Authentication Schemes in Plesk – just say No to passwords

Using passwords for authentication has its caveats. Strong passwords are hard to remember, while weak ones are easily guessed. Once you have to keep track of dozens of passwords, committing them all to memory becomes unfeasible; you start writing them down (images of a passwords written on post-it notes stuck to the monitor make security specialists wake up in cold sweat), or reusing the same password for different services (even if it is a good one, recycling a password is far from ideal). Using a special application like 1password is always an option, but some may baulk at the $50 it costs to use the version for Mac. All this makes one wonder: how do I reduce the number of passwords I need to remember without putting security in jeopardy?

Starting with version 12, Plesk comes with a number of features enabling you to log in to the panel without using passwords. Most of the authentication schemes described further are enabled by Plesk extensions. To install one of those, log in to Plesk, click Extensions in the left-hand menu, and then click Extensions Catalog. In this article I will be providing links to the Extensions Catalog website to make it easier to find the extensions I will be talking about.

LDAP Auth

I would like to begin with probably the least complicated authentication scheme extension on the menu today – one called LDAP Auth. It enables users to authenticate via LDAP. To make use of the extension the client must have been created in Plesk and must not be suspended.

Once the extension has been installed, open its settings and specify the hostname and the login prefix. The following screenshot illustrates the scenario with Active Directory integration.

Authentication schemes - LDAP Auth Extension

We are actively using this extension on Plesk boxes within the company.

Social Authorization

The next extension I’d like to talk about is called Social Auth. It enables authentication via various social networks. From the administrator’s standpoint configuring this extension takes some effort, but the end result is worth it.

For example, let us set up authentication scheme via the Google Account service. Note that we are not setting up integration with each and every individual service; we use the oneall.com aggregator instead. In most cases this lets us achieve the desired result much more quickly and easily. Register an oneall.com account, configure the required service (or services), and then enable authentication, specify the oneall keys, and choose the desired services in the extension settings in Plesk:

Authentication schemes - Social Authorization extensionOnce you have finished setting up the extension, extra buttons for logging in using the social networks will appear on the login page.

I am using this extension a lot on Plesk servers I administer that are located outside the company network.

Google Authenticator

Two-factor authentication scheme is facilitated by the Google Authenticator extension.

To make use of it you need to install the Google Authenticator application on your smartphone. Afterwards install the extension in Plesk and enable it. To configure the extension, first scan the QR code with your smartphone:

Authentication schemes - Google Authenticator extension

When you try logging into the panel, you will be prompted for a verification code. Refer to the Google Authenticator application you have installed on your phone to obtain the code.

Authentication schemes - Google Authenticator extension verification dialog

Plesk Utility  Рlogin command

The plesk command line utility is used to wrap other Plesk command line utilities. With plesk login [USERNAME] a one-time login link for the specified user will be created. If no user is specified, the link for Plesk administrator is generated. The generated links can be used only once and become invalid after 24 hours since the generation time.

Authentication schemes - Plesk Login Utility

Read the documentation to learn more about Plesk Utitility.

Using Tokens

Using tokens is one more way of authenticating users in Plesk. We are not talking about any particular extension here; instead, we are talking about integration with other products and services. For example, say, you are a hosting provider, and you want your customers to have a “Log in to Plesk” button when they are logged in to their accounts.

Instead of simply posting a link to the Plesk login page, which would make it necessary for your customers to type in their login and password, you can set up automatic logging in to the panel (as we presume that the customer has already completed the authentication procedure to access their account).

“Under the hood” the mechanism looks like this: once the customer clicks the “Log in to Plesk” button, we send an API request to Plesk under administrator’s credentials to get the token, form an URL, and seamlessly insert it into to the customer’s browser.

You can read more about this functionality in the official documentation, found here: Automatic Logging In to Plesk.

SSH Keys

The last extension I would like to touch upon is called SSH Keys. So far we have been speaking mainly about authenticating users in the panel; however, the chief reason Plesk even exists in the first place is to enable users to manage their web hosting and the files in their webspace. To manage their web content, users can use the web interface, FTP, or SSH. Instead of making your customers remember their system users’ passwords you can set up the SSH Keys extension, add SSH keys, and have them used for authentication instead.

After the extension has been installed, browse to the subscription for which you want to enable SSH keys. Note the SSH Keys that has appeared on the Websites & Domains tab.

Authentication schemes - SSH Keys

It contains the list of SSH keys that have already been created, and also allows you to add new ones.

Authentication schemes - Managing SSH keys

To enable the user to connect via SSH you need to turn on shell access for them. Browse Websites & Domains -> Web Hosting Access, select the desired option (for example, /bin/bash) from the corresponding menu, and click OK.

I am using this extension extensively (pun intended) on all my Plesk boxes, as remembering dozens of passwords for scores of system users is quite beyond my ability ūüôā

Implementing your own authentication scheme

If for some reason none of the extensions I have been speaking about meet your requirements, you can implement one that is more to your liking. Refer to the Extensions SDK for information – I believe you will find API Authentication Hook to be particularly useful. You can use the source code of the LDAP Auth extension for reference – they are freely available.

In conclusion

If you are using Plesk and find authenticating using passwords tiresome, you have plenty of other options to choose from. Some may prove to be quite interesting, and suit your needs for everyday use.

17 Comments

  1. Is there some more information on how to use the ldap authentication module?
    I can’t get it to work.

    • LDAP extension is rather simple by itself (it performs “bind” procedure with login/password pair on selected server). But LDAP auth is very tricky to configure in some cases. You can try to configure some other LDAP client with your LDAP server. After success you can apply the knowledge to LDAP extension for Plesk.

  2. Are there any changes that need to be made in /etc/ssh/sshd_config (or anywhere else) to use the SSH Keys Management extension?

  3. Very interesting. When using Google Authenticator or Clef, what do you do if your mobile gets stolen or lost?

  4. Comment reinstaller authenticator en SSH ?

  5. Hi there, if I understand correctly, this is a fine way to protect the web admin environment, but it is in no way a Plesk system-wide MFA and easily circumvented by not using the web interface.

    For instance, using the iOS app, no Authenticator code is need to add the server and to view basic information (file access is restricted fortunately, and “Open in plesk” (not sure the English string) still opens the web version, requiring the Authenticator OTP).

    Not yet familiar with the entire inner workings of Plesk, but it doesn’t seem like this is the proper way?

    • Alexei Yuzhakov
      Alexei Yuzhakov Moderator

      You can protect iOS app with secret code and TouchID (see “More” menu). Yes, right now there is no seamless integration between mobile app and MFA protected Plesk.

  6. There is a problem with this plugin. Turned out, my Plesk Onyx and later updated to Obsidian got very slow on all plesk panel pages because of this plugin. It was worst on Domain Settings page – 11 seconds to render. I had to disable all modules to figure it out.
    Of course this plugin was the last one, I would suspect. Switching it back again make the issue return.
    Please, check the functionality of it.

  7. I use the google Authenticator, and it works great for the Admin Account. However, i cant find a way to Enable it for my users/customers, am I missing something?

  8. Will this work with Authy?

    • Laura from Plesk
      Laura from Plesk Moderator

      Hey Mark! This article is a bit old, perhaps you can ask the support team behind it directly on here. And keep your eyes peeled for more updates on this topic – New info is coming soon. Thanks!

Add a Comment

Your email address will not be published. Required fields are marked *

We are Plesk

Value simplicity and automation too? We help devs, sysadmins, and resellers run, manage and secure via our control panel solutions, extensions and hyperscale opportunites. Discover how you fit with us.

GET LATEST NEWS AND TIPS

  • Yes, please, I agree to receiving my personal Plesk Newsletter! Plesk International GmbH and its affiliates may store and process the data I provide for the purpose of delivering the newsletter according to the Plesk Privacy Policy. In order to tailor its offerings to me, Plesk may further use additional information like usage and behavior data (Profiling). I can unsubscribe from the newsletter at any time by sending an email to [email protected] or use the unsubscribe link in any of the newsletters.

Related Posts

Knowledge base

Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt