External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy



Similar documents
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Access Gateway Advanced Edition

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

SSH to Ubuntu Server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

SecurEnvoy Windows Login Agent

SecurEnvoy Reporting Wizard

SecurEnvoy IIS Web Agent. Version 7.2

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

A brief on Two-Factor Authentication

Defender Token Deployment System Quick Start Guide

Configuring User Identification via Active Directory

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

MIGRATION GUIDE. Authentication Server

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

SecurEnvoy Security Server Installation Guide

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

ESET SECURE AUTHENTICATION. Cisco ASA Internet Protocol Security (IPSec) VPN Integration Guide

BlackShield ID Best Practice

BlackShield ID Agent for Remote Web Workplace

Accessing the Media General SSL VPN

Two-Factor Authentication

DIGIPASS Authentication for Cisco ASA 5500 Series

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

IIS, FTP Server and Windows

INTEGRATION GUIDE. General Radius Config

Training module 2 Installing VMware View

Authentication Node Configuration. WatchGuard XTM

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Configuring the Watchguard Edge for RADIUS authentication

RSA SecurID Ready Implementation Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

ZyWALL OTPv2 Support Notes

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

NETASQ ACTIVE DIRECTORY INTEGRATION

1 Summary. Step by Step Guide to implement SMS authentication to Bluecoat ProxySG

Enable VPN PPTP Server Function

Authentication Methods

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

EM Single Sign On 1.2 (1018)

RSA Authentication Manager 7.1 Basic Exercises

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Multi-factor Authentication using Radius

Installation Troubleshooting Guide

Configuring Global Protect SSL VPN with a user-defined port

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

netld External Authentication Setup Guide

Configuring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS.

How to Configure Active Directory based User Authentication

Immotec Systems, Inc. SQL Server 2005 Installation Document

Configuration Guide - OneDesk to SalesForce Connector

Defender EAP Agent Installation and Configuration Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

DIS VPN Service Client Documentation

DIGIPASS Authentication for GajShield GS Series

RSA SecurID Ready Implementation Guide

ESET SECURE AUTHENTICATION. Check Point Software SSL VPN Integration Guide

Managing Users and Identity Stores

NetMotion + YubiRADIUS Quick Start Guide

DIGIPASS Authentication for Check Point Connectra

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

SafeNet Cisco AnyConnect Client. Configuration Guide

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Configure Single Sign on Between Domino and WPS

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Mozilla Thunderbird: Setup & Configuration Learning Guide

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

NovaBACKUP xsp Version 15.0 Upgrade Guide

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

Preparing for GO!Enterprise MDM On-Demand Service

Remote Access Instructions

Transcription:

External Authentication with CiscoSecure ACS Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park Theale Reading RG7 4TY Andy Kemshall akemshall@securenvoy.com

CiscoSecure ACS Integration Guide This document describes how to integrate a Cisco ACS Radius Server with SecurEnvoys two-factor authentication solution called SecurAccess. Cisco ACS provides a central RADIUS authentication gateway that can be configured for multiple back-end two-factor authentication servers and is ideal for use when migrating from an existing token based system to SecurEnvoy. SecurAccess provides two-factor, strong authentication for remote Access solutions (such as Cisco), without the complication of deploying hardware tokens or smartcards. Two-Factor authentication is provided by the use of your PIN and your Phone to receive the one time passcode. SecurAccess is designed as an easy to deploy and use technology. It integrates directly into Microsoft s Active Directory and negates the need for additional User Security databases. SecurAccess consists of two core elements: a Radius Server and Authentication server. The Authentication server is directly integrated with LDAP or Active Directory in real time. SecurEnvoys Security Server can be configured in such a way that it can use the existing Microsoft password. Utilising the Windows password as the PIN, allows the User to enter their UserID, Windows password and One Time Passcode received upon their mobile phone. This authentication request is passed via the Radius protocol to the SecurEnvoy Radius server where it carries out a Two-Factor authentication. It provides a seemless login into the Windows Server environment by entering three pieces of information. SecurEnvoy utilises a web GUI for configuration, as does the Cisco VPN Concentrator. All notes within this integration guide refer to this type of approach. The equipment used for the integration process is listed below: Cisco Cisco ACS Version 3.0.2 installed on a server that s IP Address is 192.168.99.11 SecurEnvoy Windows 2003 server SP1 (IP Address 192.168.99.10) IIS installed with SSL certificate (required for management and remote administration) Active Directory installed or connection to Active Directory via LDAP protocol. SecurAccess software release v3.1 2005 SecurEnvoy Ltd. All rights reserved Confidential Page 2

Index 1.0 PRE REQUISITES...3 2.0 CONFIGURATION OF CISCO ACS...3 3.0 CONFIGURATION OF SECURENVOY...6 1.0 Pre Requisites It is assumed that Cisco ACS has been installed and is authenticating with a username and password or other third party token system. The SecurEnvoy Security Server has been installed with the Radius service and has a suitable account with read and write privileges to the Active Directory. If firewalls are between the SecurEnvoy Security server and CiscoSecure ACS, additional open ports will be required, by default UDP 1812 is used. 2.0 Configuration of Cisco ACS Login to the Cisco Secure Web Interface, select the left button External User Database Select the link Database Configuration 2005 SecurEnvoy Ltd. All rights reserved Confidential Page 3

Select the link RADIUS Token Server and press the button Create New Configuration Call this new configuration SecurEnvoy and press submit Next press the Configure button to setup SecurEnvoy s Radius settings and enter the SecurEnvoy server IP Address, Radius Port (default is 1812) and shared secret. In this case the IP Address of the SecurEnvoy server is 192.168.99.10, the Radius port is the default (1812) and the shared secret is qwerty. It is recommended that a retry of 1 and timeout of 10 seconds is used. Press Submit after setting are entered. 2005 SecurEnvoy Ltd. All rights reserved Confidential Page 4

After the SecurEnvoy server has been defined it must be added as one of the active servers. If no local users or groups are used then setup the following:- Re-select the left button External User Databases and select the link Unknown User Policy Add SecurEnvoy to the selected database list and press submit. If SecurEnvoy is set to the top of the list it will be authenticated first, this is recommended as SecurEnvoy has a very fast authentication time. If the user is not setup in SecurEnvoy then an access denied is received which will cause ACS to try authenticating the next server in the list thus multiple token types can co-exist. 2005 SecurEnvoy Ltd. All rights reserved Confidential Page 5

3.0 Configuration of SecurEnvoy To help facilitate an easy to use environment, SecurEnvoy can utilise the existing Microsoft password as the PIN. This allows the users to only remember their Domain password. SecurEnvoy supplies the second factor of authentication, which is the dynamic one time passcode (OTP) which is sent to the user s mobile phone. Launch the SecurEnvoy admin interface, by executing the Local Security Server Administration link on the SecurEnvoy Security Server. Click Config Select Windows Microsoft Password is the PIN under PIN Management This will now use the users existing password as the PIN. Click Update to confirm the changes Click the Radius Button Enter the IP address and Shared secret of the Cisco ACS server, in this example: 192.168.99.11 qwerty Click Update to confirm settings. Click Logout when finished. This will log out of the Administrative session. 2005 SecurEnvoy Ltd. All rights reserved Confidential Page 6