Support

How-to” – instructions

Image

Add a second factor to your WordPress server

We have plugin specially made for that purpose. Six basic steps to security.

Image

Mikrotik router VPN 2FA authentication with the script

No radius server required. Mikrotik ROS has it’s own scripting language, powerful enough to use it for different tasks. In this repo notakey/mikrotik-2fa-vpn we can find all necessary components to make it happen.

Image

Notakey appliance as a radius server (not only proxy)

Radius plugin is based on modified freeradius container. 

Image

VPN 2FA in the setup with the radius server

NAA will act as a radius authentication proxy and return accept or deny replays according radius and Notakey appliance authentication results

Image

Notakey WCP and windows remote connection

How to setup appliance to work with windows Notakey credential provider

Image

Add Portainer plugin to manage containers in the NAA

Accelerate container adoption and reduce time-to-value on Docker and Kubernetes with a smart, self-service management portal, allowing you to deliver containerized applications from the data centre to the edge

Video Guides

How to install Rancher OS on ESXI VM

How to install Notakey Authentication Appliance

VRRP configuration guide

How to add VM to the cluster (use odd number of VM in the cluster)

Useful links

MikroTik client library for Notakey two factor authentication

Allows to integrate push notification based two factor authentication using Notakey Authenticator mobile app for iOS or Android in various MikroTik workflows, mainly targeted for VPN strong authentication

Add Multi Factor Authentication To Your Legacy Web Application

Configuration example of adding Notakey Multi Factor authentication to a legacy web application

Free, Secure and Strong — 2FA for Mikrotik and VPN

Complete guide how to setup the Notakey appliance at home. Radius authentication with Mikrotik User Manager as external user source

MFA evaluation guide

This guide will outline the different aspects of multi-factor security, which need to be taken into consideration, and help you evaluate them in the context of your requirements