Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note



Similar documents
RSA Two Factor Authentication

Microsoft SharePoint

RSA Two Factor Authentication. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

Port Following. Port Following. Feature Description

Log Insight Manager. Deployment Guide

Virtual LoadMaster for Microsoft Hyper-V

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

SDN Adaptive Load Balancing. Feature Description

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

Remote Desktop Services

Virtual LoadMaster for VMware ESX, ESXi using vsphere

Remote Desktop Services

SSL Accelerated Services. SSL Accelerated Services for the LM5305-FIPS. Feature Description

Windows Server 2012 R2 DirectAccess

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Boost Libraries Boost Software License Version 1.0

Apache Software Foundation This product includes software developed by the Apache Software Foundation (

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1)

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

8.7. Resource Kit User Guide

SafeNet Authentication Service

SafeNet Authentication Service

NetVault : SmartDisk v1.0.1 Release Notes Contents

Integrated Citrix Servers

Self Help Guides. Create a New User in a Domain

Installation Guide Supplement

Norton Online Backup Third Party Attribution

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1

BMC Remedy Action Request System 7.0 Open Source License Agreements

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

HIGHSEC eid App Administration User Manual

Open Source Used In Meeting integration for Jabber 9.6

BES10 Self-Service. Version: User Guide

Simba ODBC Driver with SQL Connector for Apache Cassandra

Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions

Svn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Fuse MQ Enterprise Broker Administration Tutorials

Strong Authentication for Juniper Networks

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

TRITON - SECURITY HELP

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Installing the Shrew Soft VPN Client

8.10. Required Ports

Open Source Used In Cisco IronPort Encryption SDK

ZIMPERIUM, INC. END USER LICENSE TERMS

Sophos Anti-Virus for Linux startup guide. Product version: 9

ANZ TRANSACTIVE MOBILE for ipad

Mayfair EULA for Journal Office

SafeNet Authentication Service

Pulse Redundancy. User Guide

What are cookies and how does Glendale Career College use them?

Spotlight Management Pack for SCOM

Using SNMP with OnGuard

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

User Guide. BES12 Self-Service

Self Help Guides. Setup Exchange with Outlook

Dell One Identity Cloud Access Manager How to Configure for High Availability

SafeNet Cisco AnyConnect Client. Configuration Guide

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

BlackBerry Enterprise Server Express. Version: 5.0 Service Pack: 4. Update Guide

Open Source Used In Cisco Digital Media Player 4310 Release 5.4.1

NetSuite End User License Agreement for Mobile Applications

Dell InTrust Preparing for Auditing Microsoft SQL Server

Radius Integration Guide Version 9

New Security Features

Enterprise Self Service Quick start Guide

Setup Reset Password Portal. CloudAnywhere. Auteur Emmanuel Dreux

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Advanced Planning PDP Client for Microsoft Excel 1.3 Install PeopleBook

AG MacOS Standalone Array Client Administration Guide

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

CA Spectrum and CA Embedded Entitlements Manager

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Work Space Manager for BES _449

Dell One Identity Cloud Access Manager Installation Guide

BlackBerry Desktop Manager Version: User Guide

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

Realex Payments Gateway Extension with 3D Secure for Magento. User Guide to Installation and Configuration. StudioForty9

Appendix D. Rocks Copyright and Trademark

Cisco Collaboration with Microsoft Interoperability

Strong Authentication for Juniper Networks SSL VPN

R&S TSMW Radio Network Analyzer Open Source Acknowledgment

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Open Source Software used in the product

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8

Technical Note. BlackBerry Business Cloud Services

Transcription:

KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016

Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 2

Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 3

Table of Contents 1 Introduction... 5 1.1 Document Purpose... 5 1.2 Intended Audience... 5 2... 6 2.1 Create a Multi-Factor Authentication Provider in Azure... 6 2.2 Install the Multi-Factor Authentication Server on Premises... 10 2.3 Add the LoadMaster as a RADIUS Client... 13 2.4 Configure the LoadMaster... 14 2.4.1 Increase the L7 Authentication Timeout... 14 2.4.2 Create a New SSO Domain... 14 2.4.3 Configure the ESP Options in the SubVSs... 15 References... 17 Document History... 18 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 4

Introduction 1 Introduction Multi-Factor Authentication (MFA) is a method of authentication that requires the use of more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the following verification methods: Something you know (typically a password) Something you have (a trusted device that is not easily duplicated, like a phone) Something you are (biometrics) Azure MFA is a method of verifying who you are that requires the use of more than just a username and password. It provides a second layer of security to user sign-ins and transactions. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication with a range of easy verification options phone call, text message or mobile app notification allowing users to choose the method they prefer. Azure MFA is an easy to use, scalable and reliable solution that provides a second method of authentication so your users are always protected. The security of multi-factor authentication lies in its layered approach. Comprising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user s password, it is useless without also having possession of the trusted device. Should the user lose the device, the person who finds it will not be able to use it unless they also know the user s password. 1.1 Document Purpose This document provides step-by-step instructions on how to configure Azure, the MFA server and the KEMP LoadMaster in order to provide multi-factor authentication. This document uses an Exchange environment as an example scenario. 1.2 Intended Audience This document is intended to be used by anyone interested in finding out more about using Azure MFA with the KEMP LoadaMaster. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 5

2 Follow the steps in the sections below to configure Azure multi-factor authentication and the KEMP LoadMaster. 2.1 Create a Multi-Factor Authentication Provider in Azure Follow the steps below to create a new multi-factor authentication provider in Azure: Log in to the Azure portal (classic). Go to ACTIVE DIRECTORY. Figure 2-1: QUICK CREATE Select NEW. Select MULTI-FACTOR AUTH PROVIDER. Select QUICK CREATE. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 6

Figure 2-2: CREATE Enter a NAME for the authentication provider. Select the USAGE MODEL. Select SUBSCRIPTION. Leave DIRECTORY as the default value. Click CREATE. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 7

Figure 2-3: ACTIVE DIRECTORY Once created, select your multi-factor authentication provider and click MANAGE. Select CONFIGURE on the left. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 8

Figure 2-4: Configure Settings Various options can be configured on this screen, such as: The phone number you would like to display when the phone call is used as the second factor Timeout settings Enable/disable features Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 9

Figure 2-5: Server Click Server underneath the DOWNLOADS section on the left. Download the Multi-Factor Authentication Server which will be run in your onpremises data center. Do not click Generate Activation Credentials until you have installed the server on premises and are ready to activate the install. The Activation Credentials are only valid for 10 minutes, at which time you would be required to obtain new credentials. 2.2 Install the Multi-Factor Authentication Server on Premises The MFA server must be a member of the on-premises Active Directory domain. After downloading the MFA server, install it on premises. When prompted, generate the Activation Credentials and enter them in the provided field. Follow the steps below: Launch the Multi-Factor Authentication Server console. Select Users. Click Import from Active Directory. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 10

Figure 2-6: Import Navigate to the Active Directory Organization Unit you want to import and click Import. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 11

Figure 2-7: Edit User Once imported, you can select a user to set authentication methods, etc. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 12

2.3 Add the LoadMaster as a RADIUS Client Follow the steps below to add the LoadMaster as a RADIUS client: Select RADIUS Authentication within the Azure Multi-Factor Server. Figure 2-8: RADIUS Authentication Select the Enable RADIUS authentication check box. Click Add. Figure 2-9: Add RADIUS Client Enter the IP address of the LoadMaster in the IP address text box. Enter an Application name. Enter a new Shared secret password and confirm it in the text boxes provided. Select the Require Multi-Factor Authentication user match check box. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 13

2.4 Configure the LoadMaster Follow the steps in the sub-sections below to configure the LoadMaster. 2.4.1 Increase the L7 Authentication Timeout The L7 Authentication Timeout should be increased in order to provide enough time for the following actions to occur: The user enters their credentials Azure MFA communicates with the service in the cloud The service in the cloud sends the authentication to the user s phone (via app or phone call) To increase the L7 Authentication Timeout, follow the steps below: In the main menu of the LoadMaster WUI, go to System Configuration > Miscellaneous Options > L7 Configuration. Figure 2-10: L7 Authentication Timeout Enter the L7 Authentication Timeout and click Set Timeout. KEMP recommends 300 seconds but this can be adjusted as needed to meet requirements. 2.4.2 Create a New SSO Domain Follow the steps below to create a new SSO domain: In the main menu of the LoadMaster WUI, go to Virtual Services > Manage SSO. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 14

Figure 2-11: Add new Client Side Configuration Enter a name in the Add new Client Side Configuration text box and click Add. Figure 2-12: Configure the domain Select RADIUS as the Authentication Protocol. Enter the IP address of the MFA Server in the RADIUS server(s) text box and click Set RADIUS Server(s). Multiple addresses can be entered in this text box, if required. Enter the RADIUS Shared Secret, which was created in the MFA configuration earlier, and click Set Shared Secret. Enter the Domain/Realm and click Set Domain/Realm Name. 2.4.3 Configure the ESP Options in the SubVSs Our example is based on using an Exchange environment. For this example scenario, the Edge Security Pack (ESP) Options for the OWA and Authentication Proxy SubVSs need to be configured. To do this, follow the steps below: In the main menu of the LoadMaster WUI, go to Virtual Services > View/Modify Services. Click Modify on the relevant Virtual Service. Expand the ESP Options section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 15

Figure 2-13: ESP Options Select Form Based as the Client Authentication Mode. Select the SSO Domain that was created in the previous section. Configure any of the other settings as needed. You may want to configure a custom SSO Image Set to inform users that MFA will be required. For further information on doing this, please refer to the Custom Authentication Form, Technical Note. Repeat the steps above to configure the other SubVS. For further information on configuring the LoadMaster to work with Exchange, refer to the relevant Exchange Deployment Guide. For further information on ESP, refer to the ESP, Feature Description. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 16

References References Unless otherwise specified, the following documents can be found at http://kemptechnologies.com/documentation. ESP, Feature Description Custom Authentication Form, Technical Note Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 17

Document History Document History Date Change Reason for Change Version Resp. Apr 2016 Initial draft First draft of document 1.0 LB Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 18