SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide



Similar documents
SafeNet Cisco AnyConnect Client. Configuration Guide

Configuration Guide. SafeNet Authentication Service. Token Validator Proxy Agent

SAS Token Validator Proxy Agent Configuration Guide

SafeNet Authentication Service

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

SafeNet Authentication Service

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

IDGo 800 Minidriver for Windows. User Guide

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Gemalto s SA Server and OpenLDAP

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note. SA Server and ADAM

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent

SafeNet Authentication Service

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only

Configuration Guide. SafeNet Authentication Service AD FS Agent

SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Agent Configuration Guide

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template

Integration Guide. SafeNet Authentication Service. VMWare View 5.1

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Microsoft IAS and NPS Agent Configuration Guide

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template

Self Help Guides. Create a New User in a Domain

Integration Guide. SafeNet Authentication Client. Using SAC with Putty-CAC

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Synchronization Agent Configuration Guide

Self Help Guides. Setup Exchange with Outlook

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Dell Statistica Statistica Enterprise Installation Instructions

Gemalto SafeNet Minidriver 9.0

Decommissioning the original Microsoft Exchange

SafeNet Authentication Manager Express. Upgrade Instructions All versions

BlackBerry Enterprise Server for Microsoft Office 365. Version: Release Notes

What are cookies and how does Glendale Career College use them?

Symantec Endpoint Protection Shared Insight Cache User Guide

Infor Cloud Printing Service Administration Guide

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

RELEASE NOTES TABLE OF CONTENTS: SOFTWARE OVERVIEW DESCRIPTION OF GENEMAPPER ID-X SOFTWARE HOTFIX_

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

SAS Agent for Outlook Web Access

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

VERITAS Backup Exec TM 10.0 for Windows Servers

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Sage Fixed Assets. for Depreciation, Tracking, Planning, and Reporting. Network Installation Administrator Guide

Installing Your MS Access Database (Manual Installation Instructions)

Remote Logging Agent Configuration Guide

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Symantec LiveUpdate Administrator. Getting Started Guide

Remote Management System

How to install Artologik HelpDesk 3

INSTALLATION GUIDE. AXIS Camera Station

CA VPN Client. User Guide for Windows

Companion for MS Analysis Server, v4

Migrating Cirrus. Revised 7/19/2007

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

RSA Two Factor Authentication

RSA SecurID Software Token Security Best Practices Guide

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. January

Dell One Identity Cloud Access Manager How to Configure for High Availability

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0

JPMA - Terms and Conditions

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Preparing Your Server for an MDsuite Installation

BlackBerry Desktop Manager Version: User Guide

SAS Agent for Outlook Web App

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

Microsoft IIS Integration Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

RealShot Manager Compression Server software

SysInfoTools Deleted File Recovery

Sentinel Cloud V.3.5 Installation Guide

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks

Quick Reference. Administrator Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

BlackBerry World Storefront. Version: 4.3. User Guide

Active Directory Rights Management Service Integration Guide

BlackBerry Business Cloud Services. Version: Release Notes

Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

Dell One Identity Cloud Access Manager Installation Guide

KeyAdvantage System DMS Integration. Software User Manual

Website TERMS OF USE AND CONDITIONS

MobileStatus Server Installation and Configuration Guide

Web Security Firewall Setup. Administrator Guide

Transcription:

SafeNet Authentication Service Token Validator Proxy Agent Configuration Guide

All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. 2015 Gemalto. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto N.V. and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners. Product Version: 2.0 Document Part Number: 007-012423-001, Rev. D Release Date: 16 August 2016 2

Contents Contents 1 Preface... 4 Audience... 4 Related Documents... 4 Support Contacts... 5 2 Overview... 6 Applicability... 6 Environment... 6 Introduction... 7 Architecture... 7 Push Authentication... 8 3 Installation... 9 Installing the SAS Token Validator Proxy Agent... 9 Upgrading to SAS Token Validator Proxy Agent 2.0... 14 Replacing SAS Token Validator Proxy Agent Versions Prior to 1.02... 14 4 Configuring SAS Token Validator Proxy Agent... 15 Defining the Main and Backup SAS Servers... 15 Main SAS Server... 15 Backup SAS Server... 15 Setting Time Interval for Checking if Main SAS Server is Operational... 15 Configuring Logs... 16 Activating Certificate Check... 17 Configuring Proxy Server... 17 5 Third Party License... 18 Apache Logging Services... 18 3

Error! No text of specified style in document. Preface Audience This document is intended for personnel responsible for maintaining your organization's security infrastructure. The document describes how to install and deploy SAS Token Validator Proxy Agent with SafeNet Authentication Service. All products manufactured and distributed by Gemalto, Inc. are designed to be installed, operated, and maintained by personnel who have the knowledge, training, and qualifications required to safely perform the tasks assigned to them. The information, processes, and procedures contained in this document are intended for use by trained and qualified personnel only. Related Documents The following documents contain related information: SafeNet Authentication Service Token Validator Proxy Agent Customer Release Notes 4

Error! No text of specified style in document. Support Contacts If you encounter a problem while installing, registering or operating this product, please make sure that you have read the documentation. If you cannot resolve the issue, contact your supplier or Gemalto Customer Support. Gemalto Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between Gemalto and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Contact Method Address Contact Information Gemalto 4690 Millennium Drive Belcamp, Maryland 21017, USA Phone US 1-800-545-6608 International 1-410-931-7520 Technical Support Customer Portal https://serviceportal.safenet-inc.com Existing customers with a Technical Support Customer Portal account can log in to manage incidents, get the latest software upgrades, and access the Gemalto Knowledge Base. 5

Overview Overview Applicability The information in this document applies to: SafeNet Authentication Service PCE/SPE 3.4 and later SafeNet Authentication Service Cloud Edition Environment Supported Platforms Windows 2012 R2 Windows 2008 R2 Supported Architecture 64-bit Additional Software Components IIS 8.5 IIS 8.0 IIS 7.5.Net 3.5 6

Overview Introduction The function of the SafeNet Authentication Service (SAS) Token Validator Proxy Agent is to implement proxy authentication requests from other agents to SAS. It has two main uses: When working with SAS Agent for Windows Logon, without SAS Token Validator Proxy Agent you would be required to register each workstation's IP address to SAS and have each workstation communicate directly with SAS. With SAS Token Validator Proxy Agent, each SAS Agent for Windows Logon can be pointed at SAS Token Validator Proxy Agent, and only the IP address of the SAS Token Validator Proxy Agent needs be registered with SAS. When using SafeNet Authentication Service API with a cloud application such as MS Azure, you cannot be sure of the IP address of the cloud server, nor are you entitled to claim this IP address as your own. To solve this problem, you can point your cloud application at the SAS Token Validator Proxy Agent and register your SAS Token Validator Proxy Agent as their Auth Node. Architecture If each client were to be connected directly to SafeNet Authentication Service, each would require its own IP address to be configured. By using the SAS Token Validator Proxy Agent, it needs to be configured just once with the IP address of the SAS Auth Node. Multiple clients can then be connected to SAS through the SAS Token Validator Proxy Agent without further IP addresses being configured. 7

Overview Push Authentication SAS Token Validator Proxy Agent 2.0 transfers Push Authentication requests from all SAS agents that support Push Authentication. No configuration is required for Push Authentication support. 8

Installation Installation Installing the SAS Token Validator Proxy Agent NOTE: Always work in Run as administrator mode when installing, uninstalling, upgrading, enabling, or disabling the SAS Token Validator Proxy Agent. 1. On the SAS Token Validator Proxy Agent computer, run the following installation file: SafeNet TokenValidator Proxy x64.exe (64-bit) The Welcome to the InstallShield Wizard for SafeNet Authentication Service Token Validator Proxy window opens. 2. Click Next to continue. 9

Installation 3. On the License Agreement window, select I accept the terms in the license agreement and click Next. 4. On the Customer Information window, do the following: a. Enter the User Name and Organization. b. Select one of the following options to determine who can use the application: Anyone who uses this computer (all users) Only for me c. Click Next. 10

Installation 5. On the Destination Folder window, the installation folder is displayed. To change the location, click Change and then browse to the required location. Select the required location and click Next. NOTES: If changing the default destination folder, do not locate on a root drive. This will cause the agent to malfunction. If a non-default destination folder is selected, the SAS Connectivity Test in connected agents will not work. 11

Installation 6. On the Authentication Service Setup window, enter the IP address of the SAS server and click Next. NOTE: The Connect using SSL (requires valid certificate) setting is relevant only for the connection between the SAS Token Validator Proxy Agent and the SAS server. It will not affect the agents that are connected through the SAS Token Validator Proxy Agent. 7. On the Ready to Install the Program window, click Install to begin installation. 12

Installation 8. When the process has been completed, the InstallShield Wizard Completed window opens. Click Finish to exit the installation wizard. Following installation, the SAS Proxy Source Server service is installed on Windows. 13

Installation Upgrading to SAS Token Validator Proxy Agent 2.0 NOTE: Always work in Run as administrator mode when installing, uninstalling, upgrading, enabling, or disabling the SAS Token Validator Proxy Agent. Run the installation and when prompted, select the upgrade options. See Installing the SAS Token Validator Proxy Agent on page 9. Replacing SAS Token Validator Proxy Agent Versions Prior to 1.02 SAS Token Validator Proxy Agent 2.0 does not support upgrade from versions earlier than1.02. NOTE: Always work in Run as administrator mode when installing, uninstalling, upgrading, enabling, or disabling the SAS Token Validator Proxy Agent. To replace a SAS Token Validator Proxy Agent version previous to 1.02: 1. Uninstall the previous version of SAS Token Validator Proxy Agent. 2. Ensure that all installed files have been removed. If not, remove them manually. 3. Install SAS Token Validator Proxy Agent 2.0. 4. Configure SAS Token Validator Proxy Agent 2.0. 14

Configuring SAS Token Validator Proxy Agent Configuring SAS Token Validator Proxy Agent Defining the Main and Backup SAS Servers Once installed, the paths to the main SAS server and the backup SAS server can be changed, if required. Main SAS Server Enter the path to the main SAS server in the following Registry key: HKEY_LOCAL_MACHINE \SOFTWARE\CRYPTOCard\BlackShield ID\TokenValidatorProxy\PrimaryServiceURL Backup SAS Server Enter the path to the backup SAS server in the following Registry key: HKEY_LOCAL_MACHINE \SOFTWARE\CRYPTOCard\BlackShield ID\TokenValidatorProxy\OptionalSecondaryServiceURL Setting Time Interval for Checking if Main SAS Server is Operational Following failover to the Backup SAS server, SAS Token Validator Proxy Agent will check if the SAS Main server is running. The interval in minutes between checks is set in the following registry key (default, 10 minutes): HKEY_LOCAL_MACHINE \SOFTWARE\CRYPTOCard\BlackShield ID\TokenValidatorProxy\PrimaryFailureIntervalMinutes 15

Configuring SAS Token Validator Proxy Agent Configuring Logs The Logging level is set in the Windows Registry. Other settings are changed in the configuration file located at: Program files\cryptocard\blackshield ID\TokenValidatorProxy\Log4Net.config Setting Description Logging level Default: 3 To change the level, set the LogLevel registry key to the required level: HKEY_LOCAL_MACHINE \SOFTWARE\CRYPTOCard\BlackShield ID\TokenValidatorProxy\LogLevel The following levels are available: 1 Fatal Severe error events that are likely to cause the application to abort. 2 Error - Error events that might still allow the application to continue running. 3 Warn - Potentially harmful situations. 4 Info Informative messages that provide a high-level view of the progress of the application. 5 Debug - Detailed informational events that are useful when debugging an application. Name and location of Log file Maximum file size No. of rollover log files Default: Logs\TVP.log To change the path and\or name of the log file: 1. Open the configuration file (Log4Net.config) in a text editor. 2. Change the path and or file name using the following format: <file value=.\logs\tvp.log /> NOTE: If you change the path, the new location must be accessible to all users. Also, writing to the Log folder requires Network Service permissions. Default: 15 MB To determine the maximum file size: 1. Open the configuration file (Log4Net.config) in a text editor. 2. Set MaximumFileSize to the required size, using the following format: <MaximumFileSize value= 15MB /> Default: 10 A specified number of log files are saved, with the oldest file being overwritten when a new file is generated. To change the number of rollover log file copies: 1. Open the configuration file (Log4Net.config) in a text editor. 2. MaximumSizeRollBackups to the required number using the following format: <MaximumSizeRollBackups value = 10 /> 16

Configuring SAS Token Validator Proxy Agent Activating Certificate Check To disable the Certificate Check, set the Registry key DisableCertificateCheck to 1. To activate the Certificate Check, set the Registry key DisableCertificateCheck to 0. Default: 0 HKEY_LOCAL_MACHINE \SOFTWARE\CRYPTOCard\BlackShield ID\TokenValidatorProxy\ DisableCertificateCheck Configuring Proxy Server To set a proxy server, add the following to the web.config file, located at C:\Program Files\CRYPTOCard\BlackShield ID\TokenValidatorProxy\TokenValidator\web.config Insert in the section <system.web> </system.web> \<system.net> <defaultproxy> <proxy proxyaddress=" http://myproxyaddress:port </defaultproxy> </system.net> <system.net> <settings> <servicepointmanager expect100continue="false"/> </settings> </system.net> Where: http://myproxyaddress:port is the address and port of the proxy 17

Third Party License Third Party License Apache Logging Services http://logging.apache.org Copyright 2016 Gemalto Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/license-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. 18