OpenVPN Renegotiation Time with MFA
-
Hello,
We recently deployed EntraID MFA with our OpenVPN deployment. It works great minus one drawback that we've come across. Currently we have reneg-sec set at the server and client as reneg-sec 36000; We're finding that clients that actually stay connected for the term are only staying persistent for 9 hours and not the full 10 hours. Short of deploying a longer renegotiation time to compensate, has anyone seen these settings not honor the full timeout amount?
Thanks!
-
@rebelscum said in OpenVPN Renegotiation Time with MFA:
deployed EntraID MFA with our Op
Dear friend,
Would you be so kind to share some details how you configured this, from azure, pfsense and openvpn server perspective ?
As for re-negotiation, we use reneg-sec 0 on both sides, + ping settings Inactive 0
Thank you.
-
We tried setting reneg-sec on both sides to 0 but it caused the client to constant want the MFA prompt satisfied. The pings settings are already set to 0
Details from Azure. We have a CA policy that requires MFA when authenticating to the EntraID account. The Entra RADIUS VPN app is installed on our RADIUS box to interject the MFA prompt when authenticating to our local AD with the OpenVPN client. The MFA app has a limited config, with caching and renegotiation settings not being options.