digipass authentication for microsoft uag

32
DIGIPASS Authentication for Microsoft UAG INTEGRATION GUIDE

Upload: others

Post on 12-Sep-2021

14 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Digipass Authentication for Microsoft UAG

DIGIPASS Authentication for

Microsoft UAG

INTEGRATION GUIDE

Page 2: Digipass Authentication for Microsoft UAG

1 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Disclaimer

Disclaimer of Warranties and Limitation of Liabilities

All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility for its accuracy and/or completeness.

In no event will VASCO Data Security be liable for damages arising directly or indirectly from any use of the information contained in this document.

Copyright Copyright © 2012 VASCO Data Security, Inc, VASCO Data Security International GmbH. All rights reserved. VASCO®, Vacman®, IDENTIKEY ®, aXsGUARD™, DIGIPASS® and ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc. and/or VASCO Data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights in the U.S. and other countries. Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners.

Page 3: Digipass Authentication for Microsoft UAG

2 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Table of Contents  

1  Overview ................................................................................................................ 5 

2  Technical Concepts ................................................................................................. 6 

2.1  Microsoft ............................................................................................................. 6 

2.1.1  Forefront Unified Access Gateway 2010 ............................................................. 6 

2.1.2  Exchange 2010 .............................................................................................. 6 

2.2  VASCO ............................................................................................................... 6 

2.2.1  IDENTIKEY Authentication server .................................................................... 6 

3  Microsoft setup ....................................................................................................... 7 

3.1  Architecture ........................................................................................................ 7 

3.2  Prerequisites ....................................................................................................... 7 

3.3  Microsoft ............................................................................................................. 7 

3.3.1  Microsoft Forefront Unified Access Gateway Management ..................................... 7 

3.4  Test the setup ................................................................................................... 17 

4  Solution ................................................................................................................. 18 

4.1  Architecture ...................................................................................................... 18 

4.2  Microsoft ........................................................................................................... 18 

4.2.1  Microsoft Forefront Unified Access Gateway Management ................................... 18 

4.3  IDENTIKEY Authentication Server ......................................................................... 20 

4.3.1  Policies ....................................................................................................... 21 

4.3.2  Client ......................................................................................................... 22 

4.3.3  User ........................................................................................................... 22 

4.3.4  DIGIPASS ................................................................................................... 23 

4.4  Test the Solution ................................................................................................ 25 

5  Challenge/Response .............................................................................................. 26 

5.1  Architecture ...................................................................................................... 26 

5.2  IDENTIKEY Authentication Server ......................................................................... 27 

Page 4: Digipass Authentication for Microsoft UAG

3 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

5.2.1  Policy ......................................................................................................... 27 

5.2.2  User ........................................................................................................... 27 

5.3  Test the Solution ................................................................................................ 29 

6  FAQ ....................................................................................................................... 31 

7  Appendix ............................................................................................................... 31 

Page 5: Digipass Authentication for Microsoft UAG

4 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Reference guide

ID Title Author Publisher Date ISBN

Page 6: Digipass Authentication for Microsoft UAG

5 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

1 Overview This whitepaper describes how to configure a Microsoft forefront Unified Access Gateway in combination with the VASCO IDENTIKEY Authentication Server. That way an extra security layer can be added to the gateway solution.

Page 7: Digipass Authentication for Microsoft UAG

6 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

2 Technical Concepts 2.1 Microsoft 2.1.1 Forefront Unified Access Gateway 2010 Forefront Unified Access Gateway 2010 (UAG) delivers comprehensive, secure remote access to corporate resources for employees, partners, and vendors on both managed and unmanaged PCs and mobile devices. Utilizing a combination of connectivity options, ranging from SSL VPN to Direct Access, as well as built in configurations and policies, Forefront UAG provides centralized and easy management of your organization's complete anywhere access offering.

2.1.2 Exchange 2010 Exchange 2010 server is the Simple Mail Transfer Protocol (SMTP) server created by Microsoft.

2.2 VASCO 2.2.1 IDENTIKEY Authentication server IDENTIKEY Authentication Server is an off-the-shelf centralized authentication server that supports the deployment, use and administration of DIGIPASS strong user authentication. It offers complete functionality and management features without the need for significant budgetary or personnel investments.

IDENTIKEY Authentication Server is supported on 32bit systems as well as on 64bit systems.

IDENTIKEY Appliance is a standalone authentication appliance that secures remote access to corporate networks and web-based applications.

The use and configuration of an IDENTIKEY Authentication Server and an IDENTIKEY Appliance is similar.

Page 8: Digipass Authentication for Microsoft UAG

7 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

3 Microsoft setup Before adding 2 factor authentication it is important to validate a standard configuration without One Time Password (OTP).

3.1 Architecture

3.2 Prerequisites Basic installation and configuration of Microsoft UAG Accessible Outlook Web Access (OWA).

Authentication method for the OWA has to be Integrated Windows authentication

3.3 Microsoft 3.3.1 Microsoft Forefront Unified Access Gateway Management Click HTTPS Connections

Select Click here to create an HTTPS trunk

Page 9: Digipass Authentication for Microsoft UAG

8 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Next >

Select Portal trunk

Click Next >

Page 10: Digipass Authentication for Microsoft UAG

9 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Trunk name: uag Public host name: uag IP address: 10.4.0.223 HTTP port: 80 HTTPS port: 443

Click Next >

You need to select an authentication server

Click Add…

At this moment there is no authentication server configured yet

Click Add…

Server Type: Active Directory

Page 11: Digipass Authentication for Microsoft UAG

10 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Server name: AD Select Use local Active Directory forest authentication Base DN: CN=Users,DC=labs,DC=Vasco,DC=com Level of nested groups: 0 User: LABS\administrator Password: password of LABS\administrator

Click OK

Select AD

Click Select

Select User select from a server list Check Show server names

Click Next >

Page 12: Digipass Authentication for Microsoft UAG

11 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Select Server Certificate

Click Next >

Select Use Forefront UAG access policies

Click Next >

Page 13: Digipass Authentication for Microsoft UAG

12 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Next >

Click Finish

Under the Applications window perform next actions

Click Add…

Click Next >

Page 14: Digipass Authentication for Microsoft UAG

13 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Select Web Select Microsoft Exchange Server (all versions)

Click Next >

Select Microsoft Exchange Server 2010 Check Outlook Web Access

Click Next >

Application name: owa

Page 15: Digipass Authentication for Microsoft UAG

14 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Next >

Click Next >

Select Configure an application server

Click Next >

Select IP/Host Address: mail.labs.vasco.com Public host name: uag

Page 16: Digipass Authentication for Microsoft UAG

15 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Next >

You need to select an authentication server

Click Add…

Select AD

Click Select

Click Close

Check use SSO

Click Next >

Check Add portal and toolbar link Portal name: owa Application URL: https://uag.labs.vasco.com/owa/ Icon URL: images/Application/OWA2010.gif Uncheck Open in new window

Click Next >

Page 17: Digipass Authentication for Microsoft UAG

16 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Check Authorize all users

Click Next >

Click Finish

Click

Click

Click Activate

Click Finish

Page 18: Digipass Authentication for Microsoft UAG

17 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

3.4 Test the setup The test we are performing is a log on to the created UAG website, using Active Directory username and password. When logged on to the site OWA will be accessed.

Browse to the URL: https://uag.labs.vasco.com

User name: Demo AD Password: Test12345

Click Log On

Click Owa

Page 19: Digipass Authentication for Microsoft UAG

18 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

4 Solution 4.1 Architecture

4.2 Microsoft 4.2.1 Microsoft Forefront Unified Access Gateway Management Select the UAG site

Click Configure

Page 20: Digipass Authentication for Microsoft UAG

19 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Select Authentication

A second authentication, for the two factor authentication, must be selected.

Click Add…

To use the Identikey server, a RADIUS serves has to be added.

Click Add…

Server Type: Radius Server Name: Identikey Ip address/host: 10.4.0.13 Port: 1812 Secret Key: Test12345

Secret Key = Shared Secret

Click OK

Select Identikey

Page 21: Digipass Authentication for Microsoft UAG

20 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Select

Click Close

Select Users authenticate to each server Check Authenticate to each server with the same user name

Click OK

Click

Click

Click Activate

Click Finish

4.3 IDENTIKEY Authentication Server There are lots of possibilities when using IDENTIKEY Authentication Server. We can authenticate with:

Local users (Defined in IDENTIKEY Authentication Server) Active Directory (Windows)

In this whitepaper we will use Local users to authenticate.

Page 22: Digipass Authentication for Microsoft UAG

21 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

4.3.1 Policies In the Policy the behavior of the authentication is defined. It gives all the answers on: I have got a user and a password, what now?

Create a new Policy

Policy ID : Test Inherits From: Base Policy

Inherits means: The new policy will have the same behavior as the policy from which he inherits, except when otherwise specified in the new policy.

Example:

  Base Policy 

New Policy  Behaviour 

1  a     New policy will do a 

2  b     New policy will do b 

3  c  f  New policy will do f 

4  d     New policy will do d 

5  e  g  New policy will do g 

The new policy is created, now we are going to edit it.

Click edit

Page 23: Digipass Authentication for Microsoft UAG

22 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Local Authentication : Digipass/Password Click Save

4.3.2 Client In the clients we specify the location from which IDENTIKEY Authentication Server will accept requests and which protocol they use.

We are going to add a new RADIUS client.

Client Type : select Radius Client from “select from list” Location : 10.4.0.223 Policy ID : Select the Policy that was created in Policies Protocol ID: RADIUS Shared Secret: Test12345 Confirm Shared Secret: reenter the shared secret Click Save

4.3.3 User We are going to create a user.

Page 24: Digipass Authentication for Microsoft UAG

23 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

User ID: Demo

4.3.4 DIGIPASS The purpose of using IDENTIKEY Authenticaction Server, is to be able to log in using One Time Passwords (OTP). To make it possible to use OTP we need to assign a DIGIPASS to the user. The Digipass is a device that generates the OTP’s.

Open the user by clicking on its name Select Assigned Digipass

Click ASSIGN

Click Next

Grace period: 0 Days

Grace period is the period that a user can log in with his static password. The first time the user uses his DIGIPASS the grace period will expire.

Click ASSIGN

Page 25: Digipass Authentication for Microsoft UAG

24 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Click Finish

Page 26: Digipass Authentication for Microsoft UAG

25 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

4.4 Test the Solution A logon will be performed using the Active Directory credentials in combination with an OTP provided by a VASCO DIGIPASS. When logged on to the site OWA will be accessed.

Browse to the URL: https://uag.labs.vasco.com

User name: Demo AD Password: Test12345 Identikey Password: One Time Password (OTP) generated by digipass

Click Log On

Click Owa

Page 27: Digipass Authentication for Microsoft UAG

26 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

5 Challenge/Response The easiest way to test challenge/response is to use (Back-Up) Virtual DIGIPASS. Virtual DIGIPASS is a solution where an OTP is sent to your E-mail account or mobile phone, after it was triggered in a user authentication. The trigger mechanism is configured in the policy (see later).

Virtual DIGIPASS is a DIGIPASS that needs to be ordered like a Hardware

DIGIPASS Back-Up Virtual DIGIPASS is a feature that must be enabled while ordering other

DIGIPASS (Hardware, DIGIPASS for Mobile, DIGIPASS for Web or DIGIPASS for Windows)

Availability of Back-Up virtual DIGIPASS can be checked in the IDENTIKEY web administration. Select a DIGIPASS > Click on the first application and scroll down.

For test purposes a demo DPX file (named Demo_VDP.DPX) with Virtual Digipass is delivered with every IDENTIKEY Authentication Server

5.1 Architecture

This solution makes use of an SMS-gateway (for SMS or text messages) or SMTP-server (for mail). The first step is to configure one of the servers. This is done in the Message Delivery Component (MDC) configuration. For more information see the IDENTIKEY Authentication Server manuals. Popular SMS-gateways: http://www.clickatell.com

Page 28: Digipass Authentication for Microsoft UAG

27 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

http://www.cm.nl http://www.callfactory.com

5.2 IDENTIKEY Authentication Server 5.2.1 Policy The configuration virtual Digipass can be used is done in the policy. Select the policy created in Policies. This should be Test. Select Test Go to Virtual Digipass Click Edit

Delivery Method: SMS BVDP Mode: Yes – Permitted Request Method: KeywordOnly Request Keyword: IwantOTP

Click Save

The request method is the trigger to send the message. The trigger can be:

Static password: as stored inside IDENTIKEY Authentication Server (different for each individual user)

Keyword: a text message (the same for all users)

5.2.2 User IDENTIKEY Authentication Server needs to know, where to send the mail or SMS. Therefor the User should be added.

Select a user: Demo

Click User Info

Click Edit

Page 29: Digipass Authentication for Microsoft UAG

28 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Mobile: +32… (for the sms) Email Address: [email protected] (for mail)

Click save

Page 30: Digipass Authentication for Microsoft UAG

29 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

5.3 Test the Solution This test consists of triggering a text message or a mail by logging in with Active Directory credential in combination with a Keyword (IwantOTP). In a second step the OTP received in Text message or mail is inserted into the system.

Browse to the URL: https://uag.labs.vasco.com

User name: Demo AD Password: Test12345 Identikey Password: IwantOTP

Click Log On

Enter one Time Password: One Time Password (OTP) received by mail or text message to your mobile

Click Log On

Click Owa

Page 31: Digipass Authentication for Microsoft UAG

30 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

Page 32: Digipass Authentication for Microsoft UAG

31 DIGIPASS Authentication for Microsoft UAG

DIGIPASS Authentication for Microsoft UAG

6 FAQ 7 Appendix