NETASQ ACTIVE DIRECTORY INTEGRATION



Similar documents
NETASQ SSO Agent Installation and deployment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

NETASQ MIGRATING FROM V8 TO V9

How to Configure Captive Portal

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

What is the Barracuda SSL VPN Server Agent?

PineApp Surf-SeCure Quick

F-Secure Messaging Security Gateway. Deployment Guide

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Configuring Sponsor Authentication

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

OneLogin Integration User Guide

Managed Security Web Portal USER GUIDE

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Configuring User Identification via Active Directory

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

How To - Implement Clientless Single Sign On Authentication with Active Directory

qliqdirect Active Directory Guide

Gigabyte Content Management System Console User s Guide. Version: 0.1

Click Studios. Passwordstate. Installation Instructions

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Group Management Server User Guide

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

Chapter 8 Monitoring and Logging

Deploying RSA ClearTrust with the FirePass controller

Integrating LANGuardian with Active Directory

Administrator Guide. v 11

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

How to Configure Active Directory based User Authentication

Dell Compellent Storage Center

Remote Access Technical Guide To Setting up RADIUS

SSL SSL VPN

Using LDAP Authentication in a PowerCenter Domain

Installation Steps for PAN User-ID Agent

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

Configuration Backup and Restore. Dgw v2.0 May 14,

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Scenario: IPsec Remote-Access VPN Configuration

Portal User Guide. Customers. Version 1.1. May of 5

Preparing for GO!Enterprise MDM On-Demand Service

EMR Link Server Interface Installation

VMware Identity Manager Connector Installation and Configuration

Getting Started with AD/LDAP SSO

User Identification (User-ID) Tips and Best Practices

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

Security Provider Integration Kerberos Authentication

How To - Implement Single Sign On Authentication with Active Directory

Blue Coat Security First Steps Solution for Integrating Authentication

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Two Factor Authentication in SonicOS

Hosted Microsoft Exchange Client Setup & Guide Book

Connecting to Delta College Exchange services off-campus

How to Logon with Domain Credentials to a Server in a Workgroup

TECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Configuring Global Protect SSL VPN with a user-defined port

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Chapter 3 Authenticating Users

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

AVG Business SSO Connecting to Active Directory

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Configuration Guide BES12. Version 12.1

FileCruiser. VA2600 SR1 Quick Configuration Guide

Configuration Guide. BES12 Cloud

Centrify Cloud Connector Deployment Guide

Configuration Guide BES12. Version 12.2

Configure Single Sign on Between Domino and WPS

User Guide. Cloud Gateway Software Device

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

CA Performance Center

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Service Overview & Installation Guide

CRM to Exchange Synchronization

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

nexvortex Setup Guide

Authentication Methods

Deploying NetScaler Gateway in ICA Proxy Mode

Quick Start Guide Sendio Hosted

Setting Up Scan to SMB on TaskALFA series MFP s.

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

HP Device Manager 4.6


Steps for Basic Configuration

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

QliqDIRECT Active Directory Guide

Advanced Administration

SharePoint AD Information Sync Installation Instruction

Please return this document to when complete.

Clientless SSL VPN Users

Transcription:

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos authentication method 7 Validating authentication FILTER RULES BASED ON AUTHENTICATION 3 Redirecting unauthenticated users 3 User based rules 4 Example ruleset 4 ADVANCED LDAP CONFIGURATION 6 Backup domain controller 6 LDAP access via SSL 7

Running the directory configuration wizard In this chapter you will learn how to connect NETASQ to Active Directory to perform user and group based authentication for your filter and VPN services. You can start the wizard for connecting to Active Directory by selecting Users Directory Configuration in the web-based manegement site. Select Connect to a Microsoft Active Directory on this page. 2 NOTE If you have got a previosuly configured directory access (either Active Directory or LDAP), you won t see the wizard. You have to press the small wizard icon in the top right corner. WARNING Since you can t have multiple authentication sources at the same time, by finishing the wizard the content of your formal internal LDAP database will be deleted. Configurations for external directories will be also lost.

On the next page configure your connection settings for the domain controller.on this page you can t change to LDAPS or add a secondary domain controller. You will have the oppurtunity to configure them after finishing the wizard. 3 Field Server Port ID Setting Create a host object for the domain controller, with its internal IP. Set it to 389 (ldap) now. If you don t want to allow write access for your NETASQ firewall, you should choose a user with read-only access to the LDAP. For security reasons you are not supposed to connect with Administrator account. You have to use the DN of the user. If the user is in an Active Directory container, the right format is: cn=administrator,cn=users If the user is in an organizational unit, eg.: cn=testuser,ou=employees

NOTE Before setting up the connection, make sure that Windows firewall on the Domain Controller doesn t not block incoming LDAP access. You can allow it in Windows Firewall with Advanced Security Inbound rules Active Directory Domain Controller LDAP (TCP-In). For Kerberos authentication, you should also check the firewall rules. Enable access to the captive portal in third step. Captive portal will be used to authenticate the users. 4

Validating LDAP connection After the wizard successfully finished, you should check if the firewall can see your domain users. Please go to Configuration Users Users, and check the user list and attributes. 5

Authentication settings You can set the properties of captive portal at Configuration Users Authentication. User authentication For Active Directory please select authenticate directly on the directory with the user account at the General Advanced properties. 6

Kerberos authentication method The wizard by default configures LDAP authentication. For security reasons you should use Kerberos authentication. WARNING For Kerberos authentication the time on the firewall and on the domain controlles must be synchronized. More than five minutes delay results in authentication failures. Please make sure that the firewall s clock and the domain controller s clock is synchronized, and the same timezone is used on both devices. You can check time settings in Configuration System Configuration General configuration. As a best practice we advice to set the domain controller as an NTP server. 7

You can enable Kerberos authentication in Configuration Users Authentication Available methods. Please select Add an authentication method Kerberos. 8 After adding the authentication method, you should enable it for internal interfaces. You will need to enable it for external interfaces, if you would like to use SSL VPN later.

Field Domain name (FQDN) Access to server Backup server Setting The Kerberos realm name, usually equals to the Windows domain name. It must be in capital letters. Please select the primary domain controller s host object and kerberos_udp port for communication. Please select the secondary domain controller s host object and kerberos_udp port for communication. 9

Please make sure that the Kerberos method is configured as a default authentication. You can check it at Configuration Access Privileges Default access. 0

Validating authentication You can test authentication by going to the captive portal directly. You can access it on the internal IP address of the firewall via HTTPS. https://ip_address/auth Please enter your username without the domain prefix or postfix. Please select the authentication period. After pressing login you will be asked for your password. NOTE By default the maximum authentication period is 8 hours. You can modify it at Configuration Users Authentication Internal interfaces Authentication periods allowed. If authentication was successful, please logout. Press Login/Logout, type again the username and press the Logout button.

If you have any problems during authentication, please refer to the authentication logs. You can follow authentication logs by using the CLI on the web interface. Go to Configuration System CLI and type the following command: monitor log auth. 2

Filter rules based on authentication You can create filter rules based on Active Directory users and groups. We will give a simple example for this way of using Active Directory integration. Redirecting unauthenticated users You can force your users to be authenticated. In a Filtering policy please select New rule Authentication rule. 3 In the wizard select from which network the users should be redirected to the authentication portal. In the example below, unauthenticated users from Network_OFFICE will be redirected to the authentication, if they want to reach a website on the Internet.

User based rules In the filtering and NAT rules you can configure users and group to be used as source. That way you can attach different security policies to different users or groups. Please double click on Source column in Filtering configuration. Example ruleset In the ruleset below you can see an example configuration of user based filter policies. 4 st rule: redirect all unauthenticated users to the captive portal, if they start a HTTP request on the internet 2 nd rule: Management has got full access to any web pages, without any restrictions. Antivirus is applied for their connections. 3 th rule: Employees have restricted access during workhours to internet using WorktimeURLs URL filtering list. 4 th rule: Employees out of work hours have different URL filtering slot, which is not so restrictive like during workhours.

NOTE In the filtering rules we have created rules only for HTTP traffic. For HTTPS connections, you need to use SSL filtering rules. If you wouldn t like to be redirected to the captive portal, you can use transparent authentication. In this case the users after logging in to the domain will be automatically authenticated. Please refer to our SSO SPNEGO technical note. 5

Advanced LDAP configuration Backup domain controller If you want to configure a secondary domain controller to be used, you can do it by going back to Configuration Users Directory configuration and selecting Advanced properties. Please add a host object for the secondary domain controller in the Backup server field. You should validate access by pressing the button Test access to the directory. 6

LDAP access via SSL NETASQ supports accessing Active Directory user database via SSL protocol. This is additional step, which can make your connection secure between the firewall and the domain controllers. Open the Configuration Users Directory configuration page, and select Secure Connection (SSL). Check Enable SSL access. In the Certificate authority field, please add the CA which issued the domain controller s certificate. You need to import this CA certificate at Configuration Objects Certificates. 7 NOTE You might need several changes on the domain controllers, to enable LDAP SSL access.