
      <description>&lt;P&gt;Thanks. We use Active Directory accounts for administration.&amp;nbsp; It does not seem that they can be used for password/publickey authentication. But could we configure accounts for LDAP and point that LDAP to AD, and leverage that for MFA for SSH connections? That way we could still use our AD accounts to connect and still get MFA.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 19:24:17 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147166#M32740</guid>
      <dc:creator>DinoBob</dc:creator>
      <dc:date>2019-03-14T19:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for SSH access to OnTap</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147167#M32741</link>
      <description>&lt;P&gt;Hi Bob,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're right, if you're using&amp;nbsp;&lt;EM&gt;domain&lt;/EM&gt; as your primary authentication method for ssh, there is not secondary option. If you're using local account or&amp;nbsp;nsswitch as your primary method, then you can use&amp;nbsp;&lt;EM&gt;publickey&lt;/EM&gt; for your secondary.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 20:34:08 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/MFA-for-SSH-access-to-OnTap/m-p/147167#M32741</guid>
      <dc:creator>CHRISMAKI</dc:creator>
      <dc:date>2019-03-14T20:34:08Z</dc:date>
    </item>
  </channel>
</rss>

