I missed this one... true, it can be done like that, by using some value(s) unique to router, since it is for my home router and only I have access to it I did not bother, but good idea.
Edit: ROS feature request comes to my mind: Secure Storage - something like Mac Keychain password storage, can be some key-value storage unlocked with logged in user or running script user. Not exportable if not show-sensitive.
If we were talking about hardware 2FA token devices (e.g. RSA SecureID), it was a check that physical held something. Since semi-temper resitance and cannot backup/copy them, so if lost/missing you really are screwed ā that adds a quite a bit of a layer from 2FA. When your just switch to another app like Google Authenticator (or Authy or whatever TOTP-enabled app) on the same device that may have your password saved in the keychain/browser⦠Iām not sure that add the same level of securityā¦so not all 2FA isnāt the same. Does user-manager add something with TOTP⦠sure. How much, harder to quantify.
@Amm0
Excuse me, but I was sincerely asking about another practical use, except the above, not about the technology to use,
because I canāt think of anything elseā¦
Iām old, but your right MFA is the modern term. But Iām surprise they even have 2 on Mikrotik.
Also, I suppose if one drank the Cloudflare cool-aid, you could run the various ports through their app firewall. Cloudflare lets you apply various āMFAā in front of it. But Iām waiting for the ATP to try that approach .
If you ignore the "dumb admin" case, sure complete unneeded. But not everyone is smart.
I have seen something like this, not with Mikrotik, but same use case I'd imagine. AcmeCorp buys router from MT-Consultant. They don't want the MT-Consultant to be able to login remotely without AcmeCorp's authorization ā e.g. it is their router, but have install/support contract. Consultant enables the RADIUS login when provisioning the router, AcmeCorp is given the TOTP key and has Google Authenticator once the router is deployed in production. If remote access is later required, the AcmeCorp needs to provide MT-Consultant the TOTP key from an app to allow access. AcmeCorp does not have know a thing about RouterOS. MT-Consultant knows the password but they need the 6 digit code from the AcmeCorp for maintenance. Could MT-Consultant put a backdoor in, sure...but AcmeCorp may also perform security audit using a different consultant that may catch that.