Authentication Schemes In Plesk

Authentication Schemes in Plesk – just say No to passwords

Using passwords for authentication has its caveats. Strong passwords are hard to remember, while weak ones are easily guessed. Once you have to keep track of dozens of passwords, committing them all to memory becomes unfeasible; you start writing them down (images of a passwords written on post-it notes stuck to the monitor make security specialists wake up in cold sweat), or reusing the same password for different services (even if it is a good one, recycling a password is far from ideal). Using a special application like 1password is always an option, but some may baulk at the $50 it costs to use the version for Mac. All this makes one wonder: how do I reduce the number of passwords I need to remember without putting security in jeopardy? Starting with version 12, Plesk comes with a number of features enabling you to log in to the panel without using passwords. Most of the authentication schemes described further are enabled by Plesk extensions. To install one of those, log in to Plesk, click Extensions in the left-hand menu, and then click Extensions Catalog. In this article I will be providing links to the Extensions Catalog website to make it easier to find the extensions I will be talking about.


I would like to begin with probably the least complicated authentication scheme extension on the menu today – one called LDAP Auth. It enables users to authenticate via LDAP. To make use of the extension the client must have been created in Plesk and must not be suspended. Once the extension has been installed, open its settings and specify the hostname and the login prefix. The following screenshot illustrates the scenario with Active Directory integration. Authentication schemes - LDAP Auth Extension We are actively using this extension on Plesk boxes within the company.

Social Authorization

The next extension I’d like to talk about is called Social Auth. It enables authentication via various social networks. From the administrator’s standpoint configuring this extension takes some effort, but the end result is worth it. For example, let us set up authentication scheme via the Google Account service. Note that we are not setting up integration with each and every individual service; we use the aggregator instead. In most cases this lets us achieve the desired result much more quickly and easily. Register an account, configure the required service (or services), and then enable authentication, specify the oneall keys, and choose the desired services in the extension settings in Plesk: Authentication schemes - Social Authorization extensionOnce you have finished setting up the extension, extra buttons for logging in using the social networks will appear on the login page. I am using this extension a lot on Plesk servers I administer that are located outside the company network.

Google Authenticator

Two-factor authentication scheme is facilitated by the Google Authenticator extension. To make use of it you need to install the Google Authenticator application on your smartphone. Afterwards install the extension in Plesk and enable it. To configure the extension, first scan the QR code with your smartphone: Authentication schemes - Google Authenticator extension When you try logging into the panel, you will be prompted for a verification code. Refer to the Google Authenticator application you have installed on your phone to obtain the code. Authentication schemes - Google Authenticator extension verification dialog

Plesk Utility  – login command

The plesk command line utility is used to wrap other Plesk command line utilities. With plesk login [USERNAME] a one-time login link for the specified user will be created. If no user is specified, the link for Plesk administrator is generated. The generated links can be used only once and become invalid after 24 hours since the generation time. Authentication schemes - Plesk Login Utility Read the documentation to learn more about Plesk Utitility.

Using Tokens

Using tokens is one more way of authenticating users in Plesk. We are not talking about any particular extension here; instead, we are talking about integration with other products and services. For example, say, you are a hosting provider, and you want your customers to have a “Log in to Plesk” button when they are logged in to their accounts. Instead of simply posting a link to the Plesk login page, which would make it necessary for your customers to type in their login and password, you can set up automatic logging in to the panel (as we presume that the customer has already completed the authentication procedure to access their account). “Under the hood” the mechanism looks like this: once the customer clicks the “Log in to Plesk” button, we send an API request to Plesk under administrator’s credentials to get the token, form an URL, and seamlessly insert it into to the customer’s browser. You can read more about this functionality in the official documentation, found here: Automatic Logging In to Plesk.

SSH Keys

The last extension I would like to touch upon is called SSH Keys. So far we have been speaking mainly about authenticating users in the panel; however, the chief reason Plesk even exists in the first place is to enable users to manage their web hosting and the files in their webspace. To manage their web content, users can use the web interface, FTP, or SSH. Instead of making your customers remember their system users’ passwords you can set up the SSH Keys extension, add SSH keys, and have them used for authentication instead. After the extension has been installed, browse to the subscription for which you want to enable SSH keys. Note the SSH Keys that has appeared on the Websites & Domains tab. Authentication schemes - SSH Keys It contains the list of SSH keys that have already been created, and also allows you to add new ones. Authentication schemes - Managing SSH keys To enable the user to connect via SSH you need to turn on shell access for them. Browse Websites & Domains -> Web Hosting Access, select the desired option (for example, /bin/bash) from the corresponding menu, and click OK. I am using this extension extensively (pun intended) on all my Plesk boxes, as remembering dozens of passwords for scores of system users is quite beyond my ability 🙂

Implementing your own authentication scheme

If for some reason none of the extensions I have been speaking about meet your requirements, you can implement one that is more to your liking. Refer to the Extensions SDK for information – I believe you will find API Authentication Hook to be particularly useful. You can use the source code of the LDAP Auth extension for reference – they are freely available.

In conclusion

If you are using Plesk and find authenticating using passwords tiresome, you have plenty of other options to choose from. Some may prove to be quite interesting, and suit your needs for everyday use.

How useful was this post?

Click on a heart to rate it!

Average rating / 5. Vote count:

As you found this post useful...

Follow us on social media!

Oh no, sorry about that!

Let us know how we can do better below


Alexei has been part of the Plesk team since 2005 and is the Plesk Core team's Unit Manager. He's passionate about programming, product development and driving tech teams.
Showing 9 comments
  • Sander van den Berg

    Is there some more information on how to use the ldap authentication module?
    I can’t get it to work.

    • Alexei Yuzhakov

      LDAP extension is rather simple by itself (it performs “bind” procedure with login/password pair on selected server). But LDAP auth is very tricky to configure in some cases. You can try to configure some other LDAP client with your LDAP server. After success you can apply the knowledge to LDAP extension for Plesk.

  • Marshall

    Are there any changes that need to be made in /etc/ssh/sshd_config (or anywhere else) to use the SSH Keys Management extension?

    • Alexei Yuzhakov

      By default there is no need to change anything in sshd_config. But you shouldn’t forget to enable shell access to particular system user (see the last screenshot).

  • Diplo

    Very interesting. When using Google Authenticator or Clef, what do you do if your mobile gets stolen or lost?

    • Alexei Yuzhakov

      The only option is to login via SSH and re-install the extension or ask admin for assistance.

      • Eric

        exactly why I am not a fan of google authenticator … phone screws up, phone is lost, phone is dead, phone is stolen

  • Pascal

    Comment reinstaller authenticator en SSH ?

Leave a Comment

Start typing and press Enter to search