AAA & Captive Portal Cloud Service TM and Virtual Appliance

Size: px
Start display at page:

Download "AAA & Captive Portal Cloud Service TM and Virtual Appliance"

Transcription

1 AAA & Captive Portal Cloud Service TM and Virtual Appliance Administrator Manual Revision 28 August, 2013 Copyright, Cloudessa, Inc. All rights reserved

2 To receive technical assistance with your Cloudessa deployment, please visit the support section of our website cloudessa.com, or contact us via at 2

3 Table of Contents Cloudessa Quick Intro... 6 Why choose Cloudessa?... 7 Key Features... 8 Authentication Options WPA 2 / 802.1X or Captive Portal The Role of RADIUS and AAA User Credential Stores RADIUS and 802.1X Authentication Protocols RADIUS attributes Captive Portal Authentication Configuring Cloudessa Server Creating and managing your Virtual RADIUS Server Create Server - Wizard Create Server - GUI RADIUS Server: General Info Tab RADIUS Server: Debug Tab RADIUS Server: User Groups Tab RADIUS Server: Device Groups Tab RADIUS Server: Ext User Groups Tab RADIUS Server: Source IPs Tab RADIUS Server: Guest Users Tab RADIUS Server: Access Card Sheets RADIUS Server: Attributes Tab CREATING AND MANAGING USERS AND GROUPS Creating and Managing Local Non-Admin Users Uploading Bulk User Information User: Manage User Tab User: Google Auth Tab User: Groups Tab User: Attributes Tab User: Advanced Tab User Groups Overview Creating and Managing Local User Groups User Group: Manage Group Tab User Group: VLAN Tab User Group: Users Tab User Group: IP Pool Tab User Group: Attributes Tab

4 Creating and Managing External User Groups Ext User Group: Manage Group Tab Ext User Group: VLAN Tab Ext User Group: Users Tab Ext User Group: IP Pool Tab Ext User Group: Attributes Tab Viewing External Users Creating and Managing Devices and Device Groups Creating and Managing Devices Creating and Managing Device Groups Creating and Managing External Device Groups Using IP Address Pools Adding Vendor-Specific Attributes Logging and Accounting Authentication Logs Active Sessions Accounting Logs RADIUS Trace Logs Guest User Access Guest User Access Card Sheets Cloudessa Administrator Options Creating Admins and User Managers Admin Logs Upgrading Cloudessa Subscription The Cloudessa Virtual Appliance GOOGLE APPS AUTHENTICATION EAP-TTLS Option EAP-TLS Option Captive Portal Option Two-Factor Authentication Using Google Authenticator Downloading Google Authenticator for Smartphones About Quick Response (QR) Codes Cloudessa Web Services API Creating and Managing Captive Portals Creating a Captive Portal Captive Portal: General Info Tab Captive Portal: Splash Page Tab Captive Portal: Success Page Tab Captive Portal: Authentication Providers Google+ \ Google Apps Configuration Google+ \ Google Apps - Advanced Configuration

5 Facebook Configuration: Twitter Configuration Twitter - Advanced Configuration LinkedIn Configuration LinkedIn - Advanced Configuration Login with PayPal Configuration Login with Paypal - Advanced Configuration PayPal Express Checkout Self Registration Captive Portal: Placeholders Displaying video ads on Captive Portal: Configuring your Devices for Cloud Captive Portal services Configuring Meraki Ruckus Configuration

6 Cloudessa "AAA & Captive Portal Cloud Service" Quick Intro Welcome to the Cloudessa cloud based Authentication, Authorization, and Accounting (AAA) and Captive Portal solution platform. Cloudessa supports building complex WiFi Captive Portals for hotspots such as retail, hospitality and guest access, as well authenticating enterprise users using 802.1X and RADIUS based protocols. It supports a variety of backend authentication sources, such as Google Apps, Active Directory, SAML providers, and social network sign-ins, including Facebook and Twitter, and Payment Processors such as PayPal. Cloudessa is a 100% cloud service compatible with enterprise WiFi AP's and Controllers from leading network hardware vendors. Cloudessa is available either as a public cloud Service, or as a Virtual Appliance for installation in an enterprise or private data center, so you can deploy Cloudessa in the way that is appropriate for your business.. Use the hosted Cloudessa Service in the public cloud, where you can take advantage of a shared multi-tenant infrastructure. Deploy Cloudessa as a Virtual Appliance, running in a private cloud or enterprise data center if you need to maintain service completely on-site and control service availability. Cloudessa VA runs on major private cloud platforms such as VMWare and Xen. Note: The first release of the Captive Portal functionality will only be available as a Cloud Service. If you have other requirements, please contact sales@cloudessa.com. This guide covers: Overview and Key Features Using Cloudessa AAA & Captive Portal Cloud Service Installation and use of the Cloudessa Virtual Appliance in your private data center. The hosted Service and the Virtual Appliance include identical features, functionality, and administrative interfaces. The only difference is, one is a licensed cloud service, the other must be executed as a Virtual Machine in your data center. 6

7 Why choose Cloudessa? Driven by mobile workers and BYOD, the scale, complexity, and importance of enterprise WiFi and VPN networks is increasing dramatically. A well-architected, multifaceted access security infrastructure is an essential element of every enterprise WiFi, VPN, and other remote access gateway deployment. This infrastructure typically must support the following functions: Authentication, to ensure that only authorized users gain access to the network Authorization, to configure the appropriate level of network resource access for a particular user or device for a particular session. Accounting, to document who access the network, when. Security, to prevent attacks on user credentials and data In addition, these new WiFi requirements should ideally reuse existing user stores and integrate into the network s existing access management systems and architecture for securing VPN s and other access gateways to ensure a consistent level of security regardless of how users are accessing your network. WiFi hotspots provide unique set of business growth opportunities to engage consumers and guests of your business. A strong Captive Portal solution integrated into your business logic provides an opportunity to win new customers and keep new customers happy. Cloudessa is the first cloud solution that enables you to both: Provide strong network access security for the employees and contractors of your business Grow your business by engaging your customers with advanced hotspot and captive portal solutions integrated with your business logic 7

8 Cloudessa enables you to achieve these goals while keeping the security of your network intact. Cloudessa supports the industry standard means of using separate WiFi SSIDs or network VLANs to separate your internal business network from customer engagement and hotspot network. Key Features The following are key features of Cloudessa discussed throughout this manual Multiple Virtual RADIUS/802.1X servers, each running on a separate authentication and accounting port. You can create a Virtual RADIUS server with a single click of a mouse. Multiple Captive Portals, each running on a separate URLs. You can create a Virtual RADIUS server with a single click of a mouse. Captive Portal support based on industry standard UAM as well as Meraki EXCAP protocol and are compatible with major enterprise WiFi hardware such as Cisco, Meraki, Ruckus, Aruba, Motorola and others. For RADIUS/802.1X, a comprehensive variety of protocols are supported including PAP, CHAP, MS-CHAP, SIP, PEAP, EAP-TTLS, EAP-TLS and MACbased authentication For Captive Portals, SAML authentication is supported, including such vendors as Ping Identity, Okta, OneLogin and Microsoft ADFS For Captive Portals, social network OAuth logins are supported, including Facebook, Twitter, and LinkedIn, as well as PayPal login for payment integration Accounting and Billing. Cloudessa includes build-in integration with PayPal, as well as a capability to add custom modules to integrate with other Payment Processors. Accounting Logs of user and admin actions Two-factor authentication using Google Authenticator Authentication against External user stores, including Active Directory, LDAP, SQL Databases, Google Apps, as well as customer-provided Web Service APIs JSON-based Web Services API Powerful Captive Portal building tools and widgets Three methods to use Google Apps for authentication: Captive Portal, PAP/EAP-TTLS and EAP-TLS with digital certificates. The following figure illustrates how a multi-location enterprise can leverage the Cloudessa RADIUS functionality service in the public cloud to authenticate and authorize WiFi users and devices. 8

9 Figure 1: Example Deployment - Cloudessa RADIUS / AAA Cloud Service 9

10 Figure 2: Example Deployment - Cloudessa AAA & Captive Portal Cloud Service 10

11 Authentication Options When assessing your WiFi and VPN network security requirements, it is important to examine what is the right level of security for your deployment, and how do you want to enforce the access security. Cloudessa RADIUS provides the flexibility to deploy both WPA2 / 802.1X compliant or Captive Portal browser based access security. Best practice for WiFi and VPN access to enterprise LAN applications mandates the use of WiFi Protected Access 2 Enterprise (WPA2) and 802.1X-based security; in addition, WPA2 and 802.1X are considered essential for securing WiFi access in healthcare (HIPAA), financial services (SOX), and other regulated environments. If the primary use of the WiFi network is to access cloud or external resources, (for instance in a hotspot or for student / customer / guest internet access) or if a users session will be protected via a VPN tunnel, and there is little risk of sensitive data being compromised, then a browser based login via a Captive Portal is a viable option. WPA 2 / 802.1X or Captive Portal With WPA 2 / 802.1X, authentication happens before a user is granted an IP address and allowed on the network, this protects against attacks at upper layers by denying access before a rogue user ever gets on the network. WiFi networks requiring a high level of access security and most VPN networks use WPA 2 / 802.1X based access security. WPA 2 /802.1X works at Layer 2, the data link layer. In this case, the wireless client is authenticated, the encryption key is derived and the Layer 2 wireless connection between the client and the access point is encrypted. WPA2 supports Extensible Authentication Protocol (EAP) based authentication to prevent access until user authentication is completed The 802.1X protocol applies to wired and wireless networks. In a wireless network, the 802.1X authentication occurs after the client (end user) has associated to an access point using an association method. Wired networks use 802.1X by connecting to a port on an 802.1X enabled switch. Captive Portal provides a browser-based mechanism for user to login to the network. With Captive Portal, unauthenticated users attempting to access the 11

12 network are redirected to a Captive Portal web page. Users access to network resources is restricted until they are authenticated via a browser-based login. Captive Portal is an application-level authentication used primarily with WiFi for hotspot and visitor / guest access networks. With Captive Portal, the user does obtain an IP address on the network prior to authentication; however, their network usage is restricted until they are authenticated via a browser based login. Captive Portal authenticates users at Layer 3, the network layer. In this case the encryption is typically done at the level of the browser using the HTTPS protocol. Captive Portal authentication is often used in conjunction with a layer 3 VPN, such as an IPSec or SSL VPN, that is used to encrypt the entire layer 3 traffic. The decision to use WPA 2 / 802.1X or Captive Portal based access security depends on your access network infrastructure and security risk profile. Organizations who's employees will be using the WLAN or VPN to access corporate applications and resources and cannot risk their network or data being compromised should consider the more secure WPA 2 / 802.1X Layer 2 security approach. If the primary use of the WiFi network is to access cloud or external resources, for instance in a hotspot or for customer / guest access, then Captive Portal Layer 3 security is an appropriate option. The Role of RADIUS and AAA Regardless of which method you choose for enforcing access security on your WiFi AP s, VPN s, or other access gateways, authenticating users to a network through client based WPA2 / 802.1X or browser based Captive Portal, Cloudessa RADIUS server provides advanced capabilities for both. The RADIUS server orchestrates and manages the interaction between a number of different network elements that need to work collaboratively to manage and secure WiFi Access Point s and Controllers (AP s), VPN s, and other access gateways. A centralized RADIUS server receives authentication requests from the WiFi AP s, controllers, VPN servers, or other access gateway. User credentials are then processed against a designated user store, typically Active Directory (AD), or an LDAP or SQL database. If a cloud user store such as Google Apps TM, SAML or social network is used, Cloudessa RADIUS will create and delete the corresponding RADIUS credentials on the fly Authentication is accepted or rejected based on the validity of the provided 12

13 user account credentials. When returning the access accept / reject message to the gateway, the RADIUS server also returns the parameters for the user authorization to network resources. The Authorizations are returned via standard and vendor specific RADIUS attributes, for each user and session, based on which group or groups the user is an authenticated member of (based on the users group assignments in AD, Google Apps or other user store) The role of the RADIUS server is essential. Not only does it authenticates the user, but it also communicates back to the gateway WiFi AP or VPN (via RADIUS attributes), the parameters for how that gateway should be configured for that particular user, for that particular session, based on what network group (as defined in AD or Google Apps or other user store) that the user is a member of. Such parameters can include assigning users to particular VLAN's, setting bandwidth allocation, and dynamically configuring any other configurable policy element of your access gateway. RADIUS accounting logs are generated and stored to detail describing the user and the device accessing the network. RADIUS accounting logs can be important for documenting who was on the network, when; and for proving accountability and security compliance within regulated environments such as healthcare, financial services and public access networks. WiFi access security is dependent on the interoperability between a number of different network components: User Device, typically a laptop or smart device running "client" or "supplicant" software or a browser; WiFi AP, WiFi Controller, VPN, Firewall or other Access Gateway - The Access Gateway is the access security enforcement point and is the "Authenticator" or "RADIUS Client" that initiates and sends the RADIUS authentication request to the RADIUS server; RADIUS Server IETF Standards based server that handles the authentication, authorization, and accounting for user access; User Store Active Directory, LDAP or SQL database, Google Apps, or other user store where user credentials and user group assignments are stored. All of these network components must be configured and interoperable to enforce access security. 13

14 User Credential Stores The following user stores and authentication sources are supported: Active Directory, LDAP, SQL databases, Google Apps SAML authentication, for instance Ping Identity, OneLogin, Okta and ADFS Social network OAuth-based logins, such as Facebook, Twitter LinkedIn, PayPal. Cloudessa internal native user store Customer-owned webservices APIs. Examples include hospitality, recreation, health-care and co-working spaces. In this case Cloudessa will call the external webservices API during authentication RADIUS and 802.1X Authentication Protocols Cloudessa supports a comprehensive set of RADIUS and 802.1X authentication protocols. All of these protocols include a shared secret between the RADIUS client and the RADIUS server. Typically RADIUS clients are WiFi Access Points or Controllers, VPN's or firewall devices. Older, non-802.1x compliant protocols include: Password Authentication Protocol (PAP) - The user enters a username and a password. The password is encrypted using the RADIUS shared secret and then the username and the encrypted password are sent to the RADIUS server, the server verifies them against a user store. The password may be stored in the user store in plaintext or as a hashed value. If the verification is successful, Accept message is sent back to the RADIUS client. PAP is one of the oldest and mostly widely used protocols in wired networking. It is also used in wireless networks for Captive Portal authentication using web forms, and for the EAP-TTLS/PAP protocol suite. Challenge Handshake Authentication Protocol (CHAP) - is more secure than PAP. With CHAP, the server sends a random challenge string to the client, along with the hostname. The client uses the hostname to determine the appropriate secret, combines it with the challenge and returns the information to the server. The server acknowledges the client, and permits access if the correct result is received. In such a way the password is never communicated over the network, improving security over PAP. MS-CHAP v1 and v2 is a Microsoft version of CHAP. MS-CHAP is an option in the Microsoft implementation of Point to Point Tunneling Protocol (PPTP). 14

15 MAC Authentication Bypass important protocol which uses the MAC address of a device as the username and the password. Although this protocol is not particularly secure it is widely used for low security environments, such as guest access. Typically this protocol is emplemented by wired Layer 2 switches and Layer 2/3 gateways. Digest is a widely used username/password protocol for Voice-over-IP systems. MSISDN is a RADIUS protocol variation where Mobile Subscriber Integrated Services Digital Network-Number (MSISDN) is used as the authentication credential. This protocol is used by telecom RADIUS servers. Newer, 802.1X compliant protocols are described below. For 802.1X the user client (supplicant), typically installed on a laptop or wireless device, authenticates to the RADIUS server through the Authenticator, such as Access Point or wired Ethernet switch. The Authenticator plays the role of the relaying party helping the Supplicant and the RADIUS server exchange messages. Once the authentication is complete, the RADIUS server sends Accept message to the Authenticator, and the user is permitted to use the network X protocols typically include a combination of a secure tunnel, and then the inner authentication protocol which is used over the secure tunnel once the secure connection is established. The secure tunnels include Microsoft PEAP, TTLS and TLS. PAP, CHAP or MS-CHAP are typically used as inner authentication protocols. PEAPv0 / MS-CHAPv2 this protocol is the most widely supported Wi-Fi authentication protocol, it used Microsoft PEAP as secure tunnel and MS-CHAPv2 as the inner authentication protocol. It is supported by Microsoft, Apple, Android and Blackberry devices. The limitation of this protocol is that the password needs to be stored on the server side in plaintext and cannot be hashed. Another limitation is that this protocol does not work with external web services, such as Google Apps, which typically can verify the password, but will not give out the password. EAP-TTLS/ PAP this protocol is uses Microsoft TTLS as secure tunnel and PAP as the inner authentication protocol. The password can be stored in hashed form, one can also use this protocol to authenticate against external web services. This protocol is supported natively on Android, Linux and Windows 8. On Apple devices, it is switched off by default and needs to be enabled. On older versions of Windows third party software such as SecureW2 needs to be installed to enable the protocol. A typical price of this third party software is $20-$50 per laptop. EAP-TTLS/ MSCHAPv2 not frequently used combination of TTLS and MSCHAPv2 Cisco LEAP Cisco proprietary protocol. Used in older Cisco hardware. 15

16 EAP-MD5 Older protocol, not frequently used. RADIUS attributes One of the main reasons for the ubiquitous use of RADIUS in access networks is the flexibility of the RADIUS attributes to enable the application of a consistent set of access security policies across different types of access gateways, from different vendors. Standard RADIUS Attributes define how an access gateway is configured for a particular users session. RADIUS attributes carry specific authentication and authorization details. For example, to initiate a user session, the access gateway sends Access-Request packets to a RADIUS server. The initial packet contains several attributes that identify the user, such as username, password and other identifiers. If the authentication is successful, the server responds with the Access-Accept packet that contains attributes that define the user session, such as VLAN and bandwidth limits. RADIUS is extensible. In addition to the standard RADIUS attributes, networking vendors incorporate specific RADIUS attributes to add new capabilities for communication with the RADIUS server. These attributes are contained in a RADIUS dictionary file. Vendor-specific dictionary files contain a definition of RADIUS attributes that are used by each vendor. With Cloudessa RADIUS, you can select the level where access is authorized: you can define attributes at the individual user level, at the group level, or at the Virtual RADIUS server level. Cloudessa frequently updates the vendor-specific RADIUS dictionary options to ensure that the latest files are available. Captive Portal Authentication Cloudessa includes a powerful set of tools to build Captive Portals. These Captive Portals are web-based and hosted by Cloudessa. Cloudessa utilizes the UAM (Unified Access Method) standard and the Meraki EXCAP protocol to integrate with a wide 16

17 variety of WiFi hardware, including Cisco, Meraki, Ruckus, Motorola, Aruba and others. Cloudessa Captive Portal can include a number of authentication options, in particular: Social network login using Facebook, Twitter, and LinkedIn. Google Apps authentication Self-registration Login with PayPal and the corresponding billing/payment capabilities SAML-based authentication utilizing Secure Assertion Markup Language. Examples of supported SAML providers are Ping Identity, Okta, Microsoft ADFS, and OneLogin. 17

18 Configuring the Cloudessa Server As the administrator, starting with the Dashboard, you will need to step through the various configurable elements of Cloudessa.. DASHBOARD - This is your starting point. A wizard will help you create a RADIUS server instance. USERS & GROUPS Define internal users, groups, as well as external users and external user groups, based on external user stores such as Active Directory and Google Apps. GUESTS Define guest users and create printable sheets of access cards. RADIUS Configure your virtual RADIUS severs. CLOUD CAPTIVE PORTALS Create WiFi Captive Portals. DEVICES & GROUPS Create devices and groups of devices that will be allowed to access the network. LOGS View various logs, such as authentication, active sessions, accounting and RADIUS trace logs. ACCOUNT Create account administrators and user managers, view admin logs and set your account information and modify your service subscription options. Creating and managing your Virtual RADIUS Server As administrator, the first thing you need to do is create a virtual RADIUS server, which will be your domain specific RADIUS instance on the Cloudessa Cloud Platform. Within each Cloudessa RADIUS instance, administrators can create multiple virtual RADIUS servers. Each virtual RADIUS server can be configured to meet the needs of a specific functional or organizational unit. 18

19 After you create a server, you need to configure the server. Create Server - Wizard After you reach the Cloudessa Getting Started page, launch the Wizard to begin setting up your RADIUS Server, or select RADIUS > Virtual RADIUS Servers. The Wizard allows you to configure a basic RADIUS server instance for testing purposes, and to familiarize yourself with the layout and flow of Cloudessa RADIUS configuration options. To use the Wizard, click Launch Wizard and follow the steps to set up your domain specific RADIUS sever on the Cloudessa Cloud Platform. Enter your RADIUS server name and Shared Secret, and select an authentication protocol. Enter the Shared Secret - this is required for communication with your NAS. The Shared Secret on the RADIUS server must be added in your Network Access Server (NAS) or network Layer 2 switch configuration to allow the devices to communicate. Select the authentication protocols that you want to use. Create Server - GUI To create your Virtual RADIUS server through the GUI: Go to RADIUS > Virtual RADIUS Servers in the Cloudessa Admin UI Click Create RADIUS Server. Select a Name for your RADIUS server. Click Generate Secret to generate a new shared secret, or you can choose to use the default. The Shared Secret serves as a password between the RADIUS server and RADIUS clients. (for example, your Layer X switch or NAS). 19

20 Select a RADIUS server authentication protocol. An authentication protocol defines how devices connect to the virtual RADIUS server. PAP (Password Authentication Protocol) CHAP (Challenge Handshake Authentication Protocol) MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) PEAPv0 / MS-CHAPv2 (Protected Extensible Authentication Protocol) EAP-TTLS / PAP (Extensible Authentication Protocol - Tunneled Transport Layer Protocol) Under Advanced config, you can select additional authentication protocols: MSISDN Digest MAC Authentication Bypass Cisco LEAP EAP-MD5 Note: To use Cloudessa RADIUS with an Active Directory server or LDAP, you must select PAP or EAP-TTLS under Advanced Config. With EAP-TTLS, choose PAP as the TTLS inner protocol. To use Google Authenticator, you must use EAP-TTLS and PAP. In addition to the shared secret that you created, your RADIUS-enabled device or NAS must be configured with the RADIUS authentication port and the RADIUS accounting port. Note: As a service, Cloudessa RADIUS uses non-standard RADIUS port numbers. To see the port numbers for your RADIUS server, access the server under the main Virtual RADIUS Servers tab. The RADIUS server IP address is also displayed on this page. You must configure your WiFi AP or other Access Gateway with the IP address for the Cloudessa Server, and the assigned port number for the Cloudessa RADIUS Service for RADIUS Authentication and RADIUS Accounting. RADIUS Server: General Info Tab Use General Info tab to: View IP addresses of the primary and secondary RADIUS servers, as well as RADIUS authentication and accounting port numbers 20

21 Modify server name Disable IP filtering for this server this will allow NAS servers with any IP address to connect. Good for debugging and initial configuration, should not be used in production for security concerns. Disable MAC filtering this disables filtering based on the MAC address of the user device. If MAC filtering is enabled, you will need to specify MAC addresses for all user devices. Block Google Authenticator this will block two-factor authentication for this server, even if it is enabled for user. Typically, two-factor authentication is used for VPN access, and not used for WiFi. RADIUS Server: Debug Tab Use Debug tab to Enable detailed debug log for this server If you are having RADIUS or network issues, you can enable RADIUS debug for a specified period of time. Debug will allow support personnel to quickly track down the cause of the issue. Note: You have the option to display passwords in the debug file. This option displays passwords in clear text. Anyone with access to the debug file will have access to user passwords. RADIUS Server: User Groups Tab Use User Groups tab to Attach internal user groups that can authenticate against the server. Note: by default, when the server is create, All Users group is attached to it. This can be modified later to allow for more fine-grained access. RADIUS Server: Device Groups Tab Use Device Groups tab to Attach device groups that can authenticate against the server. This is used only for MAC-based authentication and MSISDN authentication. 21

22 RADIUS Server: Ext User Groups Tab Use Ext User Groups tab to Attach external user groups that can authenticate against the server, such as Active Directory or LDAP based groups. RADIUS Server: Source IPs Tab Use Source IPs tab to Specify which IP addresses from the Internet can connect to the server. For security reasons, the server will filter out packets from all other IP addresses. You need to specify the IP address of your internet gateway or firewall. For debugging purposes, IP filtering can be disabled in the General Info tab. Source IP is used to ensure that only authorized users or devices have access to the RADIUS server. With source IP enforcement, access is permitted only to users who have an IP address that you have approved. Typically a gateway is used to separate an enterprise network from the public Internet. Users connect from within that gateway. When Cloudessa RADIUS receives a RADIUS request from a user authenticating to a NAS, the source IP address is the source IP address from the gateway, not the individual user. By default, the network mask is used with the source IP that you specify. This ensures that only one host can be associated with that IP address. For example, your AP or NAS IP address should be used to permit these devices to communicate with the RADIUS server. To use source IP, create a new source IP address entry. Then, add the source IP (or multiple source IPs) to a virtual RADIUS server instance. 1. In the Web UI, go to RADIUS > Source IPs and create source IP address(es) based on the IP address of the gateway. 2. Go to RADIUS > Virtual RADIUS Servers, and click on a server to display options. 3. Select the tab for Source IPs. 4. Select the check box for the applicable Source IP for the RADIUS instance. 22

23 RADIUS Server: Guest Users Tab Use Guest Users tab to: View and delete temporary guest user accounts that have access to this server RADIUS Server: Access Card Sheets Use Access Card Sheets tab to: View and delete temporary printable access card sheets that have access to this server RADIUS Server: Attributes Tab Use Attributes tab to: Set RADIUS attributes that are returned in all RADIUS Access-Accept messages by this server. 23

24 CREATING AND MANAGING USERS AND GROUPS Cloudessa supports local users and groups, as well as authentication against external user stores, where a group on each external store such as LDAP is mapped to an external group on Cloudessa service. You can add individual local users either through the Web UI, or by importing a batch of established users with a CSV file. Note: Admin address is used when authenticating to the Web Admin interface. The RADIUS login is used to identify the user to RADIUS service. Cloudessa RADIUS service supports several user roles: Primary Admin (root) manages all Cloudessa features. The primary Admin cannot be deleted. Admins manage all Cloudessa features, authenticate against RADIUS servers and access the full web interface. An Admin can create another Admin. An Admin can be deleted by the Primary Admin. Users can optionally manage their password through the Web UI, if permitted by the administrator. User Managers can use the Cloudessa RADIUS server for authentication, and create, remove and manage RADIUS users. Guest Users are granted temporary guest access to the RADIUS service Creating and Managing Local Non-Admin Users You can add a local user either directly from the Admin UI or you can import lists of users via a CSV file. To create a local user directly: In the Web UI, select Users and Groups > Users. Click Create User. Enter the following information for each user: Address (required) used for notifications and password reset Login (required) RADIUS login name First Name user first name Last Name user last name 24

25 Password set password (or select Generate password to randomly generate a password). User can manage his password. If you leave this check box selected, the user can us the Web interface to change and reset the password. The same password is used for the Web interface and the RADIUS server. Show Password. If this is not checked, the password is hidden when typed in. Click Create New User. Uploading Bulk User Information To avoid manually adding individual users and data, you can import a comma separated value (.csv) file. Create a new.csv file, and then enter users in the following format: o FIRSTNAME, LASTNAME, , USERNAME, PASSWORD, GROUP. From the Users main Web UI page, select Bulk Upload. Select the.csv file from your local machine. The user table is populated from the entries in the.csv file. User: Manage User Tab Use this tab to: Change user info you entered when creating the user View user role (Regular User, Admin, or User Manager) Disable the user if the user is disabled, she cannot use RADIUS authentication User: Google Auth Tab Use this tab to Enable two-factor authentication Google Authenticator If the two-factor authentication is enabled, 25

26 A QR code is automatically generated and ed to the user The user needs to scan the QR code into the Google Authenticator smartphone app The user needs then to authenticate using the following credential: For example: permanent password + comma sign + Google Authenticator PIN mypassword, Show Google Auth Key option can be used to display the corresponding Google Auth key, for smartphones that do not have camera to scan QR codes Regenerate Code option can be used to regenerate the QR code Verify Code button can be used to verify QR code. This is used to make sure your smartphone app works correctly. If your smartphone has clock set incorrectly the app will fail. Note: for Windows Mobile, you need to download the opensource Authenticator+ app, which is maintained by Cloudessa in the Microsoft App Store. User: Groups Tab Use this tab to Attach and remove this user from user groups User: Attributes Tab Use this tab to Specify RADIUS attributes returned for this particular user User: Advanced Tab Use this tab to Limit the number of devices this user can use on the network. This is counted on a daily basis. For example if you set the value to 3, the user can at 26

27 maximum use 3 different devices within 24 hours. The devices are identified by their MAC addresses User Groups Overview After you have created a new RADIUS server, you must specify the user groups that can authenticate against the server. Note: when the server is created the All Users group is attached to the server, meaning that all users can authenticate against the server. To enable more finegrained access, you need to detach this group from the server, and then attach the user groups that should have access to the server. For instance, if you only want engineering employees to have access, you need to create Engineering group and attach it to the server. User groups can be internal (local) or external. All users in user groups who attempt to authenticate against the RADIUS server must belong to either a local or an external user group. Local user groups consist of users that have been added to the local RADIUS database, native to your instance of Cloudessa RADIUS. You add users in the Admin UI under Users and Groups > Users. External users consist of individuals in a data store from an external authentication server database. External users are defined in an external user group. If multiple external user groups are added to a virtual server, and a user attempts to authenticate, all internal and external groups are attempted in sequence. If at least one group includes the user, and authentication against this group succeeds, the user is allowed to authenticate against the virtual server. For an external user authentication attempt to succeed, at least one external group must return success for authentication of the user. You add external users from the Users and Groups > External User Groups page. If a successful connection is made with your external authentication store, the External Users table is populated with users. You can filter users by Login, Display Name, or External Group Name. 27

28 Creating and Managing Local User Groups To create a local user group: In the Web UI, select Users and Groups > User Groups. Click Create User Group. Enter the following information for each grouo: Name (required) group name Description group description Service Type (required) WiFi, VPN, SSH, Local Login, or Other Click Create User Group. User Group: Manage Group Tab Use this tab to Edit group description and service type User Group: VLAN Tab Use this tab to Place all users on in this group on a particular VLAN. Click Enable VLAN Tag and set the VLAN ID attribute. This RADIUS attribute will be returned by the RADIUS server for this group. The wireless access point or the Ethernet switch will then place the user device on the VLAN specified by the attribute. In this way you can place different user groups on different VLANs. Note: Permissible VLAN numbers are User Group: Users Tab Use this tab to Add and remove users from this group 28

29 User Group: IP Pool Tab This advanced feature can be used to assign IP addresses to the user device from the pool of available addresses by allocating an IP address and returning the IP address in the RADIUS attribute. When the NAS server sends Accounting-Stop message, the IP address is released back to the pool. Use this tab to Manage pools of IP addresses that are assigned to this user group. Each IP address pool is specified by the Range Start and Range End IP addresses. Click on Add IP Pool to add an IP Address Pool User Group: Attributes Tab Use this tab to Specify RADIUS attributes returned for all users in this group Creating and Managing External User Groups External user groups are those that you have created based on an external authentication data store. Supported external user stores include: Active Directory Google Apps (ensure that users are registered with Google Apps) LDAP Databases: Oracle, MS SQL Server, DB2, MAXDB, Sybase, MySQL, PostgreSQL Web Services: Cobot API To create an external user group: In the Web UI, select Users and Groups > External User Groups. Click Create Ext User Group. Define a Name for the external user group. Select a Database server type and provide the required information to make a connection with the external data store 29

30 Click Test Connection this will allow you to make sure that the connection is enabled and works Click Create Group Ext User Group: Manage Group Tab Use this tab to Edit group description and service type Ext User Group: VLAN Tab Use this tab to Place all users on in this group on a particular VLAN. Click Enable VLAN Tag and set the VLAN ID attribute. This RADIUS attribute will be returned by the RADIUS server for this group. The wireless access point or the Ethernet switch will then place the user device on the VLAN specified by the attribute. In this way you can place different user groups on different VLANs. Note: Permissible VLAN numbers are Ext User Group: Users Tab Use this tab to Add and remove users from this group Ext User Group: IP Pool Tab This advanced feature can be used to assign IP addresses to the user device from the pool of available addresses by allocating an IP address and returning the IP address in the RADIUS attribute. When the NAS server sends Accounting-Stop message, the IP address is released back to the pool. Use this tab to 30

31 Manage pools of IP addresses that are assigned to this user group. Each IP address pool is specified by the Range Start and Range End IP addresses. Click on Add IP Pool to add an IP Address Pool Ext User Group: Attributes Tab Use this tab to Specify RADIUS attributes returned for all users in this group Viewing External Users Cloudessa pulls user info from the external user stores and makes external users visible in the Cloudessa UI. To view external users, click Users&Groups->External Users. You can also use this tab to set a Google Authenticator Two-Factor QR code for the external user. To do this, select the user, and then enable Google Authenticator in the Google Authenticator tab. Creating and Managing Devices and Device Groups Devices and device groups are used to provide authentication using MAC-based authentication protocol (MAB). Each device is specified by its MAC address. Creating and Managing Devices To create a device: In the Web UI, select Devices and Groups > Devices. Click Create Device. Enter the following information for each device: Name (required) device name Description device description MAC address (required) MAC address as XX:XX:XX:XX:XX 31

32 Click Create Device. Once the device is created, you can use Groups tab to add it to Device Groups, as well as Attributes tab to specify RADIUS attributes returned for this device. Creating and Managing Device Groups To create a group of devices: In the Web UI, select Devices and Groups > Device Groups. Click Create Device Group. Enter the following information for each device: Name (required) group name Description group description Click Create Device Group. Once the device is created, you can use Devices tab to add devices to this group, as well as Attributes tab to specify RADIUS attributes returned for this device group. Creating and Managing External Device Groups Devices and device groups are used to provide authentication using MSISDN protocol. The device information is stored in an external SQL database and Cloudessa establishes a connection to this database. Before you create an external device group, ensure that your database is installed and operating. Cloudessa supports the following databases: Oracle DB MS SQL Server DB2 MAXDB Sybase MySQL PostgreSQL 32

33 To create an external device group on Cloudessa RADIUS: 1. In the Web UI, select Devices and Groups > External Device Groups. 2. Click Create Device Group. 3. Select the type of database that currently exists in your network. 4. Enter the Group Name and the required information (*) to enable the database to communicate with the RADIUS server. 5. Click Test Connection. If the RADIUS server and the database can communicate, click Next > and configure Device config mapping details. 6. In Device config mapping, provide the following data: Table Name Field Name for Calling Station ID (ID, username or password) Field Name for Framed IP Address (ID, username or password) Framed Network Mask 7. Click Finish. 8. Select a virtual RADIUS server that you have created. 9. Click Device Groups. 10. Click Add Group, and select the device group that you configured. You can add RADIUS attributes, or change the connection password by using the tabs when you select the device group. Using IP Address Pools IP address pools are used to assign IP addresses to devices that authenticate against the RADIUS server. When you define an IP address pool, the RADIUS server allocates addresses from the range you specify. IP address allocation is part of the authorization process, and is done after authentication has succeeded. 33

34 For example, if you specify an IP address range of , there are twenty available IP addresses for devices/users who successfully authenticate. An IP address is assigned to a device, and is released when a RADIUS accounting message is received from the device indicating that the device has disconnected. With Cloudessa RADIUS, you can specify an IP address maximum session lifetime. If the lifetime is exceeded for a specific IP address, the address is returned to the pool, even if an accounting stop messages was not received. Users must re-authenticate to receive a new IP address. To create an IP pool: Select RADIUS > IP Pool and add an IP address range and a network mask. Go to RADIUS > Virtual RADIUS Servers, and click on a server to display options. Select the tab for IP Pool. Select the check box for the IP Pool for this RADIUS instance. Adding Vendor-Specific Attributes In addition to standard RADIUS attributes, vendor-specific attributes allow you to incorporate attribute dictionaries that have been defined by your NAS. You add vendor-specific attributes at the admin user, group or server level. At the user level, attributes are applied to individual users. At the admin level, attributes are applied to admins only. At the group level, attributes are applied for all individuals in the group. At the server level, attributes are applied for all users who access the RADIUS server. To specify a vendor-specific RADIUS dictionary file: 1. Select a Virtual RADIUS Server, User Group, Admin or User that you have configured. 2. Click the Attributes tab. 3. Click Add Attribute. 34

35 4. From the Select Vendor selection menu, choose the equipment manufacturer that serves as the NAS or AP for your RADIUS implementation. 5. Select the attributes that you want to add, and enter a value specification for each attribute. Figure 3 Adding a RADIUS Dictionary 6. Click Add. The attribute is applied at the level you have specified. You can select the attribute to edit or remove. Logging and Accounting One of the benefits of deploying RADIUS is comprehensive accounting service. The Cloudessa RADIUS server displays critical logging and accounting metrics that allow you to monitor network usage. Authentication Logs Authentication logs provide basic user login activity. The authentication log displays the time a user was active on the network, the RADIUS Server, The Calling 35

36 Station ID (this is the IP address or phone number from where the user originated the connection), the NAS address, and the RADIUS result code. Active Sessions Active sessions displays detailed information about active user sessions. Accounting Logs Accounting logs provides a detailed history of users and devices that have accessed the RADIUS server. Accounting logs can be used for billing, or for statistical purposes. You can select a time interval to view logs from specific dates. You can update the accounting log by clicking Refresh, You can export accounting logs to a.csv file for offline examination. RADIUS Trace Logs With this tool, you can examine and debug RADIUS messages. You can select a time interval to view logs from specific dates. Guest User Access You can provision temporary access privileges for guest users. Guest access can be used to provide authentication for one RADIUS server. If you select the check box to login and password to a user, the user receives an with randomly generated login credentials. Guest User Access Card Sheets You can provide a temporary access record to user that includes a login and password for guests. Login credentials are randomly created numerical sequences with an expiration period that you determine. You can generate a PDF to print and distribute login information to guest users. After a guest user has authenticated with the login credentials, they can access network assets for the validity time that you have specified. When a session is created, the selected RADIUS server sends the Session-Timeout attribute to the wireless AP or NAS, which disconnects the user when the validity period expires. Users can authenticate multiple times during the validity period. To create an access card sheet, go to Guests > Access Card Sheets. Specify the validity period, (fifteen minutes to thirty days) the RADIUS server to which the access applies, and the number of access cards per sheet (1 28). 36

37 After you have created an access card sheet, select the item and click Download PDF. Distribute the applicable PDF to users. The figure below illustrates an example of the access card sheet. Figure 4 Access Card Sheet Users can log in and access network resources using the Login and Password provided for the Validity time that you have specified. Cloudessa Administrator Options Creating Admins and User Managers You create Admins and User Managers in exactly the same way that create regular users. Admins manage all Cloudessa features, authenticate against RADIUS servers and access the full web interface. An Admin can create another Admin. An Admin can be deleted by the Primary Admin. User Managers can use the Cloudessa RADIUS server for authentication, and create, remove and manage RADIUS users. Admin Logs Admin logs keep a running log of administrator actions, including logging in or out, and creating or deleting objects. Logs are by default shown for the current day. You can look at previous log entries by adjusting the Time Interval. Upgrading Your Cloudessa Subscription If you would like to upgrade your Cloudessa subscription, you can do that from the Web UI, or by contacting the Cloudessa support team at support@cloudessa.com. 1. Select Account > Upgrade Subscription. 37

38 2. Select one of the following: 20 users 35 users 60 users 110 users 3. Click Next step to enter your payment information. The Cloudessa Virtual Appliance If you would prefer to host your own RADIUS server without the expense and administrative burden of deploying a separate piece of hardware, you can purchase a Cloudessa RADIUS Virtual Appliance. The Cloudessa Virtual Appliance functions, and is administered exactly the same as Cloudessa s hosted RADIUS service. The Cloudessa RADIUS virtual appliance can be installed on any VMWare product (ESX/EXSi 3.5, 4x and 5.x, vcenter 2.5, 4.x and 5.x server 2.06 and 2.0, Workstation 6.5x and 7.x VMWare Player) or Oracle VM Virtual box. To use the Virtual Appliance: 1. Download the image from Cloudessa 2. Install the image on a virtual server, for example VMWare. A CLI routine script runs. You are asked to read and agree to the End User License Agreement (EULA). 3. Enter a new Unix password for the user account. 4. To set up your Virtual Appliance, enter in your browser. You are directed to the set up an account page. 5. Enter your name, (login), password, and the license key that you were provided with from Cloudessa. 6. Agree to the Terms of Service. 38

39 7. Fill in the required information to generate a self-signed certificate. All fields must be filled in to generate the certificate. 8. Log in and start using Cloudessa as outlined in this manual. The following image illustrates the Cloudessa Virtual Appliance in a basic network application. Figure 5: Cloudessa Virtual Appliance in the Network For additional information, or to request help, contact support@cloudessa.com 39

40 GOOGLE APPS AUTHENTICATION User Names & Passwords: EAP-TTLS Option To authenticate users to the WiFi network using their Google Apps domain account user names and passwords requires using EAP-TTLS / PAP (Extensible Authentication Protocol with Tunneled Transport Layer Security / Password Authentication Protocol. To securely pass the users account credentials from the user device to the network and over to Google for authentication and authorization, EAP-TTLS / PAP first authenticates the connection between the WiFi AP (the "Authenticator" or RADIUS Client) and the RADIUS server and sets up a trusted secure tunnel between the Authenticator and the RADIUS server. EAP-TTLS then sets up a second inner encrypted tunnel for secure transport of the users credentials, so that the intermediaries to the authentication process (the AP and the RADIUS server) are only passing encrypted users credentials. Within the secure inner tunnel, a second authentication protocol, PAP (Password Authentication Protocol), is used to transport the end users credentials. To authenticate a user using their Google Apps user name and password, EAP-TTLS must be the outer authentication, while PAP must be used as the inner authentication protocol. To use EAP-TTLS / PAP requires the use of an 802.1X supplicant. The following Operating Systems all include 802.1X supplicants and support EAP- TTLS and PAP: Apple, ios version and higher and MAC OS ; Android v2.1 and higher and Google Chrome OS (for Chromebooks); Microsoft Windows v8+ (note: Windows Mobile does note support EAP-TTLS; and Blackberry 6A+. Administrators can automate user supplicant configuration through the use of profile creation tools (ie: ios Profiles) and scripting. Alternatively, SecureW2 s JoinNow MultiOS is a wireless security deployment platform that includes a client with support for a full range of Extensible Authentication protocols (EAP) including EAP-TTLS/PAP. See Please visit for detailed information about configuring the various supplicants for EAP-TTLS / PAP, profiling and scripting tips, and the latest information about other operating systems. Certificates - EAP-TLS Option 40

41 In lieu of user names and passwords, Google Apps domain owners can opt to issue X509 certificates to their Google Apps users and use them with EAP-TLS protocol for user authentication. EAP-Transport Layer Security (TLS) is used in certificate-based security environments, providing mutual authentication, negotiation of the encryption method, and encrypted key determination between the client and the authenticating server. To enable the use of certificate credentials in a WPA 2 compliant manner, the signed certificate must first be in the certificate store on the mobile device, and then the user must present that certificate during the WiFi authentication process using a EAP-TLS supplicant. Cloudessa provides a functionality to create and sign certificates, as well as to certificate-installation links to users. The users install the certificates by simply clicking the link inside the . During the EAP-TLS based authentication, the certificate is validated, and the address of the certificate owner is checked against a listing of current Google Apps domain users maintained in the Cloudessa native database. When a user is deleted in Google Apps, the user certificate is revoked. In case when a mobile device is lost Cloudessa provides an interface to revoke the certificate installed on the lost device and generate a new certificate for the user. Cloudessa Certificate Creation Tool To facilitate the creation and distribution of Certificates signed by Google Apps, Cloudessa has created a Certificate Creation Utility, that administrators can use to easily create certificates on behalf of their Google Apps users. The tool enables the importing of user names and addresses, the generation of signed certificates, and it automates the process of then sending the certs to user via for easy insertion into the certificate store on their device(s). Captive Portal Option With the Cloudessa Service, you can also authenticate Captive Portal users using Google Apps. Please see the Captive Portal section of this manual for how to configure browser based logins against Google Apps. 41

42 For supplemental information regarding using Google Apps credentials to the WiFi network, please see the Support FAQ section on Cloudessa.com. Two-Factor Authentication Cloudessa supports 2-Factor Verification with the Google Authenticator application for smartphones. To authenticate against a Cloudessa RADIUS server, a user must possess not only a valid password, but also the PIN number generated by the Google Authenticator application. Google Authenticator incorporates time based one-time passwords (TOTP) to enable an additional layer of security. Cloudessa supports the Google Authenticator application to enable 2-step authentication. The Authenticator application generates a temporary six digit PIN that users must enter to gain access to a network. A new PIN code is generated each 30 seconds, and the user must enter the current PIN (in addition to their standard password for twofactor authentication - for example, mypassword, ) Without the PIN code, a user cannot authenticate. 2-Step Verification is also available for administrative access via the Cloudessa Web UI. (What does this refer to -- need to be more explicit) Authentication with the Google Authenticator application is only available with a paid Cloudessa account Google authentication is enabled on a per-user basis. Once Google Authenticator access is enabled for a particular user, RADIUS and Web UI access for the user requires the PIN code generated by Google Authenticator as well as the password (for 2-step authentication). Using Google Authenticator To enable Google authentication for a user: Select a previously created user under Users and Groups > User, or create a new user. 42

43 Click the Google Auth tab. A QR code will be generated. Click Save. An is sent to the user address associated with the account. The contains the QR code that can be scanned into the smartphone application Downloading Google Authenticator for Smartphones Users can get the free Google Authenticator application from the following sources: iphone Android Windows Blackberry m.google.com/authenticator About Quick Response (QR) Codes The QR code is a successor to the ubiquitous barcode. With a camera-equipped smartphone and the proper software (in this case Google Authenticator mobile application), you can capture the QR code for relevant supplementary information. Figure 6 QR Code Note: Optionally, you can select a check box to Show Google auth key. This feature generates the code as a numerical string for users that do not have a smartphone with a camera. 43

44 After you create a user on Cloudessa RADIUS, the QR code is sent to the user in the registration confirmation if the option is configured for the user. The user captures the QR code with the Google Authenticator application and the smartphone camera. If the user does not have a camera-equipped phone, the numerical string is included so the user can enter the code in Google Authenticator manually. When the user attempts to log in to the Cloudessa Web UI, they are prompted to enter the PIN displayed within the application. To authenticate against the virtual RADIUS server, enter the regular password, followed by a comma, and then the temporary PIN. For example: MyPassword, Google Authenticator authentication can be applied for users, admins and user managers. For supplemental information regarding Google Two Factor Authentication, please see the Support FAQ section on Cloudessa.com. Cloudessa Web Services API Cloudessa provides JSON-based Web Services API that can be used to programmatically utilize Cloudessa services. Contact Cloudessa support for API documentation. Creating and Managing Captive Portals To allow user access to your WiFi network, you can configure the Cloudessa Captive Portal Cloud Service to provide a Web-based login mechanism for users to enter their login credentials. Cloudessa Captive Portal is based on the Universal Access Method (UAM) protocol, which is supported by all major enterprise access point manufacturers. 44

45 When the user associates to the WiFi network, the WiFi access point redirects the user browser to the Cloudessa Captive Portal service. The Captive Portal service displays a Web page that prompts for a username and password (or other registration or Login options). If the authentication credentials the user presents are valid, the Captive Portal server sends a message to the AP which includes temporary RADIUS credentials. The access point then initiates a RADIUS authentication request using these credentials. The Cloudessa RADIUS server responds to the request with a set of RADIUS attributes that controls user session parameters, such as VLAN id and Quality of Service. Creating a Captive Portal To create Cloud Captive Portal: In the Web UI, select Cloud Captive Portals > Cloud Captive Portals Click Create Captive Portal. Enter the following information: Name (required) device name Description device description RADIUS Shared Secret (required) required for WiFi hardware configuration, click Generate to generate Hardware vendor choose the hardware vendor Click Create Device. Captive Portal: General Info Tab This tab includes information you need to enter into your WiFi hardware as well into your SAML provider if SAML is used RADIUS primary and secondary server IPs RADIUS authentication and accounting ports RADIUS shared secret UAM Splash Page URL 45

46 SAML ACS URL this is the URL where your SAML provider such as Ping Identity posts the SAML authentication reply message Click on Simulate button to view the Captive Portal as if connected to the Access Point. This can be handy if debugging the Captive Portal without the use of WiFi hardware. Captive Portal: Splash Page Tab This tab is used to manage the main page of your Captive Portal the splash page. Cloudessa allows displaying separate splash pages in different languages. The first step is to select the languages you want to support. Click Add More Languages and select a language. If you want this language to be the default if the user browser does not specify the language, choose Set As Default. Once you selected the languages, you need to edit the Captive Portal page for each language. Select the language and click Manage Splash Page An HTML editor will be displayed in a pop-up window. Edit the page and click Save. If you want to edit HTML source, click Source button Cloudessa allows displaying separate pages for mobile devices. Click on Manage Mobile Page An HTML editor will be displayed in a pop-up window. Edit the page and click Save. If you want to edit HTML source, click Source button If you are using only a single authentication source for your Captive Portal, such as SAML or Facebook authentication, Cloudessa allows you to skip the splash page and go directly to your SAML provider or Facebook to authenticate the user. To use this feature, select Skip Splash Page. Captive Portal: Success Page Tab The success page is displayed to the Captive Portal user after the user is authenticated. To skip the success page choose Skip Success Page. Cloudessa allows displaying separate success pages in different languages. 46

47 The first step is to select the languages you want to support. Click Add More Languages and select a language. If you want this language to be the default if the user browser does not specify the language, choose Set As Default. Once you selected the languages, you need to edit the Captive Portal page for each language. Select the language and click Manage Success Page An HTML editor will be displayed in a pop-up window. Edit the page and click Save. If you want to edit HTML source, click Source button Cloudessa allows displaying separate success pages for mobile devices. Click on Manage Mobile Page An HTML editor will be displayed in a pop-up window. Edit the page and click Save. If you want to edit HTML source, click Source button If you are using only a single authentication source for your Captive Portal, such as SAML or Facebook authentication, Cloudessa allows you to skip the splash page and go directly to your SAML provider or Facebook to authenticate the user. To use this feature, select Skip Splash Page. The pre-release version of Cloudessa Captive Portal is fully tested with Meraki Cloud Controller and Ruckus ZoneDirector. We are adding support for any UAM compatible WiFi AP or Controller including Cisco, Aruba, Motorola, and others. Contact us at sales@cloudessa.com to test Cloudessa Captive Portal with your hardware. Captive Portal: Authentication Providers Cloudessa allows you to add authentication widgets to your splash page. The following authentication providers are supported SAML Google Apps Facebook Twitter LinkedIn PayPal PayPal Express Checkout 47

48 Self-Registration Click on Add Provider button. You can add just one authentication provider or enable several providers on you portal. Each provider requires separate configuration settings. SAML Configuration The following items are need to be specified for this provider Provider Type- OneLogin, ADFS, Ping Identity or Okta Certificate - the public certificate used to verify SAML signature SAML Provider URL- the URL of the SAML identity provider service Service Provider ID service provider ID (Ping Identity only) Once the provider has been configured add the following to the source code of your Captive Portal page 48

49 <div id="saml_placeholder"></div> The SAML login button will be displayed there Google+ \ Google Apps Configuration The following items are displayed for this provider Domain this field is not required. If you provide this value only users from specified domain such as mydomain.com will be allowed to authenticate. Walled Garden IPs these are Google IP addresses that you need to add to your access point or wireless controller as walled garden addresses. This authentication provider by default allows access to all Google+ and Google Apps users. But if you set domain field, then only Google Apps users from specified domain will be allowed. Once the provider has been configured add the following to the source code of your Captive Portal page <div id="google_placeholder"></div> 49

50 The Google login button will be displayed there Google+ \ Google Apps - Advanced Configuration By default we utilize a Google Apps application owned by Cloudessa. If you want to use your own application you can use Advanced Settings tab. This tab requires you to specify your App ID App Secret For more details on creating your own Google Apps applications go to:

51 Facebook Configuration: The following items are displayed for this provider Walled Garden IPs these are Facebook server IP addresses that you need to add to your access point or wireless controller as walled garden addresses. With Facebook authentication provider you allow users to access your portal with their Facebook accounts. As in the previous paragraph, you will need to add Walled Garden IPs list to your Access Point to make this authentication provider work. Once the provider has been configured add the following to the source code of your Captive Portal page <div id="facebook_placeholder"></div> The Facebook login button will be displayed there Twitter Configuration The following items are displayed for this provider 51

52 Walled Garden IPs these are Twitter server IP addresses that you need to add to your access point or wireless controller as walled garden addresses. Once the provider has been configured add the following to the source code of your Captive Portal page <div id="twitter_placeholder"></div> The Twitter login button will be displayed there Twitter - Advanced Configuration By default we utilize a Twitter application owned by Cloudessa. If you want to use your own application you can use Advanced Settings tab. 52

53 This tab requires you to specify your App ID App Secret You can create your own Twitter application here: LinkedIn Configuration The following items are displayed for this provider 53

54 Walled Garden IPs these are LinkedIn server IP addresses that you need to add to your access point or wireless controller as walled garden addresses. Once the provider has been configured add the following to the source code of your Captive Portal page <div id="linkedin_placeholder"></div> The LinkedIn login button will be displayed there LinkedIn - Advanced Configuration By default we utilize a LinkedIn application owned by Cloudessa. If you want to use your own application you can use Advanced Settings tab. 54

Cloudessa AAA and Captive Portal Cloud Service

Cloudessa AAA and Captive Portal Cloud Service Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10 Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0 How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

ClickShare Network Integration

ClickShare Network Integration ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

vwlan External RADIUS 802.1x Authentication

vwlan External RADIUS 802.1x Authentication 6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Management Authentication using Windows IAS as a Radius Server

Management Authentication using Windows IAS as a Radius Server Management Authentication using Windows IAS as a Radius Server OVERVIEW: In this we are using Radius server Windows IAS as a backend server for the management authentication for the controller. When the

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

TrustSec How-To Guide: On-boarding and Provisioning

TrustSec How-To Guide: On-boarding and Provisioning TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Sophos UTM. Remote Access via SSL. Configuring UTM and Client Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1. Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

RAD-Series RADIUS Server Version 7.1

RAD-Series RADIUS Server Version 7.1 RAD-Series RADIUS Server Version 7.1 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication Authorization, and Accounting

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents: Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné

More information

Application Note Secure Enterprise Guest Access August 2004

Application Note Secure Enterprise Guest Access August 2004 Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Deploying iphone and ipad Virtual Private Networks

Deploying iphone and ipad Virtual Private Networks Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.

More information

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page

More information

pfsense Captive Portal: Part One

pfsense Captive Portal: Part One pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

802.1x in the Enterprise Network

802.1x in the Enterprise Network 802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It

More information

Securing Wireless LANs with LDAP

Securing Wireless LANs with LDAP A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security

More information

PassTest. Bessere Qualität, bessere Dienstleistungen!

PassTest. Bessere Qualität, bessere Dienstleistungen! PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : JN0-314 Title : Junos Pulse Access Control, Specialist (JNCIS-AC) Version : Demo 1 / 6 1.A customer wants to create a custom Junos Pulse

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Updated 11/07/2011 Can I disable https on the login page of the BSC or vwlan and use http instead so I do not get a certificate error? No, https

More information

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html

MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

govroam Web Interface User Guide

govroam Web Interface User Guide govroam Web Interface User Guide Contents Introduction 3 Login Page 3 Main Page 4 Managing your Radius Servers 5 Managing your Realms 7 Managing the Test Users 9 Managing the Access Points 10 Information

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

WiFiLAN Cloud. Wifi soft Solutions

WiFiLAN Cloud. Wifi soft Solutions WiFiLAN Cloud Wifi soft Solutions Company Snapshot 2 Our Lines of Business Hotspot Solutions Enterprise Solutions Home Solutions Social Media & Analytics Portal Page Legal Compliance User Tracking Hotspot

More information

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Palo Alto Networks User-ID Services. Unified Visitor Management

Palo Alto Networks User-ID Services. Unified Visitor Management Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba

More information

Case Study - Configuration between NXC2500 and LDAP Server

Case Study - Configuration between NXC2500 and LDAP Server Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Configuring Wired 802.1x Authentication on Windows Server 2012

Configuring Wired 802.1x Authentication on Windows Server 2012 Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos johan@accessdenied.be Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced

More information

Aradial Installation Guide

Aradial Installation Guide Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

WiNG 5.X How-To Guide

WiNG 5.X How-To Guide WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC

More information

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents Contents 4 Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager Contents Overview...................................................... 4-3 RADIUS Overview...........................................

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information