How To - Implement Clientless Single Sign On Authentication with Active Directory



Similar documents
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Single Sign On Authentication with Active Directory

How To Configure SSL VPN in Cyberoam

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Integrating LANGuardian with Active Directory

Thin Client Solution Installation Guide Version

SchoolBooking SSO Integration Guide

How To Configure Syslog over VPN

Configuring User Identification via Active Directory

How To Configure L2TP VPN Connection for MAC OS X client

MultiSite Manager. Setup Guide

Contents. Introduction. Prerequisites. Requirements. Components Used

Installation Troubleshooting Guide

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Configuring SSL VPN on the Cisco ISA500 Security Appliance

How To Configure Virtual Host with Load Balancing and Health Checking

How to Configure Captive Portal

Case Closed Installation and Setup

Configuring Global Protect SSL VPN with a user-defined port

Network Load Balancing

RMS Cloud - Setup Instructions for Windows Computers

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

NETASQ ACTIVE DIRECTORY INTEGRATION

Agent Configuration Guide

Dynamic VLAN assignment using RADIUS. Network Diagram

pcanywhere Advanced Configuration Guide

iboss Enterprise Deployment Guide iboss Web Filters

Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Getting Started with Clearlogin A Guide for Administrators V1.01

User-ID Best Practices

Setup non-admin user to query Domain Controller event log for Windows2003

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Single Sign-On in SonicOS Enhanced 4.0

M2M Series Routers. Port Forwarding / DMZ Setup

How To Connect To Ecs.Org From A Pc Or Mac Or Ipad (For A Laptop) With A Network Connection (For Mac) With The Ipad Or Ipa (For Pc Or Ipac) With An Ipa Or Ip

Immotec Systems, Inc. SQL Server 2005 Installation Document

Single Sign-On. Document Scope. Single Sign-On

NovaBACKUP xsp Version 15.0 Upgrade Guide

MultiSite Manager. Setup Guide

WMI syslog management of Windows AD Server V 1.1.2

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Citrix Access Gateway Plug-in for Windows User Guide

NETASQ SSO Agent Installation and deployment

qliqdirect Active Directory Guide

IIS, FTP Server and Windows

SONICWALL SONICOS ENHANCED 5.6 SINGLE SIGN-ON

Preparing for GO!Enterprise MDM On-Demand Service

User Management Tool 1.5

Section 4 Application Description - LDAP

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Quick Connect. Overview. Client Instructions. LabTech

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Single Sign-On in SonicOS Enhanced 5.5

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Borderware MXtreme. Secure Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

How To - Deploy Cyberoam in Gateway Mode

Web Authentication Application Note

523 Non-ThinManager Components

Use Enterprise SSO as the Credential Server for Protected Sites

F-SECURE MESSAGING SECURITY GATEWAY

Configuring Security Features of Session Recording

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Using Device Discovery

Single Sign-On in SonicOS Enhanced 5.6

Test Case 3 Active Directory Integration

SECURE FTP CONFIGURATION SETUP GUIDE

User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Central Administration QuickStart Guide

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Copyright. Disclaimer. Introduction 1. System Requirements Installing the software 4

Freshservice Discovery Probe User Guide

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

2X ApplicationServer & LoadBalancer Manual

Guideline for setting up a functional VPN

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Active Directory Integration

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Configuring the Watchguard Edge for RADIUS authentication

University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide

LifeCyclePlus Version 1

Implementing and using the NetSupport Connectivity Server

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Sonian Getting Started Guide October 2008

Remote Terminal Service (RTS) User Guide (Version 2.1)

Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode

Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor

Download/Install IDENTD

Using SonicWALL NetExtender to Access FTP Servers

TechNote. Contents. Overview. System or Network Requirements. Deployment Considerations

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Svn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5

Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.

CXM 4.5 Deployed on Windows Chad Adams October 28, 2009

Transcription:

How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version: 10.00 onwards Overview Cyberoam Clientless Single Sign On Authentication With Cyberoam Clientless Single Sign On authentication, user automatically logs on to Cyberoam when he/she logs on to Windows using his/her windows username and password, eliminating the need of multiple logins. Furthermore, it also eliminates the need to install SSO clients on each workstation. Hence, delivering high ease-of-use to end-users, higher levels of security in addition to lowering operational costs involved in client installation. Cyberoam provides Clientless Single Sign On in the form of Cyberoam Transparent Authentication Suite (CTAS). The CTA Suite consists of: CTA Agent It monitors user authentication requests and sends information to the Collector for authentication. CTA Collector It collects the user authentication request from multiple agents, processes the request and sends to Cyberoam for authentication. How does Cyberoam CTAS work? User Authentication Information Collection Process User logs on to the Active Directory Domain Controller from any workstation in LAN. Domain Controller authenticates user credentials. The CTA Agent captures and communicates this authentication process to CTA Collector over default TCP port 5566 in real time. CTA Collector registers user in the Local database and communicates user information to Cyberoam over the default UDP port 6677. Cyberoam queries Active Directory to determine user s group membership and registers user in Cyberoam database Based on data from CTA Agent, Cyberoam queries AD server to determine group membership, based on which access is granted or denied. Users logged into a workstation directly i.e. locally but not logged into the domain will not be authenticated and are considered as Unauthenticated users. For users that are not logged into the domain, the Captive Portal prompting for a manual login will be displayed for further authentication. Scenario Implement Clientless Single Sign On (SSO) authentication with Active Directory integration in a Single Domain Controller Environment, as shown in the diagram below.

ADS Configuration Login to your AD Server using Administrator profile and follow the steps below to install and configure CTAS. Step 1: Download and Install CTAS Download CTAS from http://www.cyberoam.com/cyberoamclients.html and install it in your AD Server. Step 2: Configure CTAS in ADS Once CTAS is installed, launch it from Start > All Programs > CTAS > Cyberoam Transparent Authentication Suite or Desktop shortcut. Configure CTA Collector Switch to CTA Collector tab and configure parameters as given below. Parameter Value Description Cyberoam Appliances 192.168.1.121 Workstation Polling Settings Logoff Detection Settings Dead Entry Timeout 2 Listening to the Cyberoam Appliances on Port Listening to the remote CTA Agents (if any) on Port WMI Disabled 6677 5566 Specify Cyberoam IP Address to which CTA Collector has to forward user information. Specify User Information Polling method. Available options: WMI Registry Read Access Enable if you want to monitor user logoff. If enabled, specify the Detection Method (Pinging the workstation or Polling through WMI or Registry Read Access) Specify if you want a user to be logged off from Cyberoam, after the mentioned time, even when the Logoff Detection for the users is disabled. Specify the UDP port on which the CTA collector is to listen for requests from Cyberoam Appliance. Specify the TCP port on which the CTA collector is to listen for requests from Remote CTA Agents.

Note: - Make sure that the AD Server has UDP port 6677 and TCP port 5566 open for communication between CTAS and Cyberoam, and CTA Collector and CTA Agent respectively. - If you enable Logoff Detection Settings, ensure that firewall on all workstations are configured such that they allow traffic to and from the Domain Controller. o If ping is selected as log off detection method, ensure that workstation firewall allows ping packets. o If WMI Polling method is selected, ensure that workstation firewall allows traffic over UDP port 135.

Configure CTA Agent Switch to CTA Agent tab and configure parameters as given below. Parameter Value Description CTA Agent Mode EVENTLOG Select Workstation Communication Method Monitored Networks 192.168.1.0/24 Specify the networks to be monitored for user authentication. Multiple networks can be added.

General Settings Switch to the General tab and start the CTA Agent service. Step 3: Enable Security Event Logging Go to Start > Administrative Tools > Local Security Policy to view Security Settings. Traverse to Security Settings > Local Policies > Audit Policy and double click on Audit account logon events to view the Audit account logon events Properties window. Enable Audit of Success and Failure logon events, as shown in the screen below.

Cyberoam Configuration After implementing CTAS on the AD Server, you can integrate it with Cyberoam by following the steps below. Step 1: Configure Cyberoam to use Active Directory as Authentication Server. Refer to the article How To Integrate with Active Directory for details. Step 2: Configure Collector Port and Group in Cyberoam Logon to Cyberoam CLI Console using Administrator password. Go to Option 4. Cyberoam Console. Execute following command to enable Cyberoam Transparent Authentication. console> cyberoam auth cta enable

Execute the following commands to add collector IP and collector port, and create a collector group. console> cyberoam auth cta collector add collector-ip <ip-address> collector-port <port> create-new-collector-group Note: For Cyberoam firmware version below 10.02.0 Build 473, add the collector IP and collector port using the following command. console> cyberoam auth cta collector add collector-ip <ipaddress> collector-port<port number> This completes the configuration of Clientless SSO on your ADS and Cyberoam. Document Version: 2.8 5 August, 2014