These articles describe how to enable Nexus OTP as two-factor authentication method in Smart ID Digital Access component, to replace static passwords.
Nexus OTP can be either Nexus TruID Synchronized or Smart ID Mobile App OTP, or any other OATH-based mobile OTP application, such as Google Authenticator or Microsoft Authenticator. Some articles also describe how to enable Nexus Mobile Text as two-factor authentication method.
In the examples below, Digital Access will function as RADIUS server.
For more information on the differences between the mentioned OATH-based apps, see Compare Smart ID Mobile App with other mobile OTP apps.
The following use cases are described:
-
Set up Nexus OTP as 2FA for Check Point administration -
Set up Nexus OTP as 2FA for Cisco ASA -
Set up Nexus OTP as 2FA for Citrix NetScaler -
Set up Nexus OTP as 2FA for Cyberoam -
Set up Nexus OTP as 2FA for Fortinet Firewall -
Set up Nexus OTP as 2FA for Juniper Junos Pulse -
Set up Nexus OTP as 2FA for Outlook Web Access -
Set up Nexus OTP as 2FA for Palo Alto -
Set up Nexus OTP as 2FA for SafeInspect -
Set up Nexus OTP as 2FA for SSH login on Linux -
Set up Nexus OTP as 2FA for VMware Horizon View
Related information
- Authentication methods in Digital Access
- Compare Smart ID Mobile App with other mobile OTP apps
- Smart ID Digital Access component
- Smart ID Mobile App