Two-Factor Authentication (2FA) using OpenOTP
|
|
|
- Jewel Turner
- 9 years ago
- Views:
Transcription
1 Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Two-Factor Authentication (2FA) using OpenOTP This guide is for security-aware individuals who wish to learn the theory behind user- based two-factor (or multifactor) authentication systems, also known as 2FA. Here we will discuss how 2FA systems work, and how to implement 2FA into a small, virtualized environment for testing purposes. By implementing 2FA, the hope is to enhance the cyber toolkit for administrators who wish to help mitigate the effects of user password theft by cyber intrusion. By following the steps outlined here, the reader should be able to c... Copyright SANS Institute Author Retains Full Rights AD
2 Two-Factor Authentication (2FA) using OpenOTP GIAC (GSEC) Gold Certification Author: Colin Gordon, Advisor: Stephen Northcutt Accepted: September 15th 2014 Template Version September 2014 Abstract This guide is for security-aware individuals who wish to learn the theory behind userbased two-factor (or multifactor) authentication systems, also known as 2FA. Here we will discuss how 2FA systems work, and how to implement 2FA into a small, virtualized environment for testing purposes. By implementing 2FA, the hope is to enhance the cyber toolkit for administrators who wish to help mitigate the effects of user password theft by cyber intrusion. By following the steps outlined here, the reader should be able to comfortably configure a user account already existing in a Microsoft Active Directory (AD) environment to use the Google Authenticator application on his/her smartphone to authenticate with AD username and password+token for remote VPN access. 1. Introduction A user identity and password alone (known as single factor authentication) are not enough to mitigate persistent security risks. Additional methods for proving an identity, besides a secret pin or password, include the use of a biometric (something you are) and/or use of a hardware token or physical key (something you have). The security industry has coined the term two-factor (2FA) or multifactor for the requirement for two or more different methods of proving an identity (Sophos, 2014). More recently, mainstream digital security systems at large have integrated 2FA methods to reduce the impact of cybercrime and nation-state cyber threats that utilize attacks targeting the discovery, recovery, or theft of user passwords (Davis, 2015). Verizon s 2015 Data Breach Investigation Report (DBIR) recommends 2FA as one of two top mitigation strategies for cyberattacks (Verizon, 2015). Cyber intruders have become so adept at
3 Two%Factor(2FA)AuthenticationusingOpenOTP 2 password theft that, recently, the North American Energy Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) regulations for electrical transmission and generation systems have mandated the use of 2FA for all remote access into any devices that may negatively impact the reliability of the power grid if degraded or misused (NERC, 2014). The most popular method for enabling the use of 2FA is through the addition of something you have, typically in the form of a piece of hardware or a software application on a smartphone, that is carried by the person at all times that generates a random One-Time Passcode (OTP). The user may then use the OTP (a random jumble of numbers and/or letters) in addition to the user s password. To an attacker who has stolen a user s credentials, any pilfered password is now worthless since the authentication system requires the additional OTP information that the user is physically carries at all times. Many industries and organizations see the risk-reduction benefit of integrating 2FA systems into their user access control environments. However, any system administrator who has dealt with common enterprise 2FA services knows the difficulties that such systems can present. Many enterprise multifactor authentication systems require dedicated maintenance, are expensive; and from a technical difficult perspective, can be difficult to approach for most cybersecurity personnel. However, in addition to paid 2FA services, there are free, easy-to-approach, and easy-to-maintain alternatives (Davis, Two Factor Auth (2FA) Providers, 2015) Types of Authentication Tokens Currently, there are three different OATH OTP types that are the most widely used: event-based tokens, time-based tokens, and challenge-based tokens. Event-Based Token (HOTP): An OTP system generates event-based tokens ondemand using a combination of a static random key value (HMAC; the H in HOTP) and a dynamic value, such as a counter (IETF, 2005). The event-based token is usually valid for a variable amount of time, but could be valid for an unlimited amount of time. AuthorName, @address
4 Two%Factor(2FA)AuthenticationusingOpenOTP 3 Time-Based Token (TOTP): An OTP system generates time-based tokens automatically every so often based on a static random key value and a dynamic time value (such as currently time of day). The time-based token is only valid for a certain amount of time, such as 30 or 60 seconds (IETF, TOTP: Time-Based One-Time Password Algorithm, 2011). TOTP is a subset of HOTP. Challenge-Based Token (OCRA): An OTP system generates challenge-based tokens on demand (IETF, OCRA: OATH Challenge-Response Algorithm, 2011), using a random challenge key that is provided by the authentication server at each unique user log-in. The challenge-based token is valid for a certain amount of time such as several minutes Which 2FA Model Should I Use? Event-based one-time passcodes (HOTP) may be usable for a long period of time, which increases the likelihood that the OTP could be stolen or misused. Time-based tokens (TOTP) are currently gaining in popularity over event-based tokens (HOTP) due to the additional security TOTP provides via a set, predictable windows of use for onetime passcode (typically seconds). Challenge-based one-time passcodes (OCRA) are a good choice for organizations that want the configuration process for end-users to be as painless as possible, since pushing a challenge token to a user only requires a phone number and/or address. There are some downsides to the OCRA method, in that it is reliant on cellular or network connectivity between the authentication server and the user to ensure that the authentication process will function. Please see Table 1 for pros/cons of different OTP types. HOTP Example RSA SecureID (older versions), Yubikey. Table 1 Comparison of OTP Types End-User Configuration Steps Usually requires hardware token. Pros/Cons Pro: OTP lasts longer for use. Con: OTP is exposed for a longer period, may be valid until next time event-based OTP is generated. AuthorName, @address
5 Two%Factor(2FA)AuthenticationusingOpenOTP 4 TOTP OCRA Google, Yahoo, LinkedIn, using Google Authenticator. Banking websites that send tokens via SMS text or . Pro: OTP is exposed only a short Installation and amount of time. configuration of smartphone Con: User only has short amount application. of time to type in valid OTP Pro: Easy end-user configuration. Con: Typically relies on external Little-none; requires communication medium (cellular submission of phone network, internet connection) to number or address. get OTP to user Another decision for organizations implementing 2FA using an OTP system is what type of token client to use (either software-based or hardware). Highly secure environments may demand the use of small hardware devices that generate and display one-time tokens, since the security industry generally recognizes that it is more difficult to extract keys from or compromise hardware tokens. These are so-called true 2FA solutions (Sophos, 2014) that do not rely on any mobile network or software platform to get OTP tokens. However, soft-tokens, OTPs that are generated and displayed by smartphone applications, are generally easier to manage and configure, and may be used with most every smartphone variety, which is a low-cost and end-user friendly decision, especially in organizations that are adopting Bring Your Own Device (BYOD) policies (see Figure 1). Here, we use the Google Authenticator smartphone application as a soft-token manager. Google Authenticator generates time-based one-time passcodes (TOTP). Figure 1 Battlenet Mobile Authenticator Smartphone Application TOTP Generator AuthorName, @address
6 Two%Factor(2FA)AuthenticationusingOpenOTP Introducing OpenOTP OpenOTP Authentication Server by RCDevs is a highly configurable authentication server that utilizes open-source solutions and systems. OpenOTP is flexible enough to act both as a stand-alone option, using a free user database, or may be integrated into existing Microsoft Active Directory or other centralized user directory services or databases. OpenOTP stands out as an approachable method for introducing 2FA by easily enabling the addition of something you have to existing groups of existing users with passwords. OpenOTP supports software tokens and hardware tokens, such as Yubikey, FIDO, SecuTech, and others, which can live on a person s smartphone. Additionally, OpenOTP brings the following non-exhaustive list benefits to its administrators and end-users: Ability to install onto an existing Linux-based OS on commodity hardware Ability to quickly commission and test via pre-packaged and pre-configured Virtual Machines (VMs) Comprehensive documentation and support that is freely available on the OpenOTP website Ubiquitous smartphone and hardware token support Support for hardware security modules (HSMs) for safer storing of secret token information Supports Initiative for Open Authentication (OATH) algorithms for better OTP hardware and soft-token interoperability Active support and maintenance via RCDevs company developers Free licenses for up to 40 active users Support for three different OATH OTP types: event-based tokens, time-based tokens, and challenge-based tokens. FormoreinformationabouthowOpenOTPworks,pleaseseeAppendixA. AuthorName, @address
7 Two%Factor(2FA)AuthenticationusingOpenOTP 6 2. Initial Configuration 2.1. Before You Begin Users completing this guide will require basic to medium Ethernet networking skills. Some knowledge of virtual environments, security concepts, and Linux-based operating systems are helpful but not required. Here, the author uses a virtualized environment using the following Operating Systems: Windows Server (2008 R2) Linux with OpenOTP installed. The author used the RCdevs OpenOTP virtual instance with WebADM Web-Based Directory Administrator (download at Authentication clients that supports RADIUS. Here the author uses an OpenVPN Access Server virtual appliance (download at Laptop or workstation for testing, configuration, and hosting virtual machines The author recommends using virtualization for testing environment (e.g. VMware, VirtualBox, HyperV) Lab Configuration The author s lab configuration consists of a Windows Server 2008 R2 as the primary user directory, the OpenOTP server (version ) for 2FA and RADIUS communications, and then various test machines and devices (one Linux and one Windows). AuthorName, @address
8 Two%Factor(2FA)AuthenticationusingOpenOTP 7 Various+RADIUS+Clients Ethernet+Switch Virtualization+Hypervisor OpenOTP openotp.otp.home Windows +Server Active+Directory adds.otp.home Figure 2 Lab Architecture The author will test the solution using the OpenVPN Access Server (version at the time of writing) as an authentication clients Active Directory (AD) Instance Configuration Here, the author created a running Windows 2008 R2 instance with Active Directory Domain Services installed and functional. OpenOTP requires the following configurations on the AD server: X.509 certificate installed on the Windows Server or AD Domain Services service to protect the confidentiality of user data during LDAP transactions between OpenOTP and the user directory. Please ensure that a certificate is active, and that the AD instance can be accessed securely via the STARTTLS method on TCP port 389. NOTE: STARTTLS is not strictly required. However, be aware that unprotected LDAP binds will carry Domain Admin credentials in clear-text over the network. Also, Active Directory requires STARTTLS if you intend to allow OpenOTP to update confidential user data, such as user passwords. Several distinct AD groups, with active members. The example of some active users and groups can be see (see Table 2 for users/groups the author will use). Please ensure that the users in the table are members of their respective groups. DNS services should be installed and active on the AD server. AuthorName, @address
9 Two%Factor(2FA)AuthenticationusingOpenOTP 8 Three groups (Engineers, IT_Technicians, IT_Supervisors) and three respective users, Ada Engineer, Ted Technician, and Bob Supervisor were used. Then, OpenOTP Authenticator Server will be used to map the three groups to distinct authorizations on each authentication client (in the cases where authorizations are supported by the authentication clients). Group Engineers IT_Technicians IT_Supervisors Table 2 Active Directory Group/Privilege Matrix User "Ada Engineer" "Ted Technician" "Bob Supervisor" Remote VPN x x x Network Devices Restricted x Network Devices All In addition to the configurations mentioned above, OpenOTP requires access to the Active Directory server using a user account with Domain Admin level privileges. OpenOTP uses the Domain Admin user account to extend the schema of the AD instance to support the OpenOTP attributes for users/groups and as a proxy user to authenticate to the AD server using LDAP protocol to checks the authenticity of users, accounts, and attribute data. OpenOTP requires a Super Administrators user or group in the Active Directory server. Any member of this group has full access to the WebADM configuration interface. The author will use the IT_Supervisors group as the Super Administrators for OpenOTP. Alternatively, a user may use the Domain Administrators group (cn=domain Admins,cn=Users,dc=otp,dc=home) as the Super Administrators group. The author uses the settings and attributes listed in Table 3. Table 3 Author s AD Settings and Respective Attributes x Setting Domain Admin User Domain Admin User DN Domain Admin User Password Domain Admins Group Attribute (From Author's Configuration) Administrator cn=administrator,cn=users,dc=otp,dc=home Asdf123$ cn=domain AuthorName, @address
10 DN Windows Server Fully Qualified Domain Name (FQDN) Super Administrators Group DN Two%Factor(2FA)AuthenticationusingOpenOTP 9 Admins,cn=Users,dc=otp,dc=home adds.otp.home cn=it_supervisors,dc=otp,dc=home NOTE: Readers may (rightly) point out that configuring the OpenOTP LDAP proxy user for Domain Admin authorizations is a potential security weakness. The OpenOTP LDAP proxy user can be a different user on the LDAP directory with more specific permissions. Please see Chapter 21 of the WebADM Manual LDAP Permissions for more information about how to restrict the authorizations of the OpenOTP LDAP proxy user (and to avoid using the AD Domain Administrator account). 3. Configuring OpenOTP 3.1. OpenOTP Virtual Image Initial Configuration for VMware ESXi Please see Appendix B for detailed initial configuration steps for the RCDevs virtual appliance, including configuring the server hostname, IP address, changing the root password, and ensuring the virtual appliance can receive accurate time via Network Time Protocol requires (NTP; critical for OATH TOTP accuracy). 1. Download and install the OpenOTP Virtual Appliance (OpenLDAP OVF) from 2. During the initial boot, the Linux system will prompt you to input the server Fully Qualified Domain Name (FQDN), to enter an organizational name, to enable WebADM to be started automatically, to register the WebADM logrotate script, and to generate a WebADM secret key (the key encrypts WebADM information in the user directory service). The author used openotp.otp.home as the FQDN, Self as the organizational name, and yes to all else. AuthorName, @address
11 Two%Factor(2FA)AuthenticationusingOpenOTP From a web browser, navigate to the IP address of the RCDevs appliance to log in to the WebADM configuration platform using HTTPS on port (see Figure 45) to finish the initial configuration ( in the case of the author). You may use the default root credentials to log in (root / password). 4. From the WebADM dashboard, you may set the root password, the network IP address, hostname and DNS server(s), and the time service on the server Integrating OpenOTP into Microsoft Active Directory In this section, the RCDev appliance WebADM service will be configured with the attributes necessary (see Table 3) for OpenOTP to integrate into Active Directory. 1. Navigate to /opt/webadm/conf, and place the Certificate Authority (CA) certificate used to sign the adds.otp.home certificate into this directory. This function can be performed by using using Secure Copy (SCP, see Figure 3). Figure 3 SCP CA Certificate 2. From the /opt/webadm/conf directory, edit servers.xml (command: vi servers.xml ) and add the hostname for the AD server (adds.otp.home), the encryption type ( TLS ), and the location of the CA certificate that was just uploaded ( /opt/webadm/conf/ca.crt ). Note that the user may need to use the server IP address instead of the hostname if the RCDevs appliance DNS server has not been fully configured (see Figure 4). AuthorName, @address
12 Two%Factor(2FA)AuthenticationusingOpenOTP 1 1 Figure 4 severs.xml 3. Next, edit /opt/webadm/conf/webadm.conf to add the AD-specific settings and attributes necessary for OpenOTP to integrate into the Windows user directory server. Change the proxy_user, proxy_password, and super_admins to match the information in Table 3 (see Figure 5). Figure 5 webadm.conf Proxy User and Super Admins Settings 4. Comment out the other_admins line (insert a # in front of the line). 5. Comment-out the existing LDAP containers required by WebADM, and uncomment-out the Active Directory specific containers. The user will need to edit the dc=mydomain,dc=com on the end of each line to match the root of your own domain (in the author s case, dc=otp,dc=home ). See Figure 6 for an example. AuthorName, @address
13 Two%Factor(2FA)AuthenticationusingOpenOTP 1 2 Figure 6 webadm.conf LDAP Container Settings 6. Next, change the time_zone setting to match the local time zone. Leave all other settings default. After saving the edited webadm.conf file, the user may restart the webadm service via the service webadm restart command. Make sure the Connected LDAP server message does not have an error (see Figure 7). Figure 7 Restarting the WebADM Service 7. Using a web browser, navigate to the IP address of the RCDevs appliance to log in to the WebADM OpenOTP configuration platform using HTTPS to finish the integration of OpenOTP into the Windows server. Note that during this commissioning phase, the user will need to log in via UID mode AuthorName, @address
14 Two%Factor(2FA)AuthenticationusingOpenOTP 1 3 (see Figure 8), where the user enters the full DN of your AD Administrative user (in the case of the author, cn=administrator,cn=users,dc=otp,dc=home). Figure 8 WebADM UID Login Process 8. After logging in as a super admin, WebADM will prompt the user to run the Setup Wizard (see Figure 9). The Setup Wizard will guide the user to fully integrate OpenOTP into AD, which will both extend the schema for the AD server and push in new WebADM-specific attributes. NOTE: There is a mode for integrating OpenOTP into the AD server that will work without extending the LDAP schema. To see more about this process, see the WebADM Installation Manual Section 5.4, Setup the LDAP Directory. Also note that the Domain Controller the user connects to using OpenOTP does need to be the Schema Master for the Domain. AuthorName, @address
15 Two%Factor(2FA)AuthenticationusingOpenOTP 1 4 Figure 9 WebADM Setup Wizard 9. Click Run Setup Wizard. On the next screen, select Setup LDAP schema and Create default containers and objects. For both of these functions, WebADM should respond with Ok messages (see Figure 10). AuthorName, @address
16 Two%Factor(2FA)AuthenticationusingOpenOTP 1 5 Figure 10 WebADM Setup Wizard Successful 10. After this process is complete, click Logout. The user should now be able to log into the WebADM instance using Administrator (the Domain Admins account) without needing to enter the full user DN (see Figure 11). Figure 11 WebADM Normal Login Mode 11. Finally, on the WebADM dashboard under Admin tab, select Local Domains, and click the Default link. Change the Object Name to the name of the domain (otp.home in the author s case) and select Rename (see Figure 12). AuthorName, @address
17 Two%Factor(2FA)AuthenticationusingOpenOTP 1 6 Figure 12 Rename WebADM Domain Object Name Your OpenOTP instance should now be integrated into the AD server Troubleshooting If there are problems logging into WebADM after configuring /opt/webadm/conf/webadm.conf, the following are some tips: Turn on Syslog logging in /opt/webadm/conf/webadm and use the command tail f /var/log/messages to see messages sent by the WebADM service in real time. Log into WebADM in UID mode using the full DN of a member of the groups listed in the super_admins section of webadm.conf. For the Domain Admins, this will be cn=administrator,cn=users,dc=otp,dc=home, or for the IT_Supervisors this will be cn=bob Supervisor,cn=Users,dc=otp,dc=home Adding Users and Groups to the OpenOTP Authentication Server Here user accounts and centralized user groups (found in Table 2) will be activated so that the OpenOTP Authentication Server can recognize them. 1. From the WebADM OpenOTP dashboard, select the Admin tab, and then go to Local Domains Configure. Click the checkbox (see Figure 13) by AuthorName, @address
18 Two%Factor(2FA)AuthenticationusingOpenOTP 1 7 Group Search Base and type in domain root (in the author s case, dc=otp,dc=home). Figure 13 Editing WebADM Group Search Base 2. Next, click the checkbox by Allowed Groups. Here, the groups of the wanted members who are going to be able to authenticate using multifactor credentials (as seen in Table 2) need to be selected. To do this, click the Select option by the Allowed Groups box and select the necessary user groups from the directory navigation panel on the left side of interface (see Figure 14). When finished, click Apply. AuthorName, @address
19 Two%Factor(2FA)AuthenticationusingOpenOTP 1 8 Figure 14 Selecting Allowed Groups in the WedADM Interface 3. Next, the users whom we wish to be able to utilize 2FA must be activated. To do this, select each user (Bob Supervisor, Ada Engineer, and Ted Technician) from the directory navigation panel on the left side of the interface and click Activate Now (see Figure 15). Figure 15 Activating a User in WebADM 4. WebADM will prompt addition of some additional attributes to the user. Click Proceed then Extend Object to add the default WebADM attributes to the AuthorName, @address
20 Two%Factor(2FA)AuthenticationusingOpenOTP 1 9 user account in Active Directory. Note that each user activated within WebADM will count against the bucket of 40 free accounts allowed to use the OpenOTP Authentication Server (see Figure 16). Figure 16 Activated OpenOTP Authentication Server User By now, various users and groups have been activated to be able to take advantage of the OpenOTP authentication server Testing 2FA with the OpenOTP Authentication Server In this section, the OpenOTP is enabled to service itself and create TOTPs for the test users. NOTE: This next section requires the Google Authentication smartphone application. 1. From the WebADM dashboard, select the Admin tab, then WebApps & WebSrvs, From the list of Web Services, click REGISTER under the OTP & U2F Authentication Server option (see Figure 17). AuthorName, @address
21 Two%Factor(2FA)AuthenticationusingOpenOTP 2 0 Figure 17 Register the OpenOTP Server 2. After the OTP & U2F Authentication Server successfully registers, select CONFIGURE on the same service. The Web Service Settings page for the OTP authentication server will provide you with a myriad of options. For now, only change the one (optional) parameter, the Service Name (see Figure 18), will be changed. Click the box beside this option and enter the domain name (in the author s case otp.home). When finished, click Apply. Figure 18 OTP Service Name 3. Next, add a TOTP configuration for each of our test users. To begin, select the desired user to whom a token from the directory navigation panel should be added. Under the selected user s Application Actions should be the OTP & U2F Authentication Server option (see Figure 19). AuthorName, @address
22 Two%Factor(2FA)AuthenticationusingOpenOTP 2 1 Figure 19 WebADM User Application Action 4. Click the OTP & U2F Authentication Server option. On the proceeding screen, there will be a number of options available for the user account (see Figure 20). Select Register / Unregister OTP Tokens. Figure 20 Register WebADM User Token 5. On the Register / Unregister OTP Token page, select the radio option I use a QCode-based Authenticator (Time-based) or I use Google Authenticator (if this option exists). WebADM will then present a QR code (see Figure 21). AuthorName, @address
23 Two%Factor(2FA)AuthenticationusingOpenOTP 2 2 Figure 21 WebADM User OTP Token Registration NOTE: A variety of token types for the user from this menu can be enabled, including the option to enable a pin code for the user to use with the TOTP. This would enable 2FA without the need to enter the user s LDAP password, similar to how RSA multifactor tokens function. This feature is outside of the scope here. 6. Using the Google Authenticator application on a smartphone, press the + button and then select Scan barcode (see Figure 22). AuthorName, @address
24 Two%Factor(2FA)AuthenticationusingOpenOTP 2 3 Figure 22 Adding a Token to Google Authenticator 7. After scanning the barcode, Google Authenticator should now display the TOTP token (see Figure 23) for the user bob (Bob Supervisor). Click Register on the WebADM user token registration page to finalize registering the TOTP for the user. Figure 23 TOTP for User Bob Supervisor 8. To test the TOTP for the user, navigate back to the user account from the user directory navigation panel, select OTP & U2F Authentication Server from the list of Application Actions, and select Test User Login. This will bring you to a page where you can test the authentication for the user account using an LDAP name and password (see Figure 24). To test the user s AuthorName, @address
25 Two%Factor(2FA)AuthenticationusingOpenOTP 2 4 authentication, enter the LDAP password and current TOTP for the user (from the Google Authenticator application). Figure 24 Testing the WebADM User TOTP and LDAP Authentication 9. WebADM should display an authentication success screen. If the TOTP and LDAP authentication fail to successfully authenticate, see the Troubleshooting section below for common troubleshooting steps. 10. Repeat the steps 3-9 for the Ted Technician and Ada Engineer users. Now, three different TOTP tokens on Google Authenticator application (see Figure 25) should be present. AuthorName, @address
26 Two%Factor(2FA)AuthenticationusingOpenOTP 2 5 Figure 25 Bob, Ted, and Ada TOTP Tokens NOTE: You can have a user self-configure their own TOTP using Google Authenticator by activating other WebADM services that are available. For example, the User Self-Service Desk application allows users to configure their own personal information (phone numbers, addresses, etc.), LDAP password, and OTP tokens without requiring direct guidance from an administrator Troubleshooting If you have problems authenticating using the test users LDAP and TOTP password combinations, please see the following tips: Ensure the LDAP password for the user is correct. Ensure that you have successfully registered the TOTP token before attempting to use it. Ensure the RCDevs appliance is getting accurate time via NTP. Turn on Syslog logging in /opt/webadm/conf/webadm.conf and use the command tail f /var/log/messages to see messages sent by the WebADM service in real time. You may also view logs directly from the WebADM service by using the command tail /opt/webadm/logs/soapd.log (see Figure 26). AuthorName, @address
27 Two%Factor(2FA)AuthenticationusingOpenOTP 2 6 Figure 26 WebADM soapd.log File 3.5. Testing 2FA with OpenOTP RADIUS Bridge Here we will test 2FA for one or more test users using the OpenOTP RADIUS Bridge service. Please ensure you have 2FA using LDAP password and Google Authenticator TOTP working successfully in the previous section before attempting to perform the steps in this section. 1. From the RCDevs appliance command-line, navigate to /opt/radiusd/conf. Use a text editor to open the file clients.conf (see Figure 27). This file specifies what authentication clients are allowed to access the OpenOTP RADIUS Bridge. By default, it allows all authentication clients to connect using a RADIUS secret of testing123. The author changed this secret to Asdf123$. Figure 27 RADIUS Bridge clients.conf File AuthorName, @address
28 Two%Factor(2FA)AuthenticationusingOpenOTP Finish editing the file and saving the changes, and then restart the radius service using the command service radiusd restart. 3. Next, navigate to /opt/radiusd/bin/. In this directory is a file called radtest that will allow us to test authenticating to the OpenOTP RADIUS Bridge. To use radtest, you may call the program using the arguments: radtest'<user>'<ip'address'of'radius'server>:<radius'server'port>'<radius'shared'secret>' In the case of the author, the command to test the Ada Engineer user s authentication is:./radtest)ada) :1812)asdf123\$) ) Note that on systems using the bash shell, the $ symbol is special, and therefore must be escaped using the backslash \ symbol (see Figure 28). Figure 28 Using radtest 4. At the prompts, enter the password and then the TOTP token for the user Ada Engineer. If the password and TOTP token for Ada Engineer are good, then you should see a success message (see Figure 29). Figure 29 RADIUS Authentication Success Message 5. Repeat steps 3-4 for Bob Supervisor and Ted Technician. You should receive success messages for each. If not, please see the troubleshooting steps and the end of this section Troubleshooting If you have problems authenticating to the OpenOTP RADIUS Bridge using the radtest client, please see the following tips: AuthorName, @address
29 Two%Factor(2FA)AuthenticationusingOpenOTP 2 8 Ensure the LDAP password and TOTP token for the user are correct, and that you have registered the TOTP token for the user. Ensure the RCDevs appliance is getting accurate time via NTP. You may download and install tcpdump, then using the command tcpdump i eth0 port 1812 vvv to show incoming RADIUS packet requests and responses in real time. You may view /opt/webadm/logs/soapd.log for OpenOTP Authentication Server debug information, or /opt/radiusd/logs/radiusd.log (see Figure 30) for /opt/radiusd/logs/requests.log for or debug information from the radiusd service. Figure 30 radiusd.log File 4. Integrating an OpenVPN Access Server with OpenOTP To configure an OpenVPN Access Server (AS) authentication client that with RADIUS protocol, please follow the steps outlined in this section. NOTE: the author uses an OpenVPN AS server virtual instance downloaded from the openvpn official website. The IP address of the author s OpenVPN AS appliance is Navigate to your OpenVPN AS instance web graphical user interface (GUI) and select User Authentication. From this window, select RADIUS as the user authentication method (see Figure 31). Be sure to click Save Settings. AuthorName, @address
30 Two%Factor(2FA)AuthenticationusingOpenOTP 2 9 Figure 31 OpenVPN AS User Authentication Selection 2. Next, navigate to Authentication RADIUS and enter the IP address, port, and shared secret for the OpenOTP RADIUS Bridge. Select PAP as the RADIUS authentication method like in Figure 32 below. Be sure to click Save Settings after entering your configuration settings. Figure 32 OpenVPN AS RADIUS Settings 3. You may test access by attempting to authenticate as one of our three test users. Log out of the web GUI, then attempt to login as the Bob Supervisor AuthorName, @address
31 Two%Factor(2FA)AuthenticationusingOpenOTP 3 0 (see Figure 33) test user (see Table 3 for our list of test users). Click Go to attempt the log in. Figure 33 OpenVPN AS Web GUI Login 4. If you have successfully configured the RADIUS settings in the OpenVPN AS interface, the web page should greet you with a challenge screen asking the user to enter the token (see Figure 34). Figure 34 OpenVPN AS Challenge Screen 5. Enter the TOTP code for the Bob user as seen on the Google Authenticator application (see Figure 35), and click Continue. AuthorName, @address
32 Two%Factor(2FA)AuthenticationusingOpenOTP 3 1 Figure 35 Google Authenticator Token for Bob 6. If the Bob Supervisor user has logged in successfully, then OpenVPN AS should greet you with the login selections page (see Figure 36). Figure 36 OpenVPN AS Successful Login Screen 7. You may perform this same challenge-based authentication process for the OpenVPN AS login using the official OpenVPN AS client application. When authenticating to the OpenVPN AS using the AS client application, enter username and AD password as usual (see Figure 37). AuthorName, @address
33 Two%Factor(2FA)AuthenticationusingOpenOTP 3 2 Figure 37 OpenVPN AS Client Application 8. You should receive a challenge message back from the OpenVPN AS instance (see Figure 38). Here the author entered the TOTP code off the Google Authenticator application for user Ted. Figure 38 OpenVPN AS Client Challenge NOTE: The official OpenVPN AS client does support challenge mode. However, the unofficial OpenVPN client (currently as of April 20, 2015) does not support challenge mode, and will fail the authentication session if it receives a challenge from the OpenVPN AS instance. 9. Similarly, the OpenVPN Connect application for smartphones should support challenge mode. Once you have imported the OpenVPN AS connection profile into the OpenVPN Connect application, you will be able to authenticate using username and AD password (see Figure 39). AuthorName, @address
34 Two%Factor(2FA)AuthenticationusingOpenOTP 3 3 Figure 39 OpenVPN Smartphone Application 10. The OpenVPN AS instance will send back a challenge from the OpenOTP Authentication Server. The OpenVPN application will be display the challenge on the application screen (see Figure 40). attributes [4]. Figure 40 OpenVPN Smartphone App Challenge NOTE: OpenVPN AS does support additional user authorizations using RADIUS Troubleshooting If you are having trouble authenticating to OpenOTP via the OpenVPN AS instance, please see following troubleshooting steps. Ensure the LDAP password and TOTP token for the user are correct, and that you have registered the TOTP token for the user. Ensure the RCDevs appliance is getting accurate time via NTP. AuthorName, @address
35 Two%Factor(2FA)AuthenticationusingOpenOTP 3 4 You may view /opt/webadm/logs/soapd.log for OpenOTP Authentication Server debug information. You may view /opt/radiusd/logs/radiusd.log or /opt/radiusd/logs/requests.log for or debug information from the radiusd service. You may download and install tcpdump, then using the command tcpdump i eth0 port 1812 vvv to show incoming RADIUS packet requests and responses in real time. If you are having trouble authenticating to the OpenVPN AS instance, please ensure that you are using an OpenVPN AS client that supports challenge mode. If you are having problems remaining connected to the OpenVPN AS instance, please ensure that you have configured the reneg-sec 0 parameter on both the OpenVPN server and client profiles. This will prevent the OpenVPN server from attempting to renegotiate the, which forces the user to re-authenticate to the OpenOTP Authentication Server using a username/password + TOTP code. 5. Conclusion By now the reader should have an understanding of the effort involved with integrating 2FA into an existing user directory, and the basics for configuring various authentication client devices to interact with the OpenOTP Authentication Server. Administrators can configure most any device that supports RADIUS for user-based authentication purposes to allow users to use their AD username/password with Google Authenticator token. Solutions such as OpenOTP are inexpensive, and are easy to configure and maintain (especially for smaller organizations). AuthorName, @address
36 Two%Factor(2FA)AuthenticationusingOpenOTP 3 5 References Davis,J.(2015,June).Two$Factor$Auth$(2FA).Retrievedfrom Davis,J.(2015,June).Two$Factor$Auth$(2FA)$Providers.RetrievedfromTwoFactor Auth: IETF.(2005,December).HOTP:$An$HMAC<Based$One<Time$Password$Algorithm. RetrievedfromRFC4226: IETF.(2011,June).OCRA:$OATH$Challenge<Response$Algorithm.RetrievedfromRFC 6287: IETF.(2011,May).TOTP:$Time<Based$One<Time$Password$Algorithm.Retrievedfrom RFC6238: NERC.(2014).CIP<005<5$ $Cyber$Security$ $Electronic$Security$Perimeter(s). Retrievedfromwww.nerc.com: 005%5&title=Cyber%20Security%20% %20Electronic%20Security%20Perimeter(s) OpenVPN.(n.d.).Documentation.RetrievedApril20,2015,from access%server%post%auth%script.html Sophos.(2014,January).The$Power$of$two$<$All$you$need$to$know$about$two<factor$ authentication.retrievedfromnakedsecurity: need%to%know%about%2fa/ Sophos.(2014,November).Two<factor$authentication:$Understanding$the$options. RetrievedfromNakedSecurity: options%2fa/ Verizon.(2015).Data$Breach$Investigations$Report.VerizonEnterpriseSolutions. Retrievedfromwww.verizonenterprise.com/BDIR/ AuthorName, @address
37 Two%Factor(2FA)AuthenticationusingOpenOTP 3 6 Appendix A How OpenOTP Works OpenOTP requires three pieces to fully authenticate a user using an OTP and password: the OpenOTP RADIUS Bridge, the OpenOTP Authentication Server, and a User Directory Service. RADIUS Bridge: Remote Authentication Dial-In User Service (RADIUS) protocol is ubiquitous and interoperable with most all authentication clients and systems. The RADIUS protocol is simple, easy to configure, and extremely flexible. OpenOTP s RADIUS Bridge, relies on open-source FreeRADIUS 2, and is essentially a plug-in that allows most authentication clients to take full advantage of OpenOTP s 2FA capabilities. OpenOTP Authentication Server: the OpenOTP Authentication Server ensures the authenticity of the one-time passcodes and other passwords the user enters. OpenOTP Authentication Server also handles user and group membership, and acts as the brain that decides how to authenticated users and what authorizations on the authentication client they may have. User Directory Service: this is the service that stores user information. The most common user directory service is Microsoft Active Directory (AD), which makes use of Lightweight Directory Access Protocol (LDAP) as its interface language. AD stores users along with group memberships and other identifying attributes. OpenOTP stores OTP information about itself and users/groups in a directory service (in an encrypted form). OpenOTP comes with its own open-source OpenLDAP server. An administrator can configure OpenOTP to connect to non-ad based LDAP servers, such as OpenLDAPbased directory services. OpenOTP requires WebADM Web-Based Directory Administrator for configuring OpenOTP Authentication Server. Most configuration steps listed later will involve manipulating the OpenOTP environment through WebADM. In addition to RADIUS, OpenOTP supports SOAP authentication requests directly from web authentication clients. This allows additional flexibility for administrators to integrate 2FA into web applications and internal business websites. AuthorName, @address
38 Two%Factor(2FA)AuthenticationusingOpenOTP 3 7 OpenOTP also has a number of WebApps that administrators may be use for easier management of user data, including a user help desk, a token services desk, and so on. These services help ease the management overhead by allowing users to configure their own tokens and reset their own passwords without direct intervention. Here, we will be using Microsoft Active Directory as the user directory service. OpenOTP Authentication Server uses the LDAP protocol to perform lookup and administrative functions for users/groups in AD. Accessing(User OpenOTP*System Authentication Client RADIUS Protocol OpenOTP* RADIUS Bridge OpenOTP* Authentication* Server LDAP Microsoft *Active*Directory Figure 41 OpenOTP Authentication Architecture with Microsoft AD AuthorName, @address
39 Two%Factor(2FA)AuthenticationusingOpenOTP 3 8 Appendix B OpenOTP Virtual Image Initial Configuration for VMware ESXi This appendix expands the initial configuration steps for the RCDevs virtual appliance, including configuring the server hostname, IP address, changing the root password, and ensuring the virtual appliance can receive accurate time via Network Time Protocol requires (NTP; critical for OATH TOTP accuracy). 5. Download the OpenOTP Virtual Appliance (OpenLDAP OVF) from Figure 42 RCDevs Virtual Appliance Download 6. On the ESXi, click File Deploy OVF Template, and select the unzipped RCVM-OpenLDAP\RCVM-OpenLDAP.ovf that was just downloaded and click Next. At this point you may receive a warning that Red Hat Enterprise Linux 6 is not supported. Click Yes to continue. 7. Choose the name for the virtual appliance, disk format, and networks for the RCDevs virtual appliance. Please ensure your network you select for the RCDevs image is reachable by the Windows Server and your authentication clients. 8. Finish the deploying the RCDevs virtual appliance and power on the system (default Memory and CPU settings should be fine for testing). 9. During the initial boot, the Linux system will prompt you to input the server Fully Qualified Domain Name (FQDN), to enter an organizational name, to enable WebADM to be started automatically, to register the WebADM logrotate script, and to generate a WebADM secret key (the key encrypts WebADM information in the user directory service). The author used AuthorName, @address
40 Two%Factor(2FA)AuthenticationusingOpenOTP 3 9 openotp.otp.home as the FQDN, Self as the organizational name, and yes to all else (see Figure 43). Figure 43 RCDevs Appliance Initial Configuration 10. If there is a DHCP server on the network the RCDevs appliance connects to, you should see information about the IP address of your network. Additionally, the RCDevs appliance will list the default root account credentials (root / password, see Figure 44). If there is no IP address assigned to the RCDevs appliance, you may assign one manually. Figure 44 RCDevs Appliance Initial IP and User Information 11. From a web browser, navigate to the IP address of the RCDevs appliance to log in to the WebADM configuration platform using HTTPS on port (see Figure 45) to finish the initial configuration ( in the case of the author). You may use the default root credentials to log in (root / password). AuthorName, @address
41 Two%Factor(2FA)AuthenticationusingOpenOTP 4 0 Figure 45 Login to WebADM Platform 12. From the WebADM dashboard, we will set the root password, the network IP address, and the time service on the server. To change the root password, navigate to System Change Passwords root and set a new root password. The author uses root password Asdf123$ for testing. 13. To change the appliance IP address and add a default gateway, navigate to Networking Network Configuration Network Interfaces. The author uses a static IPv4 configuration with an IP address of and netmask (see Figure 46), and a default gateway of Figure 46 WebADM Network Configuration AuthorName, @address
42 Two%Factor(2FA)AuthenticationusingOpenOTP Next, you may add a DNS server (either internal or external) by navigating to Networking Network Configuration Hostname and DNS Client. The author uses the hostname openotp.otp.home, and a DNS server of (the Windows Domain Server), and search domain of otp.home. 15. To set the local time zone and set NTP settings, navigate to Hardware System Time. You may set the time zone from the Change time zone tab (Pacific in the author s case) and set the NTP settings from Time server sync. The author recommends synchronizing when the appliance starts, and also synchronizing on schedule (see Figure 47). Please note that you may need to reboot the appliance before you are able to get accurate time via NTP. Figure 47 WebADM Time Sync Settings 16. After initial configuration, please ensure you can ping you Windows AD server at its hostname (in the author s case adds.otp.home) before continuing on to the next section (see Figure 48). AuthorName, @address
43 Two%Factor(2FA)AuthenticationusingOpenOTP 4 2 Figure 48 Pinging Windows AD from RCDevs Appliance AuthorName, @address
44 Last Updated: June 29th, 2016 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS London Summer 2016 London, GB Jul 09, Jul 18, 2016 Live Event SANS Rocky Mountain 2016 Denver, COUS Jul 11, Jul 16, 2016 Live Event SANS Minneapolis 2016 Minneapolis, MNUS Jul 18, Jul 23, 2016 Live Event SANS San Antonio 2016 San Antonio, TXUS Jul 18, Jul 23, 2016 Live Event SANS Delhi 2016 Delhi, IN Jul 18, Jul 30, 2016 Live Event SANS San Jose 2016 San Jose, CAUS Jul 25, Jul 30, 2016 Live Event Industrial Control Systems Security Training Houston, TXUS Jul 25, Jul 30, 2016 Live Event SANS Boston 2016 Boston, MAUS Aug 01, Aug 06, 2016 Live Event Security Awareness Summit & Training San Francisco, CAUS Aug 01, Aug 10, 2016 Live Event SANS Vienna Vienna, AT Aug 01, Aug 06, 2016 Live Event SANS Dallas 2016 Dallas, TXUS Aug 08, Aug 13, 2016 Live Event SANS Portland 2016 Portland, ORUS Aug 08, Aug 13, 2016 Live Event DEV531: Defending Mobile Apps San Francisco, CAUS Aug 08, Aug 09, 2016 Live Event DEV534: Secure DevOps San Francisco, CAUS Aug 10, Aug 11, 2016 Live Event Data Breach Summit Chicago, ILUS Aug 18, Aug 18, 2016 Live Event SANS Virginia Beach 2016 Virginia Beach, VAUS Aug 22, Sep 02, 2016 Live Event SANS Alaska 2016 Anchorage, AKUS Aug 22, Aug 27, 2016 Live Event SANS Bangalore 2016 Bangalore, IN Aug 22, Sep 03, 2016 Live Event SANS Chicago 2016 Chicago, ILUS Aug 22, Aug 27, 2016 Live Event SANS Adelaide 2016 Adelaide, AU Sep 05, Sep 10, 2016 Live Event SANS Brussels Autumn 2016 Brussels, BE Sep 05, Sep 10, 2016 Live Event SANS Northern Virginia - Crystal City 2016 Crystal City, VAUS Sep 06, Sep 11, 2016 Live Event SANS Network Security 2016 Las Vegas, NVUS Sep 10, Sep 19, 2016 Live Event SANS London Autumn London, GB Sep 19, Sep 24, 2016 Live Event SANS ICS London 2016 London, GB Sep 19, Sep 25, 2016 Live Event Security Leadership Summit Dallas, TXUS Sep 27, Oct 04, 2016 Live Event MGT433 at SANS London Summer 2016 OnlineGB Jul 07, Jul 08, 2016 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced
How To Secure Your Small To Medium Size Microsoft Based Network: A Generic Case Study
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. How
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
BaseManager & BACnet Manager VM Server Configuration Guide
BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
Device LinkUP + Desktop LP Guide RDP
Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Security Awareness Training and Privacy
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
Setup Cisco Call Manager on VMware
created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while
Product Version 1.0 Document Version 1.0-B
VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
OnCommand Performance Manager 2.0
OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Common Services Platform Collector (CSPC) Self-Service - Getting Started Guide. November 2015
Common Services Platform Collector (CSPC) Self-Service - Getting Started Guide November 2015 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
IronKey Enterprise Server 6.1 Quick Start Guide
IronKey Enterprise Server 6.1 Quick Start Guide Last Updated September 2015 System Requirements Requirement Description Database Microsoft SQL Server 2005, Microsoft SQL Server 2008, or Microsoft SQL Server
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
GreenRADIUS Virtual Appliance
GreenRADIUS Virtual Appliance Configuration and Administration Guide Software version: 1.0 Document version: 1.1 September 1, 2014 Introduction Disclaimer Green Rocket Security is aprovider of online and
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
VCCC Appliance VMware Server Installation Guide
VCCC Appliance VMware Server Installation Guide Content Preface... 4 System Requirements... 4 Installation Procedure... 4 CCC Virtual Machine Installation... 5 CCC Virtual Machine Management... 12 Resource
Optimization in a Secure Windows Environment
WHITE PAPER Optimization in a Secure Windows Environment A guide to the preparation, configuration and troubleshooting of Riverbed Steelhead appliances for Signed SMB and Encrypted MAPI September 2013
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
User Manual. User Manual for Version 4.4.0.8
User Manual User Manual for Version 4.4.0.8 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
Thinspace deskcloud. Quick Start Guide
Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
vcenter Chargeback User s Guide vcenter Chargeback 1.0 EN-000186-00
vcenter Chargeback 1.0 EN-000186-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Introduction to Business Continuity Planning
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Introduction
Security Analytics Virtual Appliance
Security Analytics Virtual Appliance Installation Guide for VMware 19 March 2015 This document is intended to help you use the web interface to configure your Security Analytics Virtual Appliance to perform
HyTrust Appliance Administration Guide
HyTrust Appliance Administration Guide Version 3.0.2 October, 2012 HyTrust Appliance Administration Guide Copyright 2009-2012 HyTrust Inc. All Rights Reserved. HyTrust, Virtualization Under Control and
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
SSH to Ubuntu Server Authenticating Users Using SecurAccess Server by SecurEnvoy
SSH to Ubuntu Server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading RG7 4AB Ryan Sheridan
Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy
Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading RG7
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008
Integration Guide Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide: Microsoft Active Directory Rights Management Services (AD RMS) Imprint
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Yubico Authenticator User's Guide
Yubico Authenticator User's Guide YubiKeys with desktop computers and NFCenabled Android smartphones Yubico Authenticator User's Guide 2016 Yubico. All rights reserved. Page 1 of 23 Copyright 2016 Yubico
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
Virtual Server Installation Manual April 8, 2014 Version 1.8
Virtual Server Installation Manual April 8, 2014 Version 1.8 Department of Health and Human Services Administration for Children and Families Office of Child Support Enforcement REVISION HISTORY Version
Netwrix Auditor. Virtual Appliance Deployment Guide. Version: 8.0 8/1/2016
Netwrix Auditor Virtual Appliance Deployment Guide Version: 8.0 8/1/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15 AKIPS Pty Ltd November 12, 2015 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of
Virtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
YubiRADIUS Virtual Appliance. Configuration and Administration Guide Software version: 3.6.0 Document version: 1.0
YubiRADIUS Virtual Appliance Configuration and Administration Guide Software version: 3.6.0 Document version: 1.0 December 14, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH [email protected] 2 Introduction Requirements
Introduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET
If you re not using VMware vsphere Client 4.0, your screens may vary. GX-V VIRTUAL GMS SERVER VMware vsphere / vsphere Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Comply with the GX-V Host
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
