SafeNet Authentication Service

Similar documents
SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service Agent for Cisco AnyConnect Client. Installation and Configuration Guide

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service. Service Provider Billing and Reporting Guide

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Client

SafeNet Authentication Service

SafeNet Authentication Manager

SafeNet Authentication Service. Java Authentication API Developer Guide

SafeNet Authentication Service Authentication API for Microsoft.Net. Developer Guide

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for VMware Horizon 6

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with CA SiteMinder

Integration Guide. SafeNet Authentication Service. SAS using RADIUS Protocol with WatchGuard XTMv. SafeNet Authentication Service: Integration Guide

SafeNet Authentication Client

SafeNet Authentication Service

SafeNet Authentication Client

SafeNet Authentication Manager

SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Service Token Validator Proxy Agent. Installation and Configuration Guide

SafeNet Authentication Manager

SafeNet Authentication Client

SafeNet MobilePASS+ for Android. User Guide

SafeNet Authentication Service Agent for Microsoft Outlook Web App. Installation and Configuration Guide

SafeNet Authentication Client

SafeNet Authentication Manager

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet Authentication Service. Push OTP Solution Guide

SafeNet Authentication Client

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

SafeNet Authentication Service (SAS) SAML Authentication Quick Start Guide

Sentinel EMS 4.1. Release Notes

Integration Guide. SafeNet Authentication Service (SAS)

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Check Point Security Gateway

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft NPS Technical Manual Template

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA

Integration Guide. SafeNet Authentication Manager. Using SafeNet Authentication Manager with Citrix XenApp 6.5

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

SafeNet Authentication Service. Service Provider Quick Start Guide

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

SafeNet Authentication Service Cisco AnyConnect Agent. Configuration Guide

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN

SafeNet Authentication Service Synchronization Agent. Configuration Guide

SafeNet Authentication Service. Subscriber Account Operator Guide

Integration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

Cloud Access Manager Overview

Synchronization Agent Configuration Guide

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft SharePoint on IIS 7/8. Technical Manual Template

Synchronization Agent Configuration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Integration Guide. SafeNet Authentication Client. Using SAC CBA with Juniper Junos Pulse

SafeNet Authentication Service. PCE/SPE Installation Guide

NetApp Cloud Volumes Service for AWS

Integration Guide. SafeNet Authentication Service. NetDocuments

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide

Terms of Use. Changes. General Use.

HYCU SCOM Management Pack for F5 BIG-IP

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Authentication Manager Self Service Password Request Administrator s Guide

EAM Portal User's Guide

Release Notes. BlackBerry Enterprise Identity

SonicWall Global VPN Client Getting Started Guide

Cloud Access Manager SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0. Overview

SafeNet Authentication Service PCE/SPE with Support for HSM PSE 2 Integration. Feature Documentation

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

Integration Guide. SafeNet Authentication Service. Strong Authentication for Citrix Web Interface 4.6

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

One Identity Defender 5.9. Product Overview

CRYPTOCard Migration Agent for CRYPTO-MAS

Partner Center: Secure application model

AN2143 Application note

Disaster Recovery Guide

Integration Guide. SafeNet Authentication Service. Protecting Syncplicity with SAS

Partner Information. Integration Overview. Remote Access Integration Architecture

Installation and Configuration Guide

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

SafeNet Authentication Service (SAS) Service Provider Administrator Guide

Transcription:

SafeNet Authentication Service Integration Guide Using RADIUS Protocol for Application Request Routing (ARR)

All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. 2017 Gemalto. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners. Document Part Number: 007-013947-001, Rev. A Release Date: October 2017

Contents Third-Party Software Acknowledgement... 4 Description... 4 Applicability... 4 Environment... 5 Audience... 5 RADIUS-based Authentication using SafeNet Authentication Service Cloud... 5 RADIUS-based Authentication using SafeNet Authentication Service-SPE and SafeNet Authentication Service-PCE... 6 RADIUS Authentication Flow using SafeNet Authentication Service... 6 RADIUS Prerequisites... 7 Configuring SafeNet Authentication Service... 8 Creating Users Stores in SafeNet Authentication Service... 8 Assigning an Authenticator in SafeNet Authentication Service... 8 Adding ARR as an Authentication Node in SafeNet Authentication Service... 9 Configuring ARR... 11 Creating Rule for the Web Application... 13 Configuring Rules for Response Rewriting... 13 Running the Solution... 19 Support Contacts... 21 Customer Support Portal... 21 Telephone Support... 21 3

Third-Party Software Acknowledgement This document is intended to help users of Gemalto products when working with third-party software, such as Application Request Routing (ARR). Material from ARR software is being used solely for the purpose of making instructions clear. Screen images and content obtained from ARR software will be acknowledged as such. Description SafeNet Authentication Service (SAS) delivers a fully automated, versatile, and strong authentication-as-aservice solution. With no infrastructure required, SafeNet Authentication Service provides smooth management processes and highly flexible security policies, token choice, and integration APIs. Application Request Routing (ARR) is an extension to Internet Information Server (IIS), which enables an IIS server to function as a load balancer. With ARR, an IIS server can be configured to route incoming requests to one of multiple web servers using one of the several routing algorithms. By load balancing requests, high availability of web servers can be achieved without incurring the typically-high costs of dedicated load balancing products. ARR requires the URL Rewrite extension to function, and uses it for routing requests. ARR can be configured to redirect traffic based on server variables, URLs, cookies and more, and performs full layer 7 load balancing. ARR's functionality can be described as a load balancing and reverse proxy. This document describes how to: Deploy multi-factor authentication (MFA) options in ARR using SafeNet one-time password (OTP) authenticators managed by SafeNet Authentication Service. Configure ARR to work with SafeNet Authentication Service in the RADIUS mode. It is assumed that the ARR environment is already configured with IIS, URL rewrite and web application working prior to implementing multi-factor authentication using SafeNet Authentication Service. ARR can be configured to support multi-factor authentication in several modes. The RADIUS protocol will be used for the purpose of working with SafeNet Authentication Service Applicability The information in this document applies to: SafeNet Authentication Service (SAS) SafeNet s cloud-based authentication service SafeNet Authentication Service Service Provider Edition (SAS-SPE) A server version that is used by Service Providers to deploy instances of SafeNet Authentication Service SafeNet Authentication Service Private Cloud Edition (SAS-PCE) A server version that is used to deploy the solution on-premises in the organization 4

Environment The integration environment that was used in this document is based on the following software versions: SafeNet Authentication Service Private Cloud Edition (SAS-PCE) ARR Version 3 IIS Version 7 IIS agent -- Version 1.05 URL rewrite Version 2.0 Audience This document is targeted to system administrators who are familiar with ARR, and are interested in adding multi-factor authentication capabilities using SafeNet Authentication Service (SAS). RADIUS-based Authentication using SafeNet Authentication Service Cloud SafeNet Authentication Service (SAS) Cloud provides two RADIUS mode topologies: SAS cloud hosted RADIUS service A RADIUS service that is already implemented in the SAS cloud environment and can be used without any installation or configuration requirements. Local RADIUS hosted on-premises A RADIUS agent that is implemented in the existing customer s RADIUS environment. The agent forwards the RADIUS authentication requests to the SAS cloud environment. The RADIUS agent can be implemented on a Microsoft NPS/IAS or FreeRADIUS server. 5

This document demonstrates the solution using the SAS cloud hosted RADIUS service. For more information on how to install and configure SAS Agent for IAS/NPS, refer to: http://www2.gemalto.com/sas-downloads/docs/007-012390- 002_SAS_Agent_for_NPS_1.30_ConfigurationGuide_RevD.pdf For more details on how to install and configure FreeRADIUS, refer to the SafeNet Authentication Service FreeRADIUS Agent Configuration Guide. RADIUS-based Authentication using SafeNet Authentication Service-SPE and SafeNet Authentication Service-PCE For both on-premises versions, SafeNet Authentication Service (SAS) can be integrated with the following solutions that serve as local RADIUS servers: Microsoft Network Policy Server (MS-NPS) or the legacy Microsoft Internet Authentication Service (MS-IAS) SafeNet Authentication Service is integrated with the local RADIUS servers using a special onpremises agent called SAS Agent for Microsoft IAS and NPS. For more information on how to install and configure the SAS Agent for Microsoft IAS and NPS, refer to the following document: http://www2.gemalto.com/sas-downloads/docs/007-012390- 002_SAS_Agent_for_NPS_1.30_ConfigurationGuide_RevD.pdf FreeRADIUS The SAS FreeRADIUS Agent is a strong authentication agent that is able to communicate with SAS through the RADIUS protocol. For more information on how to install and configure the SAS FreeRADIUS Agent, refer to the Gemalto Support Portal. RADIUS Authentication Flow using SafeNet Authentication Service SafeNet Authentication Service (SAS) communicates with a large number of VPN and access-gateway solutions using the RADIUS protocol. 6

The image below describes the data flow of a multi-factor authentication transaction for ARR. A user attempts to access a website hosted on the IIS server using an OTP authenticator. IIS agent sends a RADIUS request with the user s credentials to SafeNet Authentication Service (SAS) for validation. The SAS authentication reply is sent back to IIS. The IIS-ARR will rewrite the Published URL with internal web application URL and the user is presented with the application. RADIUS Prerequisites To enable SafeNet Authentication Service (SAS) to receive RADIUS requests from ARR, ensure the following: The ARR environment is already configured with IIS. The URL rewrite and web application functionalities must be working before implementing the multi-factor authentication using SAS. Active directory should be installed and configured on the IIS server. The IIS agent should be installed and configured. To know about the IIS agent configuration, open the following link: http://www2.gemalto.com/sas-downloads/docs/007-012393- 002_SAS_IIS_Agent_1.05_Configuration_Guide_RevD.pdf Ports 1812/1813 are open to and from ARR. A shared secret key has been selected. A shared secret key provides an added layer of security by supplying an indirect reference to a shared secret key. It is used by a mutual agreement between the RADIUS server and RADIUS client for encryption, decryption, and digital signatures. 7

NOTE: For this integration the sample web application access URL is: http://example.com/webmail/default.aspx Created webmail folder in inetpub and copied default.aspx page in webmail folder. The web application can be accessed locally by using the following URL with port number: http://localhost:8081/ or http://example.com:8081 Configuring SafeNet Authentication Service The deployment of multi-factor authentication using SafeNet Authentication Service (SAS) with ARR using RADIUS protocol requires the following: Creating Users Stores in SafeNet Authentication Service, page 8 Assigning an Authenticator in SafeNet Authentication Service, page 8 Adding ARR as an Authentication Node in SafeNet Authentication Service, page 9 Creating Users Stores in SafeNet Authentication Service Before SafeNet Authentication Service (SAS) can authenticate any user in your organization, you need to create a user store in SAS that reflects the users that would need to use multi-factor authentication. User records are created in the SAS user store using one of the following methods: Manually, one user at a time, using the Create User shortcut Manually, by importing one or more user records via a flat file Automatically, by synchronizing with your Active Directory / LDAP server using the SAS Synchronization Agent For additional details on importing users to SafeNet Authentication Service, refer to Creating Users in the SafeNet Authentication Service Subscriber Account Operator Guide: https://safenet.gemalto.com/resources/integration-guide/dataprotection/safenet_authentication_service/safenet_authentication_service Subscriber_Account_Operator_G uide/ All SafeNet Authentication Service documentation can be found on the SafeNet Knowledge Base site. Assigning an Authenticator in SafeNet Authentication Service SafeNet Authentication Service (SAS) supports a number of authentication methods that can be used as a second authentication factor for users who are authenticating through ARR. The following authenticators are supported: etoken PASS RB-1 Keypad Token KT-4 Token 8

SafeNet Gold SMS Token MP-1 Software Token MobilePASS MobilePASS+ Authenticators can be assigned to users in two ways: Manual provisioning Assign an authenticator to users one at a time. Provisioning rules The administrator can set provisioning rules in SAS so that the rules will be triggered when group memberships and other user attributes change. An authenticator will be assigned automatically to the user. Refer to Provisioning Rules in the SafeNet Authentication Service Subscriber Account Operator Guide to learn how to provision the different authentication methods to the users in the SAS user store. https://safenet.gemalto.com/resources/integration-guide/dataprotection/safenet_authentication_service/safenet_authentication_service Subscriber_Account_Operator_G uide/ Adding ARR as an Authentication Node in SafeNet Authentication Service Add a RADIUS entry in the SafeNet Authentication Service (SAS) Auth Nodes module to prepare it to receive RADIUS authentication requests from ARR. You will need the IP address of ARR and the shared secret to be used by both SAS and ARR. Log in to the SAS console with an Operator account. 9

Click the COMMS tab and then select Auth Nodes. In the Auth Nodes module, click the Auth Nodes task. NOTE: Before adding SafeNet Authentication Service (SAS) as a RADIUS server in ARR, check its IP address (Primary RADIUS Server IP). The IP address will then be added to ARR as a RADIUS server at a later stage. Under Auth Nodes, click Add. 10

In the Add Auth Nodes section, complete the following fields, and then click Save: Agent Description Host Name Low IP Address In Range High IP Address In Range Configure FreeRADIUS Synchronization Shared Secret Confirm Shared Secret Enter a host description. Enter the name of the host that will authenticate with SAS. Enter the IP address of the host or the lowest IP address in a range of addresses that will authenticate with SAS (in this case, a range of IP addresses is being used). Enter the highest IP address in a range of IP addresses that will authenticate with SAS (in this case, a range of IP addresses is being used). Select this option. Enter the shared secret key. Re-enter the shared secret key. The authentication node is added to the system. Configuring ARR When a request is made to the web application (for example, http://example.com/webmail/default.aspx), ARR forwards these requests to an internal server using the http://example.com:8081 URL. Configuring ARR to use the RADIUS protocol as a secondary authentication method requires: Enabling the Reverse Proxy Functionality, page 12 Creating Rule for the Web Application, page 13 Configuring Rules for Response Rewriting, page 13 11

Enabling the Reverse Proxy Functionality Perform the following steps to enable the Reverse Proxy functionality: On the IIS server machine, open IIS Manager. In the left pane, click the server node name (for example, ARR-COM) and in the middle pane, under IIS, double-click on the Application Request Routing Cache icon. In the right pane, under Proxy, click Server Proxy Settings. In the middle pane, under Use this feature to configure proxy settings for Application Request Routing, select Enable proxy. In the right pane, under Actions, click Apply. 12

Creating Rule for the Web Application If the requested URL path starts with webmail, the rewrite rule forwards the request to the http://localhost:8081/ URL. On the IIS server machine, open the web.config file located at the %SystemDrive%\inetpub\wwwroot\ location. In the web.config file, locate the following line: /configuration/system.webserver After the /configuration/system.webserver line, add the following code: <rewrite> <rules> <rule name="reverse Proxy to webmail" stopprocessing="true"> <match url="^webmail/(.*)" /> <action type="rewrite" url="http://localhost:8081/{r:1}" /> </rule> </rules> </rewrite> Save the file. Configuring Rules for Response Rewriting Perform the following steps to configure rules for Response Rewriting: Go to IIS Manager. In the left pane, expand the server node name (for example, ARR-COM), and then click Sites > Default Web Site. 13

In the middle pane, under IIS, double-click on the URL Rewrite icon. In the right pane, under Actions, click Add Rule(s). On the Add Rule(s) window, under Outbound rules, click Blank rule, and then click OK. 14

On the Edit Outbound Rule window, perform the following steps: a. In the Name field, enter a name for the rule (for example, Add application prefix). b. In the Precondition field, select <Create New Pre-condition...>. On the Add Pre-condition window, perform the following steps: a. In the Name field, enter IsHTML. b. In the Using field, select Regular Expressions. c. Click Add. On the Add Condition window, perform the following steps: a. In the Condition input field, enter the following expression: {RESPONSE_CONTENT_TYPE} b. In the Check if input string field, select Matches the pattern. c. In the Pattern field, enter ^text/html. 15

d. Click OK. On the Add Pre-condition window, click OK. In the middle pane, under Edit Outbound Rule, in the Matching scope field, select Response. 16

In the Match the content within field, select A (href attribute). Scroll down, in the Pattern field, enter the following string: ^/(.*) Click Conditions. 17

Under Conditions, click Add. On the Add condition window, perform the following steps: a. In the Condition input field, enter the following: {URL} b. In the Check if input string field, select Matches the Pattern. c. In the Pattern field, enter the following string: ^/(webmail)/.* d. Click OK. 18

In the middle pane, under Action, perform the following steps: a. In the Action Type field, select Rewrite b. In the Value field, enter the following string: /{C:1}/{R:1} In the right pane, click Apply. Running the Solution For this integration, the etoken PASS token is used as the enrolled OTP token. In a web browser, open a web application URL. For example, http://example.com/webmail/default.aspx On the SafeNet Authentication Service login page, enter your domain\user name and the generated OTP and then click Log On. 19

After successful authentication, you will be able to view the required web page. 20

Support Contacts If you encounter a problem while installing, registering, or operating this product, refer to the documentation. If you cannot resolve the issue, contact your supplier or Gemalto Customer Support. Gemalto Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between Gemalto and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Customer Support Portal The Customer Support Portal, at https://supportportal.gemalto.com, is a where you can find solutions for most common problems. The Customer Support Portal is a comprehensive, fully searchable database of support resources, including software and firmware downloads, release notes listing known problems and workarounds, a knowledge base, FAQs, product documentation, technical notes, and more. You can also use the portal to create and manage support cases. NOTE: You require an account to access the Customer Support Portal. To create a new account, go to the portal and click on the REGISTER link. Telephone Support If you have an urgent problem, or cannot access the Customer Support Portal, you can contact Customer Support by telephone. Calls to Customer Support are handled on a priority basis. Region Telephone number (Subject to change. An up-to-date list is maintained on the Customer Support Portal) Global +1-410-931-7520 Australia 1800.020.183 China North: 10800-713-1971 South: 10800-1301-932 France 0800-912-857 Germany 0800-181-6374 India 000.800.100.4290 Israel 180-931-5798 Italy 800-786-421 Japan 0066 3382 1699 Korea +82 2 3429 1055 21

Region Telephone number (Subject to change. An up-to-date list is maintained on the Customer Support Portal) Netherlands 0800.022.2996 New Zealand 0800.440.359 Portugal 800.863.499 Singapore 800.1302.029 Spain 900.938.717 Sweden 020.791.028 Switzerland 0800.564.849 United Kingdom 0800.056.3158 United States (800) 545-6608 22