Being able to easily access your cloud instances from the Public Internet is one of the most requested features from developers and system administrators. If you deploy your instances either in EC2-Classic or EC2-VPC public subnet, you can reach the machines easily by opening the 22 port to the public.
But is this a safe way to connect to your servers? NO, not really.
Usually, devops and sysadmins create a Bastion hosts in order to access any other cloud instance from the Public Internet. In this case, you will open the 22 port to the public on the bastion host Security Group and for the rest of the machines you can open the 22 port only for the Bastion host Security Group. In this way you can easily add a hop in your connection process: only Bastian Hosts have an access to your cloud instances inside AWS.
Even if a Bastian Host could be a first solution, this is not we are looking for when we are dealing with security in the cloud. In fact you can easily get your bastian host compromised by hackers and they would get access to all the machines behind this “firewall”.
Multi-Factor Authentication(MFA) is the solution we are looking for. Along with user username and password, users should enter the dynamically generated MFA code to login into cloud instances.
To setup the MFA, Google has an open source tool called Google Authenticator, which is widely covered on all the platforms for Multi-Factor Authentication (MFA) or Two-Factor Authentication(TFA).
Let me show you how to setup the MFA authentication on a Linux machine.
Setup the Google Authenticator on Linux Bastion host
To enable the MFA on the Linux Bastion host, we need to setup the Google Authenticator PAM module for the machine that you want to enable with MFA.
- . Linux uses PAM (Pluggable Authentication Module) to integrate the Google Authenticator MFA. So make sure that PAM and PAM-Devel packages are installed on your system. If not, please install them.
# yum install pam.x86_64
# yum install pam-devel.x86_64
- Download the latest stable release Google Authenticator source package
# wget https://google-authenticator.googlecode.com/files/libpam-google-authenticator-1.0-source.tar.bz2
- Unzip the package and navigate to the package directory
# bunzip2 libpam-google-authenticator-1.0-source.tar.bz2
# tar -xf libpam-google-authenticator-1.0-source.tar
# cd libpam-google-authenticator-1.0
- Install the package into the system
- Make changes to the PAM and SSH configuration files to enable the Multi-Factor Authentication over SSH logins.
auth required pam_google_authenticator.so – Add this to the /etc/pam.d/sshd
In /etc/ssh/sshd_config, change the two parameters to yes and save it
Restart the sshd service – # /etc/init.d/sshd restart
- Switch to the user to whom you want to enable the MFA and run the google-authenticator command. This will generate the new secret key and distribute it to the respective user
In this example, I have used mfauser
# su – mfauser
Setup the Google Authenticator App in Mobile Phone
Now, we need to setup the Google Authenticator App in our mobile device. You can find the Google Authenticator app in all the major mobile platforms like: Android, iOS and Windows Phone.
Here are the steps to install and configure the Google Authenticator
- Install the Google Authenticator from the vendor App Store. It is freely available in all the top platforms (Android, iOS and Windows Phone). In this example, I used the Windows Phone app.
The app is available for Windows Operating system users also: https://code.google.com/p/gauth4win
- Open the app and click on “+” button to add the name of the account and secret key
- Provide the Account name of your convenient and enter the secret key received from your administrator and click on “save” button
It would be good, if you give the Account name as : username@machinehostname
- Now, you can see the new account added in your Authenticator dashboard.
Logging into the Linux server along with MFA
- Use SSH client to connect to the Linux server remotely using Linux/Mac native SSH client or putty from Windows
- It will prompt for both Verification code and Password. Enter the 6-digit dynamically generated number from your mobile Google Authenticator app of this account as a verification code and then your standard password. Please enter the 6-digit number before it expires, otherwise it will generate a new number and again you have to go through entering password and then a new Verification code.
We are done. You server access is now protected by MFA.
Important note: The Multi-Factor authentication works with only password based SSH login. If you are using any private/public key SSH session, it will ignore MFA and log you in directly. So please disable the ssh key based authentication on SSH configuration of your server.
WaitCondition Controls the Pace of AWS CloudFormation Templates
AWS's WaitCondition can be used with CloudFormation templates to ensure required resources are running.As you may already be aware, AWS CloudFormation is used for infrastructure automation by allowing you to write JSON templates to automatically install, configure, and bootstrap your ...
The 9 AWS Certifications: Which is Right for You and Your Team?
As companies increasingly shift workloads to the public cloud, cloud computing has moved from a nice-to-have to a core competency in the enterprise. This shift requires a new set of skills to design, deploy, and manage applications in the cloud.As the market leader and most mature p...
Two New EC2 Instance Types Announced at AWS re:Invent 2018 – Monday Night Live
The announcements at re:Invent just keep on coming! Let’s look at what benefits these two new EC2 instance types offer and how these two new instances could be of benefit to you. If you're not too familiar with Amazon EC2, you might want to familiarize yourself by creating your first Am...
Google Cloud Certification: Preparation and Prerequisites
Google Cloud Platform (GCP) has evolved from being a niche player to a serious competitor to Amazon Web Services and Microsoft Azure. In 2018, research firm Gartner placed Google in the Leaders quadrant in its Magic Quadrant for Cloud Infrastructure as a Service for the first time. In t...
Understanding AWS VPC Egress Filtering Methods
In order to understand AWS VPC egress filtering methods, you first need to understand that security on AWS is governed by a shared responsibility model where both vendor and subscriber have various operational responsibilities. AWS assumes responsibility for the underlying infrastructur...
S3 FTP: Build a Reliable and Inexpensive FTP Server Using Amazon’s S3
Is it possible to create an S3 FTP file backup/transfer solution, minimizing associated file storage and capacity planning administration headache?FTP (File Transfer Protocol) is a fast and convenient way to transfer large files over the Internet. You might, at some point, have conf...
Microservices Architecture: Advantages and Drawbacks
Microservices are a way of breaking large software projects into loosely coupled modules, which communicate with each other through simple Application Programming Interfaces (APIs).Microservices have become increasingly popular over the past few years. The modular architectural style,...
What Are Best Practices for Tagging AWS Resources?
There are many use cases for tags, but what are the best practices for tagging AWS resources? In order for your organization to effectively manage resources (and your monthly AWS bill), you need to implement and adopt a thoughtful tagging strategy that makes sense for your business. The...
How to Optimize Amazon S3 Performance
Amazon S3 is the most common storage options for many organizations, being object storage it is used for a wide variety of data types, from the smallest objects to huge datasets. All in all, Amazon S3 is a great service to store a wide scope of data types in a highly available and resil...
How to Optimize Cloud Costs with Spot Instances: New on Cloud Academy
One of the main promises of cloud computing is access to nearly endless capacity. However, it doesn’t come cheap. With the introduction of Spot Instances for Amazon Web Services’ Elastic Compute Cloud (AWS EC2) in 2009, spot instances have been a way for major cloud providers to sell sp...
What are the Benefits of Machine Learning in the Cloud?
A Comparison of Machine Learning Services on AWS, Azure, and Google CloudArtificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. There is every reason to beli...
How to Use AWS CLI
The AWS Command Line Interface (CLI) is for managing your AWS services from a terminal session on your own client, allowing you to control and configure multiple AWS services.So you’ve been using AWS for awhile and finally feel comfortable clicking your way through all the services....