bandit8623 132 Posted June 12 Posted June 12 (edited) 2 hours ago, muzicman0 said: Yes, but in order to put them on my VPN, I am making it so that some users can't access. As stated above. so you are giving admin access to some of your users? if so then give them 2 accounts 1 for non vpn (https and non admin) and the other for vpn (http with admin priv) lock out all https admin users from connecting freom outside your wan. no need to put all users on a vpn. if all your users from outside wan are not admin and connecting https all is good. just make admin users connect via vpn. even in domain enterprise environments you have your admin account which is only used for admin stuff... then the non admin account used for day to day. Edited June 12 by bandit8623
muzicman0 74 Posted June 12 Posted June 12 No, none of my users have admin access. That's not the point. And honestly, this has gotten away from the point of this thread.
bandit8623 132 Posted June 12 Posted June 12 (edited) 6 minutes ago, muzicman0 said: No, none of my users have admin access. That's not the point. And honestly, this has gotten away from the point of this thread. if none of your users have admin access then 2fa really is not a priority. i agree though it would be nice to have... Edited June 12 by bandit8623
SirSolox 6 Posted Tuesday at 04:36 PM Posted Tuesday at 04:36 PM +1 please get this added ASAP. It's crazy it's been 7 years since this was initially requested. 2 2
muzicman0 74 Posted Tuesday at 07:29 PM Posted Tuesday at 07:29 PM 2 hours ago, SirSolox said: +1 please get this added ASAP. It's crazy it's been 7 years since this was initially requested. Yep. A basic TOTP authentication would be fine. Plenty of open source libraries if they don't want to develop from scratch. 1 2
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now