-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for Hardware Key PIN to Teleport Connect #34415
Comments
@oshati just reported on Slack a customer running into a problem with The docs say that hardware keys are supported in Connect. However, if the process works the way it was described by Brian on Slack, I'm not sure if it ever worked in Connect:
lib/teleterm doesn't handle that error in any way AFAIK. On top of this, during login tsh daemon asks for multiple key taps, but Connect doesn't reflect that in the UI in any way. The login modal assumes that only one tap of the key is needed. Related: |
I imagine the issue was originally opened in the context of |
one more error 3 INVALID_ARGUMENT: private key policy not met: hardware_key_touch. , but in policy require_session_mfa: hardware_key_touch. Teleport connect 14.1.5 |
Ah, I incorrectly tagged the issues to close in #47652. It can be closed. |
Connect already implements an MFA prompt and a passwordless login prompt. The challenge here would be to refactor
api/utils/keys/yubikey.go
to not useapi/utils/prompt
directly, but rather accept some kind of an interface, where tsh would useapi/utils/prompt
and tsh daemon would speak with the Electron app somehow.That's another thing to figure out. The passwordless login prompt already implements prompting for PIN and picking credentials. However, this is implemented through the Electron app making a bidirectional streaming RPC to tshd. First, a bidirectional stream might not be necessary, since the messages are always send in a specific order and are finite (this is the case for passwordless login too). Second, from a quick look it seems that for PIV it'd have to be done just like the MFA prompt, where the tshd initiates an RPC to the Electron app. That's because in the case of passwordless login, the user explicitly selects passwordless login as the login option. But PIV is used automatically within
TeleportClient.SSHLogin
based on a response from the auth server.The text was updated successfully, but these errors were encountered: