Reference Guide
Multi-Factor Authentication
Using MFA for HTTP/HTTPS Proxy
1 min
mfa can be used as an enhanced security level for http proxies when opening a web browser, the user is asked for their single connect credentials to connect to the http proxy after the successful log in, and if mfa is activated for http proxy, an mfa token is required when using the single connect desktop client, the mfa token is required when the user opens the webpage to enable mfa for http proxy pre requisite admin and users have the qr code, installed the single connect mobile app, scanned the qr code with the mobile app, and mfa is enabled for the user group that will be using mfa for http connections establish an ssh connection to single connect as the pamuser user edit the proxy properties file with the command vi /u01/http proxy/conf/http proxy properties check the configuration file to see if the parameter below is already configured in it if not, add the lines below if there is a hash (#) sign in front of the parameters, delete the hash (#) sign to activate the parameter if the parameter value is “false”, change it to “true” to type or add anything in the vi editor, first press the insert button on the keyboard, then type in the necessary line press esc to exit typing mode to save the file press esc, then a colon ( ), type in wq! and press enter if you do not want to save the changes to the file, press esc, then a colon ( ), then type in q! and press enter http proxy otp enabled=true http proxy connection initial otp enabled=false http proxy connection initial otp enabled parameter is set false by default if this parameter is set to true, then after successful authentication to http proxy mfa will be requested regardless of the target device if an authenticated user had defined a user group that mfa enabled restart the http proxy with the command systemctl restart pam http after these steps, otp will be required at the next http proxy log in