RCDevs OpenOTP Plugin for Owncloud version 1.2.3 Copyright (c) 2010-2018 RCDevs SA, All rights reserved.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
OpenOTP plugin enables two-factor authentication to login to Owncloud Admin/User Panel.
Username/Email and Password are validated locally, and next step the plugin handle the Second Factor, i.e. the Challenge, as a "Two-Factor Vendor".
OpenOTP plugin manage several Login Mode including:
- Owncloud Password (OCP) + OTP (either fill in the input text, or easier by Pressing OK when receiving the Push Notification on mobile).
- OCP + FidoU2F (U2F Fido authentication method, see https://fidoalliance.org/ for more details.)
- OCP + OTP Or FidoU2F
User must exists in both Local Database and OpenOTP server (=LDAP integration). Owncloud User Name must be the same as OTP Server (LDAP) Login Name (or email in NC and UPN/Alias in OpenOTP) but password could be different (simple passwords are not sent to OTP server). The reason is the way how Owncloud designs TwoFactor vendor integration, most of the time all the login steps could be validated to a single User backend (e.g. Authentication Server) avoiding duplicate accounts. The new plugin is compatible with user_ldap core application. So, with just a little attribute to configure in the LDAP app, it's possible to have all the user account in one place, your LDAP Directory (Owncloud need local accounts to work properly but they are auto generated with LDAP integration app)
(No more contextual auth, account auto-creation while first Login on OpenOTP, Local OR Remote password validation (avoiding user blocking during configuration), remote password management (handle now by core), Global or per user permission) When using Desktop client, you have to generate an Application password in your Dashboard, OpenOTP server is not contacted to authenticate. On the other hand, for Mobile application, OpenOTP Plugin handle login requests in the same way as for Application in your Web Browser, e.g. if you have configured Push notification on OpenOTP Authentication Server, you don't have to leave your Mobile, click on the notification and Confirm login.
OpenOTP is the RCDevs user authentication solution. OpenOTP is a server application which provides multiple (highly configurable) authentication schemes for your LDAP users, based on one-time passwords (OTP) technologies and including: - OATH HOTP/TOTP/OCRA Software/Hardware Tokens - Google Authenticator - Mobile-OTP (mOTP) Software Tokens - SMS One-Time Passwords
- Mail / Secure Mail One-Time Passwords - Yubikey Visit https://www.rcdevs.com/products/openotp/ Follow the quick start guide: http://docs.rcdevs/howtos/openotp_quick_start/openotp_quick_start/ or download our appliances: https://www.rcdevs.com/downloads/index.php?id=VMWare+Appliances
Compatible Owncloud 10.x (Tested on 10.0.4/10.0.7/10.8.0) Version 1.2.3
- If your PHP installation does not have the soap extension, install the php-soap .. package for your Linux distribution. With RedHat, do it with 'yum install php-soap'.
- Upload openotp_auth directory under the 'apps' directory of your ownCloud.
- RCDevsOpenOTP Application folder should have read write permission for the web server .. user (under debian/ubuntu : chown -R www-data:www-data openotp_auth)
- Navigate to the 'Apps' page in Admin. .. Click on 'OpenOTP Two Factor Authentication' in the application list. Then click the 'Enable' button.
-
Navigate to the 'Admin' page / Additional settings, or go directly to the configuration via Admin button in the header
-
Set at least the server url and the Client Id, Click 'Save'
-
Allow users to administer Two-factor on their profile settings page or not. When activated, User goes to Personnal section to enable or not Two-Factor on his account.
-
It's possible to use LDAP/AD Integration (user_ldap) application with RCDEvs OpenOTP (openotp_auth) app. Be sure to configure LDAP plugin to create your local user with the uid/samaccountname, otherwise a random generated string is used for username when accounts are auto-created during import process. To do this, click on Expert tab, and fill in "Override UUID detection" with the correct login name based on your LDAP directory (uid/samaccountname...)
-
Contextual authentication: Change the LoginMode to LDAP-only for requests comming from trusted devices on trusted IPs. One user device gets trusted for a specifc IP address after a successful two-factor authentication. Contextual Authentication need a persistant cookie after logout to work properly.
-
!! IMPORTANT !! keep an admin user working without otp in case of a problem. If not you can:
-> Switch authentication method to Standard (Owncloud password): "UPDATE *PREFIX*appconfig SET configvalue = 0 WHERE appid = 'openotp_auth' AND configkey = 'rcdevsopenotp_authentication_method' -> Disable openOTP authentication for one (admin?) user: "DELETE FROM *PREFIX*appconfig WHERE userid = '%yourusername%' AND appid = 'openotp_auth' AND configkey = 'enable_openotp' Replace *PREFIX* by owncloud table prefix 'oc_' by default
1.2.3
- Add compatibility for oc10.8.0
- Add a setting to ignore SSL/TLS certificate errors
1.2.2-1
- Add compatibility for oc10.0.8 - oc10.0.9
1.2.2
- implement contextual authentication
- app:check-code integrity
1.2.1
1.2.0
- Add compatibility to owncloud v10
- Handling Exceptions
- Fido U2F enhancement
1.1.1-1
- Added Contextual authentication
change the LoginMode to LDAP-only for requests comming
from trusted devices on trusted IPs.
- New openotp.wsdl file including context parameter
1.1.1
Added support to OpenOTP Software Token with Push Notif Authentication
Extend php soapclient to add timeout capabilities
WebService API is now versioned
U2F javascript scripts updated
OTP Challenge input doesn't show anymore characters in clear text (type=password)
1.1
Application compatible with owncloud 9.0.1
1.0.1
Enhanced remote Password
Add FidoU2F.js library to avoid to installation of the U2F plugin in Google Chrome
1.0.0
Initial public release.