paul wrote:
* Secure an enterprise PC:
2nd-factor strong auth is the selling point. The PC can be online connected to a corp AD as well as off-line when you are travelling.
The only ways I can think of to allow offline access would be:
1) Have the AES key in the machine's TPM store, and log on with local validation. Neat but it's hard to administer because it requires a secure authority to visit each laptop and commit the AES key to storage.
2) Just look at the public ID of the yubikey since we can't decrypt it without access to the AD server.
3) The default-- don't require yubikey to log in locally, but when we get back to the domain and try to access net resources, do the OTP then.
----
This is the reason I want to have these discussions here. Using symmetric encryption can be tricky because storage of the secret becomes important, and because it's impossible to evaluate the identity without knowledge of the secret or connection to (in this case) the domain.
Or, were you talking about having the OTP validation connect out to a publically available server such as the Yubico one? But I bet enterprises will not want to trust their identity security to an external company.
I look forward to responses; trying to generate some good ideas and discussion so the product is as good as possible.