Reference Guide
Multi-Factor Authentication
Using MFA for TACACS+ Manager
mfa can be used with the tacacs+ manager to activate mfa for tacacs+ manager admin and users have the qr code, installed the kron pam mobile client, scanned the qr code with the mobile client, and mfa is enabled for the user group using mfa for tacacs+ connections (see sections docid 0au1bmrs8rwzogz5kogy4 , docid\ ppbcxkfudfccrxtkbs1jd , docid\ fgqar5tv6lsoe8zgmbtfn ) connect to kron pam cli from the ssh client as a kron pam admin user stop the tacacs+ function with the command below (do not close the ssh session) systemctl stop pam tacacs log in to the kron pam web gui navigate to administration > tacacs management click the options button, and delete the configuration in the ssh session, edit the kron tacacs conf file with the command vi /pam/gui/kron/etc/kron tacacs conf check the configuration file to see if the parameter below is already configured in it if not, add the lines below if there is a hash (#) sign in front of the parameters, delete the hash (#) sign to activate the parameter if the parameter value is “false”, change it to “true” to type or add anything in the vi editor, first press the insert button on the keyboard, then type in the necessary line press esc to exit typing mode to save the file press esc, then colon ( ), type in wq! and press enter if you do not want to save the changes to the file, press esc, then colon ( ), then type in q! and press enter the red text red text below may need to be changed for the kron pam installation if the default values are acceptable for the installation, the red text does not need to be added at all otp { enabled = 1; host = otp endpoint webserver ip otp endpoint webserver ip ; port = otp endpoint webserver port, default value 80 otp endpoint webserver port, default value 80 ; cache interval = 300; num digits = 6; ssl = 1 if the otp endpoint webserver is working on https, default value 0 1 if the otp endpoint webserver is working on https, default value 0 ; path status = path of the otpstatus service, default value /twofactorauth ui/rest/tfa/otpstatus; path of the otpstatus service, default value /twofactorauth ui/rest/tfa/otpstatus; path valid = path of the otpvalid service, default value /twofactorauth ui/rest/tfa/otpvalid path of the otpvalid service, default value /twofactorauth ui/rest/tfa/otpvalid ; } restart the tacacs+ function systemctl restart pam tacacs