Juniper SSL VPN Authentication QUICKStart Guide



Similar documents
Strong Authentication for Juniper Networks SSL VPN

Cisco ASA Authentication QUICKStart Guide

Remote Logging Agent Configuration Guide

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Strong Authentication for Juniper Networks

Microsoft IAS and NPS Agent Configuration Guide

Strong Authentication for Cisco ASA 5500 Series

LDAP Synchronization Agent Configuration Guide

SafeNet Authentication Service

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Implementation Guide for protecting

Welcome Guide for MP-1 Token for Microsoft Windows

SAML Authentication Quick Start Guide

BlackShield ID Agent for Remote Web Workplace

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft TS Web / RD Web

Agent Configuration Guide

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Installation Guide. SafeNet Authentication Service

Agent Configuration Guide for Microsoft Windows Logon

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Cisco ASA

SAS Token Validator Proxy Agent Configuration Guide

BlackShield ID Best Practice

Integration Guide. SafeNet Authentication Service. VMWare View 5.1

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

SAM Context-Based Authentication Using Juniper SA Integration Guide

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Microsoft Office 365 Using SAML Integration Guide

Cloud Authentication. Getting Started Guide. Version

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Authentication Service

Juniper Networks SSL VPN Implementation Guide

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

DIGIPASS Authentication for Cisco ASA 5500 Series

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Radiator RADIUS Server

BlackShield ID MP Token Guide. for Java Enabled Phones

Defender Token Deployment System Quick Start Guide

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

Integration Guide. SafeNet Authentication Service. Using RADIUS and LDAP Protocols for Cisco Secure ACS

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template

Check Point FW-1/VPN-1 NG/FP3

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server

SAM Backup and Restore Guide. SafeNet Integration Guide

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

Using RD Gateway with Azure Multifactor Authentication

DIGIPASS Authentication for Check Point Connectra

ZyWALL OTPv2 Support Notes

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

IIS, FTP Server and Windows

Defender Configuring for Use with GrIDsure Tokens

Synchronization Agent Configuration Guide

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent

SAML Authentication with BlackShield Cloud

HOTPin Integration Guide: DirectAccess

Windows Live Mail Setup Guide

Online Statements. About this guide. Important information

Configuration Guide. SafeNet Authentication Service AD FS Agent

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for Check Point Security Gateways

Accessing the Media General SSL VPN

PaperClip. em4 Cloud Client. Manual Setup Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Omniquad Exchange Archiving

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

EMR Link Server Interface Installation

Sentral servers provide a wide range of services to school networks.

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

SafeNet Authentication Service

Configuration Guide. SafeNet Authentication Service. Token Validator Proxy Agent

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

DIGIPASS Authentication for SonicWALL SSL-VPN

HDAccess Administrators User Manual. Help Desk Authority 9.0

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Defender EAP Agent Installation and Configuration Guide

Remote Access Technical Guide To Setting up RADIUS

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

BroadSoft BroadWorks ver. 17 SIP Configuration Guide

Transcription:

Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY

Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet, Inc. is not responsible for any direct or indirect damages or loss of business resulting from inaccuracies or omissions. The specifications contained in this document are subject to change without notice. SafeNet and SafeNet Authentication Service are either registered with the U.S. Patent and Trademark Office or are trademarks of SafeNet, Inc., and its subsidiaries and affiliates, in the United States and other countries. All other trademarks referenced in this Manual are trademarks of their respective owners. SafeNet Hardware and/or Software products described in this document may be protected by one or more U.S. Patents, foreign patents, or pending patent applications. Please contact SafeNet Support for details of FCC Compliance, CE Compliance, and UL Notification. Support SafeNet technical support specialists can provide assistance when planning and implementing SafeNet Authentication Service. In addition to aiding in the selection of the appropriate authentication products, SafeNet can suggest deployment procedures that will provide a smooth, simple transition from existing access control systems and a satisfying experience for network users. We can also help you leverage your existing network equipment and systems to maximize your return on investment. SafeNet works closely with channel partners to offer worldwide Technical Support services. If you purchased this product through a SafeNet channel partner, please contact your partner directly for support needs. To contact SafeNet Authentication Service support directly: Europe / EMEA Freephone: Telephone: 0800 694 1000 (UK) +44 (0)1276 608 000 (Int l) North America Toll Free: 800-307-7042 Telephone: +1 613 599 2441 E-mail: sassupport@safenet-inc.com E-mail: sassupport@safenet-inc.com 2

Publication History Date Changes Version 2012.06.30 Updates to reflect SafeNet branding. 1.3 2010.09.15 Updated for GrIDsure, MP and different auth methods 1.2 2009.07.09 Copyright year updated 1.1 2009.01.26 Document created 1.0 3

Contents Applicability... 5 Environment... 6 Overview... 7 Preparation and Prerequisites... 8 Configuration... 8 Configuring Juniper SSL VPN for Two Factor Authentication... 8 Testing SafeNet Authentication... 10 Advanced Configuration... 11 Adding Filter-Id to a User Realm in Juniper SSL VPN... 11 Adding Filter-Id attribute to Remote Access Policy (Windows 2003)... 12 Creating new Network Policy with Filter-Id attribute (Windows 2008)... 15 Juniper SSL VPN and GrIDsure support... 17 Prerequisites... 17 Adding the SafeNet Authentication Service - Self Service URL to the gridsure.js file... 18 Adding the SafeNet GrIDsure enabled Sign-in page.... 18 Assigning the SafeNet GrIDsure enabled Sign-in page to a Sign-in Policy.... 18 Login as a SafeNet GrIDsure enabled user.... 19 Optional - Enabled Challenge-response requests... 19 Applicability 4

Applicability The information in this document applies to: SafeNet Authentication Service (SAS) A cloud authentication service of SafeNet Inc. SafeNet Authentication Service Service Provider Edition (SAS-SPE) The software used to build a SafeNet authentication service. SafeNet Authentication Service Private Cloud Edition (SAS-PCE) A term used to describe the implementation of SAS-SPE on-premise. Note: references to BlackShield and CRYPTOCard reflect CRYPTOCard branding prior to acquisition by SafeNet. Over time these references will change to reflect SafeNet branding including program installation locations. Applicability 5

Environment This integration guide is applicable to: Summary Security Partner Juniper Networks Product Name SA 700 / 6.2R1 (build 13255) Environment 6

Overview By default Juniper SSL VPN logons requires that a user provide a correct user name and password to successfully logon. This document describes the steps necessary to augment this logon mechanism with strong authentication by adding a requirement to provide a one-time password generated by a SafeNet token using the implementation instructions below. Overview 7

Preparation and Prerequisites Ensure a test user account can authenticate through the Juniper SSL VPN with a static password before configuring the Cisco Secure ASA to use RADIUS authentication. Ensure that Ports 1812 UDP and 1813 UDP are open to the SafeNet Authentication Service. If using SAS-SPE or SAS-PCE: Configure the SafeNet Authentication Service Agent for IAS/NPS or Juniper Steel Belted RADIUS to accept authentication requests from the ASA device. Add the test user account to SAS and assign a token. If use SAS Add the Juniper SSL VPN as an Auth Node (Comms tab Auth Nodes Module) Add the test user account to SAS and assign a token. Configuration Configuring Juniper SSL VPN for Two Factor Authentication Log into the Juniper SSL VPN Admin web portal. To add a new Radius Server, click on Auth Servers From the dropdown box, and select "Radius Server" Then click on the "New Server..." button Preparation and Prerequisites 8

Enter in a Name of the New Radius Server Enter in the IP address or DNS name of the Primary SafeNet Authentication Service Radius Server into the Radius Server field Enter in a Shared Secret into the Shared Secret field Place a checkmark in the Users authenticate using tokens and one-time passwords checkbox. Click Save Changes when completed. Optional: If there is a Secondary SafeNet Authentication Service Radius Server, please fill in all fields within the Backup Server section. NOTE: If the Juniper SSL VPN has other realms created, then please skip the rest of this section and go to Advanced Configuration section. After the New Radius Server has been created, the Radius Server need to be applied to a User Realm. On the left hand side, select User Realms Select Users Then select General Configuration 9

Under the Servers section, there will three down fields. They are: Authentication Directory/Attribute Accounting Change them Authentication and Accounting to use the new Radius Server was just created. Change Directory/Attribute to use Same as above Click Save Changes when completed. Next is to check the Sign-in Policies section to ensure that the default User URL is set to allow all User Realms to authenticate. Ensure that the Authentication Realm(s) section has say ALL. This means that any User Realms created within the Juniper SSL VPN can authenticate to this User URL. Testing SafeNet Authentication Next step is to test authentication against SafeNet Authentication Service via RADIUS with the newly configured Juniper SSL VPN web login portal. Open up a web browser and go to: http://junipersslvpn.dns.name/ Enter in a username and the One Time Password from a SafeNet Token. Click Sign In. Configuration 10

If the authentication is successful, the user will see the following screen. Advanced Configuration After configuring the Juniper SSL VPN for Radius authentication, the Juniper device may have issues applying the proper User Realm to the user that is authenticating. This is due to the RADIUS Server returns an access-accept, but the Juniper SSL VPN does not know which role to map to that user. To resolve this issue, a RADIUS Return Attribute of Filter-Id is added to the role mapping. Adding Filter-Id to a User Realm in Juniper SSL VPN Log into the Juniper SSL VPN Administrative web portal Go down to the Users section Highlight User Realms Then highlight the User Realm where the Filter-Id attribute will be added Finally click on Role Mapping. Advanced Configuration 11

Under the Role Mapping tab, click on the New Rule button. In the new Role Mapping Rule webpage please perform the following: Under the rule based on:, click the dropdown menu and select User attribute Then click the Update button Under the Attribute: section, click the dropdown menu and select Filter-Id (11) In the textbox below, type in a name for the Filter-Id (eg. Information Technology) Under the then assign these roles, select the Role (s) that will be assigned users after a successful authentication and the correct Filter-Id has been returned to the Juniper SSL VPN device. Click Save Changes when finished. Next, check the Sign-in Policies section to ensure that the default User URL is set to use the User Realm that has the Filter-Id added as a Role Mapping. Ensure that the Authentication Realm(s) section has only the correct User Realm displayed. This means that that User Realms created within the Juniper SSL VPN can authenticate to this User URL. Adding Filter-Id attribute to Remote Access Policy (Windows 2003) This is section is specifically for adding a Filter-Id attribute to a Remote Access Policy within Windows 2003 Internet Authentication Service (IAS). To add a new Network Policy with a Filter-Id in Microsoft Advanced Configuration 12

Network Policy Server, on Windows 2008, refer to Creating new Network Policy with Filter-Id attribute (Windows 2008) on page 15. Open up Microsoft Internet Authentication Service (2003) Select Remote Access Policies Right click Remote Access Policy created for SafeNet (in this example Authenticate to BlackShield and select Properties Perform the following Authenticate to BlackShield Properties popup: NAS-Port-Type matches Ethernet Click the Remove button, then click the Add button Select Day-And-Time-Restrictions, and click Add Select the Permitted radio button Click OK, and then Apply In the Authenticate to BlackShield Properties popup, click Edit Profile In the Edit Dial-in Profile popup, click the Advanced tab. Click the Add button Select the Filter-Id, and then click Add Advanced Configuration 13

In the new pop up, click the Add button Another pop up appears. Enter in the Filter-Id value that was entered in Adding Filter-Id to a User Realm in Juniper SSL VPN on page 11. Click OK when finished, OK again, then click Close The Advanced tab will now display the new Filter-Id that has been added to this Remote Access Policy. Click OK, and then OK again when finished. Expand Connection Request Processing in IAS Select Connection Request Policies Right click on the Policy that was created for BlackShield, and select Properties Advanced Configuration 14

In the Authentication tab, select the Authenticate requests on this server radio button Click OK when finished. After all changes have been made, open up Windows Services, and restart Internet Authentication Service. Creating new Network Policy with Filter-Id attribute (Windows 2008) This is section is specifically for adding a new Network Policy along with a Filter-Id attribute to Network Policy within Windows 2008 Network Policy Server (NPS). To add a Filter-Id attribute to a Remote Access Policy in Microsoft Internet Authentication Service on Windows 2003, refer to Adding Filter-Id attribute to Remote Access Policy (Windows 2003) on page 12. Open up Microsoft Network Policy Server (2008) Expand Policies Select Network Policies Right click Network Policies and select New Enter in a name for the new Network Policy under the Policy name field Ensure Type of network access server is set to Unspecified Click Next to continue Advanced Configuration 15

Click the Add button to add a new condition Scroll down and select Day and Time Restrictions, and Click Add Select the Permitted radio button, and then Click OK Click Next to continue Select the Access granted radio button Click the Next button three times Click the Add button to add a new attribute Select Filter-Id, and click Add Click the Add button, then enter in the Filter- Id value that was entered Adding Filter-Id to a User Realm in Juniper SSL VPN on page 11. Click OK, then OK again Click the Close button Click Next Then click Finish to create the New Network Policy Select Connection Request Policies in NPS Right click on the Policy that was created for BlackShield, and select Properties Advanced Configuration 16

Select the Settings tab Then select Authentication on the left hand side On the right hand side, select the Authenticate requests on this server radio button Click OK when finished After all changes have been made, open up Windows Services, and restart Network Policy Server Juniper SSL VPN and GrIDsure support The Juniper SSL VPN login page can be configured to authenticate hardware and GrIDsure token users. 1. The user enters the Juniper SSL VPN URL into their web browser. 2. The Juniper SSL VPN login page displays a Username and OTP field as well as a Login and Get GrID button. 3. The user enters their username into the Username field then selects Get Grid. The request is submitted from the user s web browser to the SafeNet Authentication Service Self Service site. 4. The SafeNet Authentication Service Self Service site displays the user s GrIDsure Grid within the Juniper SSL VPN login page. 5. The user enters their GrIDsure password into the OTP field then submits the request. 6. The Juniper SSL VPN device performs a RADIUS authentication request against the SafeNet Authentication Service. If the SafeNet credentials entered are valid, the user is presented with their Juniper SSL VPN portal otherwise, the attempt is rejected. Prerequisites 1. The Juniper SSL VPN device must support uploading custom login pages (Juniper SSL VPN model SA 2500 or higher). 2. The SafeNet Authentication Service Self Service Site must be publicly accessible to SSL VPN clients. Juniper SSL VPN and GrIDsure support 17

3. The Juniper device must already be configured to perform RADIUS authentication against the SafeNet Authentication Service. Adding the SafeNet Authentication Service - Self Service URL to the gridsure.js file 1. Open gridsure.js with a text editor. 2. Change the value of gridmakerurl to reflect the location of your SafeNet Authentication Service Self Service website then save the file. Example: var gridmakerurl = "https://www.mycompany.com/safenetss/index.aspx?getchallengeimage=true&username="; Adding the SafeNet GrIDsure enabled Sign-in page. 1. Login as an administrator to the Juniper device. 2. Select Authentication, Signing In, Sign-In Pages. 3. Select the "Upload Custom Pages" button. 4. In the "Sample Templates Files" section select "Sample". Download sample.zip to a temporary folder. 5. Rename the sample.zip file to cryptocard.zip. 6. Add the gridsure.js and LoginPage.thtml file to cryptocard.zip (if prompted, overwrite the existing LoginPage.thtml file). 7. In "Upload Custom Sign-In Pages", enter "CRYPTOCard GrID Enabled" into the Name field and in "Page Type" select "Access". In "Templates File" browse to the cryptocard.zip file then select the "Upload Custom Pages" button. Assigning the SafeNet GrIDsure enabled Sign-in page to a Sign-in Policy. 1. Login as an administrator to the Juniper device. 2. Select Authentication, Signing In, Sign-In Policies. 3. Select the CRYPTOCard authentication enabled "User URL". 4. In the Sign-in page section, select "CRYPTOCard GrID Enabled" then save the settings. Juniper SSL VPN and GrIDsure support 18

Login as a SafeNet GrIDsure enabled user. 1. Open a web browser and browse to the SafeNet enabled Juniper SSL VPN sign-in page. 2. Enter the username then select the "Get Grid" button, a grid will appear in the screen. 3. Enter the PIP into the password field then select Sign-in. Optional - Enabled Challenge-response requests 1. Login as an administrator to the Juniper device. 2. Select Authentication, Auth. Servers. 3. Select the SafeNet RADIUS enabled authentication server. 4. In "Custom Radius Rules" select "New Radius Rule...". 5. In "Display Name" enter "Display challenges", set "Response Packet Type" to "Access Challenge". In "Attribute criteria" set "Radius Attribute" to "Reply-Message(18) with a "Value" of "*". In "Then take action..." select "show Generic Login page". Save the changes. Juniper SSL VPN and GrIDsure support 19