Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks



Similar documents
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Defender Token Deployment System Quick Start Guide

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Check Point FW-1/VPN-1 NG/FP3

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

ESET SECURE AUTHENTICATION. Check Point Software SSL VPN Integration Guide

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

NetIQ Advanced Authentication Framework

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

HOTPin Integration Guide: DirectAccess

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

DIGIPASS Authentication for Check Point Connectra

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Two-Factor Authentication

Self-Service Portal Registering, downloading & activating a soft token

Two-Factor Authentication

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

EMR Link Server Interface Installation

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Remote Access End User Reference Guide for SHC Portal Access

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

Installing Logos SSL Certificates on Mobile Devices

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin Using the Legal Vault

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

External Authentication with Citrix Access Gateway Advanced Edition

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Mobile Iron User Guide

MultiSite Manager. Setup Guide

DIGIPASS Authentication for Check Point Security Gateways

OneLogin Integration User Guide

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

Exchange ActiveSync (EAS)

2-FACTOR AUTHENTICATION WITH

SchoolBooking SSO Integration Guide

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Electronic Questionnaires for Investigations Processing (e-qip)

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

MultiSite Manager. Setup Guide

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Defender EAP Agent Installation and Configuration Guide

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

Allianz Global Investors Remote Access Guide

Administering Jive Mobile Apps

Test Case 3 Active Directory Integration

Configuration Guide. BES12 Cloud

Configuring Global Protect SSL VPN with a user-defined port

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Sophos Mobile Control User guide for Apple ios. Product version: 4

Configuring an Client to Connect to CASS Mail Servers

Yale Software Library

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

MDM User Guide June 2012

How To - Implement Clientless Single Sign On Authentication with Active Directory

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Business mail 1 MS OUTLOOK CONFIGURATION... 2

MCBDirect Corporate Logging on using a Soft Token

University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide

Enterprise Server Setup Guide

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Enrollment Process for Android Devices

Two Factor Authentication - USER GUIDE

Two Factor Authentication in SonicOS

Install and End User Reference Guide for Direct Access to Citrix Applications

IIS, FTP Server and Windows

A Guide to New Features in Propalms OneGate 4.0

Secure Parliamentary Remote Access (SPRA)

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Savvius Insight Initial Configuration

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Sophos UTM. Remote Access via SSL Configuring Remote Client

Authentication Node Configuration. WatchGuard XTM

Device LinkUP + Desktop LP Guide RDP

Configuring the Watchguard Edge for RADIUS authentication

Remote Desktop Web Access. Using Remote Desktop Web Access

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

University of Central Florida UCF VPN User Guide UCF Service Desk

Cisco ASA Authentication QUICKStart Guide

Cisco AnyConnect VPN for: Windows 8

How to Configure Active Directory based User Authentication

Drobo How-To Guide Drobo Apps - Configuring Copy Replication

NAS 323 Using Your NAS as a VPN Server

Using the Remote Desktop Portal

Abila Nonprofit Online. Connection Guide

Preparing for GO!Enterprise MDM On-Demand Service

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Kaspersky Lab Mobile Device Management Deployment Guide

Active Directory Integration for Greentree

Transcription:

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix Networks APAC Integration completed by Kimberley Wong Kwan Lun info@celestix.com 3125 Skyway Court, Fremont, California, 94539, USA +1 510 668 0700 30 Queens Road, Reading, RG1 4AU, United Kingdom +44 (0)118 959 6198 1 Changi North Street 1, #02-02, Singapore 498789 +65 6781 0700 klun@celestix.com

This document outlines the steps required to integrate the Check Point Firewall R75.40 with Celestix HOTPin two-factor authentication. The following steps are detailed within this guide: Adding users Enabling user self provisioning Configuring RADIUS integration in Check Point Adding Check Point as a RADIUS client in Celestix HOTPin Testing the login process Steps to Configure Standalone Celestix HOTPin v3.5 Prerequisites This document assumes you have followed the steps in the HOTPin Quick Start Guide, and either installed HOTPin Server v3.5, or configured your HSA Appliance ready for use. If you haven't already done so, please refer to the Quick Start Guide to complete this before proceeding. The Quick Start Guide can be found here: http://www.celestix.com/hotpin-tl.html Step 1: Launch HOTPin Administration Launch the HOTPin Management GUI using the shortcut icon on the desktop. This will load the default web browser. HOTPin ships with a default certificate to provide HTTPS security. The browser will display a certificate security warning, this is normal, choose Continue to this website. Microsoft Windows User Access Control will prompt for a username and password. Enter the administrator credentials. NOTE - depending on the web browser and the default settings, the message might be slightly different. Step 2: Adding users To add users go to HOTPin> Users. Click on New. Complete the user settings for an end user. Token Key: (none) Client Software (default) PIN: User will create PIN For production and full installation we recommend you make use of the Active Directory import feature within HOTPin, and then enable Active Directory Synchronization. This can be achieved easily and simply through the main Management GUI.

Step 3: Enable user provisioning website From the main Management GUI, go to User Website and tick the Enable user website box. This will allow your users to provision a variety of tokens by accessing a user provisioning portal, but it is important to configure this in advance of giving access. Once enabled, default access to the site is: https://(appliancehostname IP):8098/hotpin/ This site is not enabled by default; it must be turned on by Administrators. At this point, the basic configuration for Celestix HOTPin is complete, and we'll return to the User Provisioning Website later. Configure RADIUS integration in Check Point Step 4: Add a RADIUS workstation From the Check Point SmartDashboard, Under Network Objects > Nodes > Host. Under General Properties, complete the Host Node properties: Name: HOTPin. IP Address: The IP address of the HOTPin server. Comment: HOTPin RADIUS. Click OK. Step 5: Configure a RADIUS port The default setting is RADIUS on port 1645. Check Point Firewall needs to be configured to use port 1812 so it can exchange RADIUS packets to the HOTPin server. Service port 1812 is defined as NEW-RADIUS in SmartDashboard.

Step 6: Add an authentication server Under Servers and OPSEC Applications > New > RADIUS, configure the following: Name: Enter the name of the HOTPin server. Comment: Add a comment. Host: This should be the Host Node you defined in step 4. Service: Choose NEW-RADIUS. Shared Secret: Enter the HOTPin shared secret. Version: Select either RADIUS Ver. 1.0 Compatible or RADIUS Ver. 2.0 Compatible. Protocol: Select either MS-CHAP or PAP. Click OK. The server you created will appear under Servers and OPSEC Applications > Servers > RADIUS. Step 7: Add a user authentication group Under Users and Administrators > Users, select the users you want to use HOTPin and enable RADIUS: Authentication > Authenticate Scheme: RADIUS. Select a RADIUS Server or Group of Server: Select the RADIUS server you created in step 6. Define the group that will be used to reference all users being authenticated to HOTPin: Go to Users and Administrators > User Groups > New Group. Name: Add a name Comment: Add a comment Available Members: Select users. Click OK. Step 8: Add firewall authentication rule Add a rule to allow RADIUS traffic (port 1812) to communicate with the HOTPin server. Configure the rule set as per your network requirements. Below is an example rule.

Step 9: Enabling RADIUS client on Celestix HOTPin Go to HOTPin > NPS Radius > RADIUS clients > New. Tick Enable this RADIUS client. Enter name and IP address of the Check Point box. Apply shared secret. This completes the integration process. Next we ll test the login process. Testing the login process Celestix HOTPin supports the following platforms for generating a one-time password. Generate a one-time password using any of the client software below. Microsoft Windows Android devices MacOS Windows phone devices ios devices (iphones and ipads) Blackberry devices. Step 10: Log on to end user provisioning website. Go to User Website and click on the link for example this URL https://(appliancehostname IP):8098/hotpin/ After you have downloaded the HOTPin app to your Smart Device, log on to the end user provisioning site with your Active Directory credentials.

Step 11: Create Token Key Go to Token Key > QR Code. Enter QR code passphrase: Create a passphrase of at least 6 characters. Confirm passphrase. Code size: Select the image size. Generate QR Code: Click to create the image. Open the HOTPin app on your smart device. Choose Import from QR Code. Scan the QR Code. Enter the passphrase. Click on Import (IPhone) or OK with Android). You are now able to generate a one time password and this completes the one time device provisioning process. Log on back to the user provisioning website and choose HOTPin to authenticate. Further Help For further help, go to http://www.celestix.com