- This line was added.
- This line was removed.
- Formatting was changed.
Purpose and Benefits
2FA is additional security mechanism to protect the user from fraudulent act. Bahmni uses basic authentication (username, password) from OpenMRS so far. However, it is optimal to have additional security mechanisms to protect users from fraudulent acts. Thus we are introducing 2FA in Bahmni. This feature is optional for an implementation. When this feature is enabled then the user will be authenticated with username and password first and on success, the user will get an SMS with an OTP to his/her registered mobile. The user has to authenticate with the OTP before proceeding to use the system.
The generated OTPs use Java's SecureRandom (see details of the implementation here). The OTPs and all operations like generation, validation, expiry are handled in memory only. There is no database involved.
1. Enable/disable 2FA
To enable/disable 2FA, add the following snippet in the /etc/bahmni-installer/setup.yml file before Bahmni installation.
2. Add SMS gateway service
Bahmni gives flexibility add SMS gateway service to the implementer.
Please refer bahmni-sms-plugins for more info.
3. Add user's mobile number
Add the user's mobile number to the OpenMRS database.
The contact table is present in the OpenMRS database. It has 3 columns.
- user_name must be exactly the same as the username in OpenMRS.
country_code can be found here.
Country_code should not contain the preceding "+"
mobile_number is the mobile number of that user.
If reports module is installed, then for reports-user 'bypass2fa' role should be added to OpenMRS.
insert into contact(user_name, country_code, mobile_number) values('Leo','91','9955273623');
|If reports module is installed, then for reports-user 'bypass2fa' role should be added to OpenMRS.|
4. Check Audit Logs
Every event is captured in the audit log. The log file will be created every day, but only recent files from the past 90 days are kept.
Audit logs are located at /var/log/bahmni-two-factor-auth/audit-logs directory
Sample log entries:
- OTP 623704 generated for doctor1
- Failed attempt #1 using OTP 123131 by doctor1
- OTP 623704 validation successful for doctor1
5. Override OTP configurations
These settings can be overridden by adding configuration to the application.properties file.
application.properties is located at /home/bahmni/.bahmni-security directory
|OTP_LENGTH||Number of digits in the generated OTP||6|
|OTP_EXPIRES_AFTER||Number of minutes the OTP should be valid after it is generated||15|
Number of times the user is allowed to enter a wrong OTP, before the user is redirected to the login screen
Number of times the user can request a new OTP by clicking on resend button, before the user is redirected to the login screen