Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess

Similar documents
Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Check Point Security Gateway

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

Integration Guide. SafeNet Authentication Manager. Using SafeNet Authentication Manager with Citrix XenApp 6.5

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with CA SiteMinder

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for VMware Horizon 6

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Service. Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS

Integration Guide. SafeNet Authentication Service. SAS using RADIUS Protocol with WatchGuard XTMv. SafeNet Authentication Service: Integration Guide

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft NPS Technical Manual Template

Integration Guide. SafeNet Authentication Client. Using SAC CBA with Juniper Junos Pulse

Integration Guide. SafeNet Authentication Service. NetDocuments

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Integration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

SafeNet Authentication Manager. Integration Guide. Using SAM as an Identity Provider for Dropbox

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS

Integration Guide. SafeNet Authentication Service. Strong Authentication for Citrix Web Interface 4.6

SafeNet Authentication Manager

SafeNet Authentication Service

SafeNet Authentication Service Cisco AnyConnect Agent. Configuration Guide

SafeNet Authentication Service

SafeNet Authentication Manager

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft SharePoint on IIS 7/8. Technical Manual Template

KT-4 Keychain Token Welcome Guide

SafeNet Authentication Client

Welcome Guide. SafeNet Authentication Service. MP-1 BlackBerry. SafeNet Authentication Service: Welcome Guide. MP-1 BlackBerry

Synchronization Agent Configuration Guide

Integration Guide. SafeNet Authentication Service. Protecting Syncplicity with SAS

Synchronization Agent Configuration Guide

MobilePASS for BlackBerry OS 10

SafeNet Authentication Service

Welcome Guide. SafeNet Authentication Service. RB-1 Tokens. SafeNet Authentication Service: Welcome Guide. RB-1 Tokens

SafeNet Authentication Client

SafeNet Authentication Service

SAS Agent for NPS CUSTOMER RELEASE NOTES. Contents

SafeNet Authentication Service

SafeNet Authentication Service

Oracle iplanet Web Server Integration Guide

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Client

SafeNet Authentication Service

SAS Agent for NPS FAQS. Contents. Page 1 of 5. Description... 2 Frequently Asked Questions... 2 Product Documentation... 5 Support Contacts...

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Service

Sentinel Cloud Run-time Java Samples ReadMe

SAS Agent for Microsoft SharePoint

SafeNet Authentication Service

SAS Agent for Microsoft Internet Information Services (IIS)

SafeNet Authentication Service

SafeNet Authentication Manager

Sentinel Cloud V.3.6 Installation Guide

SafeNet Authentication Client

Integration Guide. SafeNet Authentication Service (SAS)

Oracle Access Manager Configuration Guide

Protecting SugarCRM with SafeNet Authentication Manager

SafeNet Authentication Service Agent for Cisco AnyConnect Client. Installation and Configuration Guide

Novell Access Manager

VMware AirWatch Integration with Microsoft ADCS via DCOM

SafeNet Authentication Manager

Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811

20411D D Enayat Meer

SafeNet Authentication Manager

SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet MobilePASS+ for Android. User Guide

DISCLAIMER COPYRIGHT List of Trademarks

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

SAM 8.0 SP2 Deployment at AWS. Version 1.0

etoken Integration Guide etoken and ISA Server 2006

SafeNet Authentication Service. Push OTP Solution Guide

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control

VMware AirWatch Certificate Authentication for EAS with ADCS

SafeNet Authentication Service Token Validator Proxy Agent. Installation and Configuration Guide

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Cloud Access Manager Configuration Guide

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

CounterACT User Directory Plugin

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

SafeNet Authentication Service Agent for Microsoft Outlook Web App. Installation and Configuration Guide

SafeNet Authentication Client

Integrating AirWatch and VMware Identity Manager

Transcription:

SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1

Document Information Document Part Number 007-012843-001, Rev. A Release Date November 2014 Trademarks All intellectual property is protected by copyright. All trademarks and product names used or referred to are the copyright of their respective owners. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, chemical, photocopy, recording, or otherwise, without the prior written permission of SafeNet, Inc. Disclaimer SafeNet makes no representations or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, SafeNet reserves the right to revise this publication and to make changes from time to time in the content hereof without the obligation upon SafeNet to notify any person or organization of any such revisions or changes. We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we discover errors or omissions, or they are brought to our attention, we endeavor to correct them in succeeding releases of the product. SafeNet invites constructive comments on the contents of this document. These comments, together with your personal and/or company details, should be sent to the address or email below. Contact Method Mail Email Contact Information SafeNet, Inc. 4690 Millennium Drive Belcamp, Maryland 21017, USA TechPubs@safenet-inc.com 2

Contents Contents Third-Party Software Acknowledgement... 4 Description... 4 Applicability... 4 Environment... 4 Audience... 5 RADIUS-based Authentication using SAM... 5 RADIUS Authentication Flow using SAM... 5 RADIUS Prerequisites... 6 Configuring SafeNet Authentication Manager... 6 Synchronizing User Stores to SafeNet Authentication Manager... 6 Configuring SAM s Connector for OTP Authentication... 7 Token Assignment in SAM... 7 Adding DirectAccess as a RADIUS Client in IAS/NPS... 8 SAM s OTP Plug-In for Microsoft RADIUS Client Configuration... 10 Configuring DirectAccess... 11 Creating and Deploying a Certificate Template for Signing OTP Certificate Requests... 11 Creating and Deploying a Certificate Template for OTP Certificates Issued by Corporate CA... 18 Configuring OTP for DirectAccess... 27 Confirming DirectAccess Configuration for OTP... 28 Configuring the DirectAccess Client... 28 Running the Solution... 29 Troubleshooting... 31 DirectAccess Not Prompting for OTP Credentials... 31 Support Contacts... 34 3

Third-Party Software Acknowledgement This document is intended to help users of SafeNet products when working with third-party software, such as Microsoft DirectAccess. Material from third-party software is being used solely for the purpose of making instructions clear. Screen images and content obtained from third-party software will be acknowledged as such. Description SafeNet Authentication Manager (SAM) is a versatile authentication solution that allows you to match the authentication method and form factor to your functional, security, and compliance requirements. Use this innovative management service to handle all authentication requests and to manage the token lifecycle. Direct Access is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, Direct Access connections are designed to connect automatically as soon as the computer connects to the Internet. Direct Access was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients. This document describes how to: Deploy multi-factor authentication (MFA) options in Microsoft DirectAccess using SafeNet OTP tokens managed by SafeNet Authentication Manager. Configure Microsoft DirectAccess to work with SafeNet Authentication Manager in RADIUS mode. It is assumed that the Microsoft DirectAccess environment is already configured and working with static passwords prior to implementing multi-factor authentication using SafeNet Authentication Manager and that the SafeNet Authentication Manager OTP plug-in for Microsoft RADIUS Client was installed as part of the simplified installation mode of SAM. For more information on SafeNet Authentication Manager Installation modes, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. Microsoft DirectAccess can be configured to support multi-factor authentication in several modes. The RADIUS protocol will be used for the purpose of working with SafeNet Authentication Manager. Applicability The information in this document applies to: SafeNet Authentication Manager - A server version of SAM that is used to deploy the solution onpremises in the organization. Environment The integration environment that was used in this document is based on the following software versions: SafeNet Authentication Manager 8.2 HF 493 A server version of SAM that is used to deploy the solution on-premises in the organization. Microsoft DirectAccess Windows Server 2012 R2 4

Audience This document is targeted to system administrators who are familiar with Microsoft DirectAccess and are interested in adding multi-factor authentication capabilities using SafeNet Authentication Manager. RADIUS-based Authentication using SAM SafeNet's OTP architecture includes the SafeNet RADIUS server for back-end OTP authentication. This enables integration with any RADIUS-enabled gateway or application. The SafeNet RADIUS server accesses user information in the Active Directory infrastructure via SafeNet Authentication Manager (SAM). SAM's OTP plug-in for Microsoft RADIUS Client works with Microsoft s IAS or NPS, providing strong authenticated remote access through the IAS or NPS RADIUS server. When configured, users who access their network remotely using IAS or NPS are prompted for a tokengenerated OTP passcode for network authentication. For more information on how to install and configure the SafeNet OTP plug-in for Microsoft RADIUS Client, refer to SafeNet Authentication Manager 8.2 Administrator`s Guide. RADIUS Authentication Flow using SAM SafeNet Authentication Manager communicates with a large number of VPN and access-gateway solutions using the RADIUS protocol. The image below describes the dataflow of a multi-factor authentication transaction for Microsoft DirectAccess. 1. A user attempts to log on to Microsoft DirectAccess using an OTP authenticator. 2. Microsoft DirectAccess sends a RADIUS request with the user s credentials to SafeNet Authentication Manager for validation. 3. The SAM authentication reply is sent back to Microsoft DirectAccess. 4. The user is granted or denied access to Microsoft DirectAccess based on the OTP value calculation results from SAM. 5

RADIUS Prerequisites To enable SafeNet Authentication Manager to receive RADIUS requests from Microsoft DirectAccess, ensure the following: End users can authenticate through the Microsoft DirectAccess environment with a static password before configuring Microsoft DirectAccess to use RADIUS authentication. The port 1812 is open to and from Microsoft DirectAccess. A shared secret key has been selected, providing an added layer of security by supplying an indirect reference to a shared secret key. It is used by a mutual agreement between the RADIUS server and the RADIUS client for encryption, decryption, and digital signature purposes. A user DAProbeUser exists in SAM. Direct Access uses this user to check the RADIUS connectivity. NOTE: For RADIUS authentication, DirectAccess should be set up using this guide: http://www.microsoft.com/en-us/download/details.aspx?id=29031 NOTE: RADIUS authentication does not work with DirectAccess set up on a single server. Configuring SafeNet Authentication Manager The deployment of multi-factor authentication using SAM with Microsoft DirectAccess using the RADIUS protocol requires the following: Synchronizing User Stores to SafeNet Authentication Manager page 6 Configuring SAM s Connector for OTP Authentication page 7 Token Assignment in SAM page 7 Adding Microsoft DirectAccess as a RADIUS Client in IAS/NPS page 8 SAM s OTP Plug-In for Microsoft RADIUS Client Configuration page 10 Synchronizing User Stores to SafeNet Authentication Manager SAM manages and maintains OTP token information in its data store, including the token status, the OTP algorithm used to generate the OTP, and the token assignment to users. For user information, SAM can be integrated with an external user store. During the design process, it is important to identify which user store the organization is using, such as Microsoft Active Directory. If the organization is not using an external user store, SAM uses an internal ( stand-alone ) user store created and maintained by the SAM server. SAM 8.2 supports the following external user stores: Microsoft Active Directory 2003, 2008, and 2008 R2 Novell edirectory Microsoft ADAM/AD LDS 6

OpenLDAP Microsoft SQL Server 2005 and 2008 IBM Lotus Domino IBM Tivoli Directory Server Configuring SAM s Connector for OTP Authentication SafeNet Authentication Manager is based on open standards architecture with configurable connectors. This supports integration with a wide range of security applications, including network logon, VPN, web access, onetime password authentication, secure email, and data encryption. If you selected the Simplified OTP-only configuration, SafeNet Authentication Manager is automatically configured with a typical OTP configuration, providing a working SafeNet Authentication Manager OTP solution. The Simplified OTP-only configuration is as follows: Connectors - SAM Connector for OTP Authentication is installed SAM Back-end Service - Activated on this server; scheduled to operate every 24 hours In addition, the SAM default policy is set as follows: OTP support (required for OTP) is selected in the Token Initialization settings. The SAM Connector for OTP Authentication is set, by default, to enable enrollment of OTP tokens without requiring changes in the TPO settings. For more information on how to install and configure the SafeNet Authentication Manager for simplified installation, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. Token Assignment in SAM SAM supports a number of OTP authentication methods that can be used as a second authentication factor for users authenticating through Microsoft DirectAccess. The following tokens are supported: SafeNet etoken PASS SafeNet etoken NG-OTP SafeNet MobilePASS SafeNet MobilePASS Messaging SafeNet etoken 3400 Tokens can be assigned to users as follows: SAM Management Center: Management site used by SAM administrators and help desk for token enrollment and lifecycle management. SAM Self-Service Center: Self-service site used by end users for managing their tokens. SAM Remote Service: Self-service site used by employees not on the organization s premises as a rescue website to manage cases where tokens are lost or passwords are forgotten. For more information on SafeNet s tokens and service portals, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. 7

Adding Microsoft DirectAccess as a RADIUS Client in IAS/NPS For Windows Server 2003, the Windows RADIUS service is Internet Authentication Service (IAS). The IAS is added as the RADIUS server in Microsoft DirectAccess. For Windows Server 2008 and above, the Windows RADIUS service is the Microsoft Network Policy Server (NPS). The NPS server is added as the RADIUS server in Microsoft DirectAccess. Microsoft DirectAccess must be added as a RADIUS client on the IAS/NPS server so that IAS/NPS will authorize Microsoft DirectAccess for authentication. NOTE: It is assumed that IAS/NPS policies are already configured and working with static passwords prior to implementing multi-factor authentication using SafeNet Authentication Manager. The details below refer to NPS, and are very similar to IAS. To add a RADIUS client: 1. Click Start > Administrative Tools > Network Policy Server. 2. From the NPS web console, in the left pane, expand RADIUS Clients and Servers, right-click RADIUS Clients and then click New. 8

3. On the New RADIUS Client window, complete the following fields on the Settings tab: Enable this RADIUS client Friendly name Address (IP or DNS) Manual/Generate Shared secret Confirm shared secret Select this option. Enter a RADIUS client name. Enter the IP address or DNS of Microsoft DirectAccess. Select Manual. Enter the shared secret for the RADIUS client. The value must be the same when configuring the RADIUS server in Microsoft DirectAccess. Re-enter the shared secret to confirm it. 4. Click OK. Microsoft DirectAccess is added as a RADIUS client in NPS. 9

SAM s OTP Plug-In for Microsoft RADIUS Client Configuration RADIUS protocol is used for authentication and authorization. The SafeNet OTP solution supports the Microsoft IAS service (used in Windows 2003) and Microsoft NPS service (used in Windows 2008 and later) as Windows services running a RADIUS server. These services may be extended by adding plug-ins for the authentication process. SAM's OTP plug-in for Microsoft RADIUS Client works with Microsoft s IAS or NPS to provide strong, authenticated remote access through the IAS or NPS RADIUS server. When configured, users who access their network remotely using IAS or NPS are prompted for a token-generated OTP passcode for network authentication. For more information on how to install and configure the SafeNet Authentication Manager OTP plug-in, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. 10

Configuring Microsoft DirectAccess Configuring Microsoft DirectAccess for RADIUS authentication requires the following: Creating and Deploying a Certificate Template for Signing OTP Certificate Requests page 11 Creating and Deploying a Certificate Template for OTP Certificates Issued by Corporate CA page 18 Configuring OTP for DirectAccess page 27 Confirming DirectAccess Configuration for OTP page 28 Configuring the DirectAccess Client page 28 Creating and Deploying a Certificate Template for Signing OTP Certificate Requests You must create and configure a certificate template, which will be used to sign the OTP certificate requests. 1. Log in to the system on which the Certificate Authority server is installed. 2. Start the Windows Command Prompt application, and run the certtmpl.msc application. 3. On the Certificate Templates Console window, right-click the Computer template, and then click Duplicate Template. 11

4. On the Properties of New Template window, on the Compatibility tab, complete the following fields: Certificate Authority Certificate recipient Select an appropriate Certification Authority; for example, Windows Server 2012. On the Resulting changes window, click OK. Select an appropriate Certificate recipient; for example, Windows 8/Windows Server 2012. On the Resulting changes window, click OK. 12

5. On the Properties of New Template window, on the General tab, complete the following fields: Template display name Validity period Renewal period Enter the template name for display; for example, DAOTPRA. Set the validity period to 2 days. Set the renewal period to 1 day. NOTE: If the Certificate Templates warning is displayed, click OK. 13

6. On the Properties of New Template window, on the Security tab, click Add. 7. On the Select Users, Computers, Service Accounts, or Groups window, perform the following steps: a. Click Object Types. b. On the Object Types window, select Computers, and then click OK. c. In the Enter the object names to select field, enter the name of server on which DirectAccess is configured, and then click OK. 14

8. On the Properties of New Template window, on the Security tab, select a group or a user in the Group or user names section and then set permissions for that group or user in the Permissions section, as explained in the table below: DA Authenticated Users Domain Computers Domain Admins Enterprise Admins Set only the Read, Enroll, and Autoenroll permissions. Set only the Read permission. Remove the Enroll permission and keep the other default permissions. Set the Full Control permission. Set the Full Control permission. 15

9. On the Properties of New Template window, on the Subject Name tab, perform the following, and then click Apply: a. Select Build from this Active Directory information. b. In the Subject name format field, select DNS name. c. Under Include this information in alternate subject name, select DNS name. 16

10. On the Properties of New Template window, on the Extensions tab, perform the following steps, and then click OK. a. In the Extensions included in the template list, select Application Policies, and then click Edit. b. On the Edit Application Policies Extension window, remove all the existing application policies, and then click Add. c. On the Add Application Policy window, click New, complete the following fields, and then click OK. Name Enter DAOTPRA. Object identifier Enter 1.3.6.1.4.1.311.81.1.1. d. On the Add Application Policy window, click OK. e. On the Edit Application Policies Extension window, click OK. 17

Creating and Deploying a Certificate Template for OTP Certificates Issued by Corporate CA You must create and configure a certificate template for OTP certificates, which is issued by the corporate Certificate Authority. 1. Log in to the system on which the Certificate Authority server is installed. 2. Start the Windows Command Prompt application, and run the certtmpl.msc application. 3. On the Certificate Templates Console window, right-click the Smartcard Logon template, and then click Duplicate Template. 18

4. On the Properties of New Template window, on the Compatibility tab, complete the following fields. Certificate Authority Certificate recipient Select an appropriate Certification Authority; for example, Windows Server 2012. On the Resulting changes window, click OK. Select an appropriate Certificate recipient; for example, Windows 8/Windows Server 2012. On the Resulting changes window, click OK. 19

5. On the Properties of New Template window, on the General tab, complete the following fields. Template display name Validity period Renewal period Enter the template name for display; for example, DAOTPLogon. Set the validity period to 1 hour. Set the renewal period to 0 hour. For more information on setting the Validity period and Renewal period, see http://technet.microsoft.com/en-us/library/hh831715.aspx. 20

6. On the Properties of New Template window, on the Security tab, select a group or a user in the Group or user names section and then set permissions for that group or user in the Permissions section, as explained in the table below: Authenticated Users Domain Admins Enterprise Admins Set only the Read and Enroll permissions. Set the Full Control permission. Set the Full Control permission. 21

7. On the Properties of New Template window, on the Subject Name tab, perform the following steps, and then click Apply: a. Select Build from this Active Directory information. b. In the Subject name format field, select Fully distinguished name. c. Under Include this information in alternate subject name, select User principal name (UPN). 22

8. On the Properties of New Template window, on the Server tab, perform the following steps, and then click Apply: a. Select Do not store certificates and requests in the CA database. b. Clear Do not include revocation information in issued certificates. 23

9. On the Properties of New Template window, on the Issuance Requirements tab, complete the following fields, and then click Apply: This number of authorized signatures Policy type required in signature Application policy Select this option and then set the value to 1. Select Application policy. Select DAOTPRA. 24

10. On the Properties of New Template window, on the Extensions tab, perform the following steps, and then click OK. a. In the Extensions included in the template list, select Application Policies, and then click Edit. b. On the Edit Application Policies Extension window, delete Client Authentication and keep SmartCardLogon. c. On the Edit Application Policies Extension window, click OK. 11. Close the Certificate Templates Console window. 12. Start the Windows Command Prompt application, and run the certsrv.msc application. 25

13. On the Certificate Authority window, in the left pane, expand Certification Authority, rightclick Certificate Templates, and then click New > Certificate Template to Issue. 14. On the Enable Certificate Templates window, select DAOTPRA and DAOTPLogon, and then click OK. 26

15. On the Certificate Authority window, in the right pane, the DAOTPRA and DAOTPLogon certificate templates are added. 16. Restart the Certification Authority services. 17. Close the Certificate Authority window. 18. Start the Windows Command Prompt application as an administrator, and run the following command: CertUtil.exe SetReg DBFlags +DBFLAGS_ENABLEVOLATILEREQUESTS Configuring OTP for DirectAccess To configure OTP authentication for DirectAccess: 1. Log in to the server on which DirectAccess is installed. 2. Run PowerShell as an administrator, and run the following command: Enable-DAOtpAuthentication RadiusServer <RADIUS server name/ip address> SharedSecret <Shared Secret> -CAServer <Certificate Authority Name> CertificateTemplateName <Certificate template Name> SigningCertificateTemplate <Signing Certificate Template name> Where, RADIUS server name/ip Address is the FQDN of the RADIUS server or its IP address. Shared Secret is the shared password used for communication between the RADIUS server and DirectAccess. Certificate Authority Name is the Certification Authority (CA) servers that issue certificates for OTP authentication. Specify a server in the following format: -- CAServer_Name\CAService_Name Certificate Template Name is the name of the certificate template configured in the section Creating and Deploying a Certificate Template for Signing OTP Certificate Requests on page 18. Signing Certificate Template Name is the name of the certificate template configured in the section: Creating and Deploying a Certificate Template for Signing OTP Certificate Requests on page 11. NOTE: The same steps can be done using the Remote Access Management Console as well. Currently, Windows Server 2012 R2 does not automatically detect CAServer. Thus, the PowerShell command is used to configure OTP for DirectAccess. 27

Confirming DirectAccess Configuration for OTP Verify whether the configurations for OTP on DirectAccess were successfully applied or not. 1. On the DirectAccess server, open Remote Access Management Console. 2. In the left pane, click Operations Status. 3. In the right pane, verify that the status of OTP is Working. Configuring the DirectAccess Client Update the group policies of DirectAccess client to receive the DirectAccess settings. 1. Connect the DirectAccess client to the corporate network. 2. Open PowerShell as an administrator. 3. Type Get-DnsClientNrptPolicy and press ENTER. The Name Resolution Policy Table (NRPT) entries for DirectAccess are displayed. 4. Type Get-NCSIPolicyConfiguration and press ENTER. The network connectivity status indicator settings deployed by the wizard are displayed. 5. Type gpupdate /force and press ENTER. 28

Running the Solution To run the DirectAccess solution with SafeNet Authentication Manager, perform the following steps: 1. Connect the DirectAccess client to the Internet. 2. In the System Notification area, click the network icon. Click the name of the DirectAccess connection and then click Continue. 3. When a message is shown to press Ctrl+Alt+Delete to enter the credentials, do so. 29

4. Click One-time password (OTP). 5. Generate the OTP and enter it in the Enter your OTP credentials field. Click OK. If the credentials are correct, the user will be logged in and will get connected to DirectAccess. 30

Troubleshooting DirectAccess Not Prompting for OTP Credentials Even when DirectAccess is configured for two-factor authentication, the client machine may not ask for the OTP and gets automatically connected to the DirectAccess server. This can happen because the client machine has access to internal resources without OTP authentication. To troubleshoot this problem, perform the following steps: 1. Log in to the machine on which the Domain Name Server is present, and then open DNS Manager. 2. In the left pane, expand Forward Lookup Zones, right-click the Domain name and click New Host (A or AAAA). 31

3. On the New Host window, enter a host name in the Name field (for example, fileshare) and then enter the IP address of NLS server in the IP address field. Click Add Host. 4. Log in to the machine on which DirectAccess is configured and open Remote Access Management Console. 5. On the Remote Access Management Console window, in the left pane, click DirectAccess and VPN. Under Step 1, click Edit. 32

6. In the left pane, click Network Connectivity Assistant. 7. In the right pane, right-click on the empty row, and then click New. 33

8. On the Configure Corporate Resources for NCA window, enter the URL of the new host added (for example, http://fileshare), and then click Validate. If connectivity is successfully validated, click Add. 9. Click Finish. 10. Click Finish again to apply the configuration. Support Contacts If you encounter a problem while installing, registering, or operating this product, please make sure that you have read the documentation. If you cannot resolve the issue, contact your supplier or SafeNet Customer Support. SafeNet Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between SafeNet and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Contact Method Address Contact Information SafeNet, Inc. 4690 Millennium Drive Belcamp, Maryland 21017 USA Phone United States 1-800-545-6608 International 1-410-931-7520 Technical Support Customer Portal https://serviceportal.safenet-inc.com Existing customers with a Technical Support Customer Portal account can log in to manage incidents, get the latest software upgrades, and access the SafeNet Knowledge Base. 34