Skip to content

Commit

Permalink
docs: add desktops to per-session-mfa page
Browse files Browse the repository at this point in the history
  • Loading branch information
zmb3 committed Mar 15, 2022
1 parent 7cfacf0 commit 10f8807
Showing 1 changed file with 17 additions and 11 deletions.
28 changes: 17 additions & 11 deletions docs/pages/access-controls/guides/per-session-mfa.mdx
Original file line number Diff line number Diff line change
@@ -1,24 +1,27 @@
---
title: Per-session MFA
description: Require MFA checks for user SSH and Kubernetes sessions.
description: Require MFA checks to initiate sessions.
videoBanner: j8Ze7HhjFGw
---

# Per-session MFA

Teleport supports multi-factor authentication on every SSH and Kubernetes
"connection" (a single `tsh ssh` or `kubectl` call). This is an advanced
security feature that protects users against compromises of their on-disk
Teleport certificates.
Teleport supports requiring additional multi-factor authentication checks
when starting new:

<Admonition type="note">
- SSH connections (a single `tsh` call)
- Kubernetes sessions (a single `kubectl` call)
- Desktop sessions

This is an advanced security feature that protects users against compromises of
their on-disk Teleport certificates.

<Notice type="note">
In addition to per-session MFA, enable login MFA in your SSO provider and/or
for all [local Teleport
users](../../setup/reference/authentication.mdx#local-no-authentication-connector)
to improve security.

</Admonition>
</Notice>

<Details
title="Version warning"
Expand All @@ -32,6 +35,8 @@ Teleport certificates.
only Auth and Proxy services are updated, these checks will *not* be properly
enforced. Additionally, only v6.1 or newer `tsh` binaries implement
per-session MFA checks.

Per-session MFA for Desktop Access was introduced in Teleport 9.
</Details>


Expand Down Expand Up @@ -93,8 +98,8 @@ spec:
...
```

Role-specific enforcement only applies when accessing SSH nodes or Kubernetes
clusters matching that role's `allow` section.
Role-specific enforcement only applies when accessing resources matching a
role's `allow` section.

#### Roles example

Expand Down Expand Up @@ -174,7 +179,6 @@ $ tsh ssh prod3.example.com
If per-session MFA was enabled cluster-wide, Jerry would be prompted for MFA
even when logging into `dev1.example.com`.


## Database access MFA

Database access supports per-connection MFA. When Jerry connects to the database
Expand Down Expand Up @@ -213,3 +217,5 @@ Current limitations for this feature are:
If you enable per-session MFA checks cluster-wide, you will not be able to
use Application access. We're working on integrating per-session
MFA checks for these clients.
- For Desktop Access, only WebAuthn devices are supported. Teleport does not
support U2F devices for Desktop Access MFA.

0 comments on commit 10f8807

Please sign in to comment.