MIGRATION GUIDE. Authentication Server



Similar documents
INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for Check Point Connectra

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. General Radius Config

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Identikey Server Getting Started Guide 3.1

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

DIGIPASS Authentication for Juniper ScreenOS

IDENTIKEY Appliance Administrator Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

OVERVIEW. DIGIPASS Authentication for Office 365

DIGIPASS as a Service. Google Apps Integration

Hyper-V Installation Guide. Version 8.0.0

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

DIGIPASS Authentication for Windows Logon Product Guide 1.1

Check Point FDE integration with Digipass Key devices

Two-Factor Authentication

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: DirectAccess

RSA Authentication Manager 7.1 Basic Exercises

IDENTIKEY Server Windows Installation Guide 3.2

axsguard Gatekeeper Internet Redundancy How To v1.2

Strong Authentication for Microsoft SharePoint

Creation date: 09/05/2007 Last Review: 31/01/2008 Revision number: 3

Internet Redundancy How To. Version 8.0.0

axsguard Gatekeeper Open VPN How To v1.4

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Strong Authentication for Juniper Networks

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

IDENTIKEY Server Windows Installation Guide 3.1

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Digipass for Citrix VM3.0: troubleshooting guide. Creation date: 11/07/2007 Last Review: 30/11/2007 Revision number: 2

Digipass Plug-In for IAS troubleshooting guide. Creation date: 15/03/2007 Last Review: 24/09/2007 Revision number: 3

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication in details

DIGIPASS Pack for Citrix on WI 4.5 does not detect a login attempt. Creation date: 28/02/2008 Last Review: 04/03/2008 Revision number: 2

NetMotion Mobility XE

IDENTIKEY Server Product Guide

Strong Authentication for Juniper Networks SSL VPN

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Identikey Server Product Guide

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

axsguard Gatekeeper Reverse Proxy How To 1.5

BlackShield ID Agent for Remote Web Workplace

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Identikey Server Windows Installation Guide 3.1

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

SafeNet Authentication Service

Security Provider Integration RADIUS Server

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Defender Token Deployment System Quick Start Guide

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

axsguard Gatekeeper IPsec XAUTH How To v1.6

Agent Configuration Guide

RSA SecurID Ready Implementation Guide

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Data Collection Agent for NAS EMC Isilon Edition

Endpoint Security VPN for Windows 32-bit/64-bit

Using Microsoft Active Directory Server and IAS Authentication

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide

Using Vasco IDENTIKEY Server with NetScaler

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

A brief on Two-Factor Authentication

NetMotion + YubiRADIUS Quick Start Guide

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

RSA SecurID Ready Implementation Guide

Strong Authentication for Cisco ASA 5500 Series

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

RSA SecurID Two-factor Authentication

Transcription:

MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server

Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility for its accuracy and/or completeness. In no event will VASCO Data Security be liable for damages arising directly or indirectly from any use of the information contained in this document. Copyright Copyright 2013 VASCO Data Security, Inc, VASCO Data Security International GmbH. All rights reserved. VASCO, Vacman, IDENTIKEY AUTHENTICATION, axsguard and DIGIPASS logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc. and/or VASCO Data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights in the U.S. and other countries. Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners. 1 RSA Authentication Manager to IDENTIKEY Authentication Server

Table of Contents 1 Introduction... 3 2 RSA Authentication Manager Architecture... 4 3 Migration architecture... 5 3.1 General overview... 5 3.2 RADIUS Authentication with IDENTIKEY Authentication Server and RSA Authentication Manager... 6 4 Final architecture... 7 4.1 General Overview... 7 4.2 RADIUS Authentication with IDENTIKEY Authentication Server... 7 5 RSA Authentication Manager Configuration... 8 5.1 User configuration... 8 5.2 RADIUS client and Authentication Agent... 9 6 IDENTIKEY Authentication Server configuration... 12 6.1 Set time and date... 12 6.2 Policy Configuration... 13 6.3 RADIUS Client configuration... 17 6.4 RADIUS Back-End configuration... 18 6.5 User Configuration... 20 6.6 DIGIPASS configuration... 23 7 Migration scenario details... 26 7.1 Dynamic User Registration (DUR)... 26 7.2 Migration results... 28 8 About VASCO Data Security... 29 2 RSA Authentication Manager to IDENTIKEY Authentication Server

1 Introduction In this White Paper we will describe the migration of an existing RSA Authentication Manager implementation, used in conjunction with a RADIUS enabled system (e.g. Firewall, VPN SSL/VPN, NAS), towards a VASCO solution, based upon IDENTIKEY Authentication Server and the DIGIPASS products. We have tested this migration with: RSA ACE Server 6.0 RSA Authentication Manager 7.1 (used in this guide) We assume that the person performing the migration has the required experience with installing RSA Authentication Manager and the IDENTIKEY Authentication Server. This document will guide you through the migration process, showing the different configuration steps. 3 RSA Authentication Manager to IDENTIKEY Authentication Server

2 RSA Authentication Manager Architecture Figure 1 illustrates a typically deployment solution architecture, with a VPN SSL/VPN system using RADIUS authentication in combination with the RSA Authentication Manager. Figure 1: RSA Authentication Manager Architecture The RSA Authentication Manager is typically setup with the built-in RADIUS Server. Through the RADIUS protocol, the VPN or SSL/VPN will check whether a certain user will be given access to the network, after entering a correct One Time Password, generated by the SecurID token. 4 RSA Authentication Manager to IDENTIKEY Authentication Server

3 Migration architecture 3.1 General overview The concept is very easy: the IDENTIKEY Authentication Server is installed as front-end of the RSA Authentication Manager. This means that the IDENTIKEY Authentication Server will intercept each RADIUS authentication request going to the RSA Authentication Manager. Initially the users will not exist on the IDENTIKEY Authentication Server and it will transparently forward the RADIUS Authentication request (using Back-End RADIUS authentication) to the RSA Authentication Manager, which will verify the users credentials such as the SecurID token. The Dynamic User Registration (DUR) feature of the IDENTIKEY Authentication Server will have to be enabled, assuring that users are created automatically in its own user database. As the SecurID token reaches its end of life, the authentication will no longer be sent to the back-end RSA Authentication Manager but handled locally and a DIGIPASS will be assigned to the user. Special features as DUR and Back-End authentication makes the VM a very easy deployable authentication server system. (Please see further). Figure 2: Migration architecture 5 RSA Authentication Manager to IDENTIKEY Authentication Server

3.2 RADIUS Authentication with IDENTIKEY Authentication Server and RSA Authentication Manager 1. A remote user initiates a VPN or SSL/VPN connection. 2. The VPN box submits a RADIUS authentication request to the IDENTIKEY Authentication Server. 3. The IDENTIKEY Authentication Server will perform a back-end authentication request to the RSA Authentication Manager. 4. The RSA Authentication Manager performs its verification and returns the results to the IDENTIKEY Authentication Server. 5. The IDENTIKEY Authentication Server forwards the results to the VPN box. 6. The VPN box takes an appropriate action based on the returned RADIUS results. 6 RSA Authentication Manager to IDENTIKEY Authentication Server

4 Final architecture 4.1 General Overview The authentication is now handled by the IDENTIKEY Authentication Server and will no longer go to the RSA Authentication Manager. A DIGIPASS will be assigned to the user so he can start using its DIGIPASS instead of the RSA token. This way the migration can be done very easy and without much hassle for the end-users as well as the administrators. Figure 3: Final architecture 4.2 RADIUS Authentication with IDENTIKEY Authentication Server 1. A remote user initiates a VPN or SSL/VPN connection. 2. The VPN box submits a RADIUS authentication request to the IDENTIKEY Authentication Server. 3. The IDENTIKEY Authentication Server performs the OTP verification. 4. The VPN box takes an appropriate action based on the returned RADIUS results. 7 RSA Authentication Manager to IDENTIKEY Authentication Server

5 RSA Authentication Manager Configuration 5.1 User configuration On our system we have created a user vasco on the RSA Authentication Manager, with a RSA SecurID Key fob assigned, which is configured to be used without a STATIC PIN/password. Figure 4: vasco user in RSA Authentication Manager 8 RSA Authentication Manager to IDENTIKEY Authentication Server

5.2 RADIUS client and Authentication Agent Adding the RADIUS client and the Authentication agent, can be done in one step. Go to RADIUS RADIUS Clients Add New. Figure 5: RADIUS client and Authentication Agent (1) As the Client Name, fill in the FQDN of the IDENTIKEY Authentication Server hostname. Fill in the IP Address and the Shared Secret. Now click the Save and Create Associated RSA Agent. Figure 6: RADIUS client and Authentication Agent (2) 9 RSA Authentication Manager to IDENTIKEY Authentication Server

You will now automatically enter the new Authentication Agent page. Select the RADIUS profile that you would like to use. Figure 7: RADIUS client and Authentication Agent (3) Click Save to continue. Figure 8: RADIUS client and Authentication Agent (4) 10 RSA Authentication Manager to IDENTIKEY Authentication Server

The IDENTIKEY Authentication Server will now have been added automatically to the authentication agents. Figure 9: RADIUS client and Authentication Agent (5) 11 RSA Authentication Manager to IDENTIKEY Authentication Server

6 IDENTIKEY Authentication Server configuration 6.1 Set time and date Most DIGIPASS use a Time Based algorithm for generating the One Time Password. Those DIGIPASS are created with the internal real time clock set to GMT. As such, it is important to set the date, time and time zone of the server running the IDENTIKEY Authentication Server correctly so that GMT can be derived correctly. Figure 10: Setting correct date, time and time zone You can also use the NTP settings to get the correct time provided through the internet. Figure 11: Using NTP settings 12 RSA Authentication Manager to IDENTIKEY Authentication Server

6.2 Policy Configuration A RADIUS client needs a policy to specify the setting to work with. For now we create a new policy starting from blank. Select Policy Create. Figure 12: Policy Configuration (1) Fill in the Policy ID and add an optional description. As we create a blank policy, set Inherits from to None and click Create. Figure 13: Policy Configuration (2) 13 RSA Authentication Manager to IDENTIKEY Authentication Server

You will now receive the message that the policy was created successfully so click on the Click here to manage your policy. Figure 14: Policy Configuration (3) In the general Policy tab, click the Edit button. Figure 15: Policy Configuration (4) 14 RSA Authentication Manager to IDENTIKEY Authentication Server

Set Local Authentication to None, Back-End Authentication to Always and Back-End Protocol to RADIUS Click the Save button. Figure 16: Policy Configuration (5) You will now see the changed settings appear in the next screen. Select the Policy User tab (not the general USERS tab!) and click the Edit button. Figure 17: Policy Configuration (6) 15 RSA Authentication Manager to IDENTIKEY Authentication Server

Set Dynamic User Registration to Yes and click the Save button. Figure 18: Policy Configuration (7) That s it for the policy; let s use it in the RADIUS client now. 16 RSA Authentication Manager to IDENTIKEY Authentication Server

6.3 RADIUS Client configuration The RADIUS Client is where the calls originate from. The client in our test environment will be a server running our VASCO RADIUS Simulator. Normally this will be a NAS, VPN or Web client. Select Clients Register. Figure 19: RADIUS Client configuration (1) Client Type in this case will be RADIUS Client and the Location is the originating IP address of the RADIUS call. Choose the correct Policy you created in the previous chapter and select RADIUS as the Protocol ID. Finally fill in a shared secret and click the Create button. Figure 20: RADIUS Client configuration (2) 17 RSA Authentication Manager to IDENTIKEY Authentication Server

6.4 RADIUS Back-End configuration The RADIUS back-end will be the RSA Authentication Manager. So create it with the details for this server. Select Back-End Register Radius Back-End. Figure 21: RADIUS Back-End configuration (1) Most required fields are Back-End Server ID (a name for this server), Domain Name (which domain to use in IDENTIKEY Authentication Server), Authentication IP Address (IP address of the RSA Authentication Manager), Authentication Port (RSA port) and Shared Secret. It s probably best to fill in Timeout and Retries also. Click the Create button to save the settings. Figure 22: RADIUS Back-End configuration (2) 18 RSA Authentication Manager to IDENTIKEY Authentication Server

Once the RADIUS settings are done, it might be a good time to test the original configuration before changing any user details or migrating to a DIGIPASS. This is explained in chapter 7.1 Dynamic User Registration. 19 RSA Authentication Manager to IDENTIKEY Authentication Server

6.5 User Configuration The following steps will only work once the user is known through the DUR (Dynamic User Registration) procedure. This means the user needs to have authenticated once to IDENTIKEY Authentication Server. This way the user will be created on IDENTIKEY Authentication Server. They are necessary once a user has to be migrated from a RSA token to a DIGIPASS. These settings need to be changed per user, as we need to overrule the policy values. Select Users and click the User you want to migrate. Figure 23: User Configuration (1) Under the User Account settings click the Edit button. 20 RSA Authentication Manager to IDENTIKEY Authentication Server

Figure 24: User Configuration (2) 21 RSA Authentication Manager to IDENTIKEY Authentication Server

Select Local Authentication as Digipass/Password and set Back-End Authentication to None; click Save to continue. Figure 25: User Configuration (3) The user is now been setup to work with a DIGIPASS, so let s assign one to this user. 22 RSA Authentication Manager to IDENTIKEY Authentication Server

6.6 DIGIPASS configuration In the same user detail settings, go to the Assigned Digipass tab and click the Assign button. Figure 26: DIGIPASS configuration (1) If you have not that many DIGIPASS imported on your system, the easiest way is just to change the On Clicking Next value to: Search now to select Digipass to assign and click Next. Otherwise you will have to search for a part of the serial number of do a search for a certain type of application or a certain type of DIGIPASS. Figure 27: DIGIPASS configuration (2) Now select the DIGIPASS you want to assign and click Next. 23 RSA Authentication Manager to IDENTIKEY Authentication Server

Figure 28: DIGIPASS configuration (3) You could now change the grace period if you want and click Assign to complete these steps. Figure 29: DIGIPASS configuration (4) 24 RSA Authentication Manager to IDENTIKEY Authentication Server

The DIGIPASS is now assigned to the user and can be used. Click Finish to return to the first screen. Figure 30: DIGIPASS configuration (5) 25 RSA Authentication Manager to IDENTIKEY Authentication Server

7 Migration scenario details 7.1 Dynamic User Registration (DUR) We will test the vasco user with the VACMAN RADIUS Client Simulator from Vasco. The VACMAN RADIUS Client Simulator is a program that simulates RADIUS Authentication and Accounting processing in a similar fashion to RADIUS enabled NAS and Firewall devices. The simulator can be used to test user (and static-password) authentication, (DIGIPASS) Digipass password authentication, estimate RADIUS server performance, system overload, and assist in detection of resource (memory, handle, etc.) leakage. When we open the simulator we have to change some things first. Server IP should be the same IP of the IDENTIKEY Authentication Server. The Auth. Port should be define as 1812 and the Acct. port as 1813. These are the default values, if you would have changed these values during the installation of your IDENTIKEY Authentication Server, you should fill in your ports. Next fill in the Shared secret. Click one of the yellow ports, allowing you to enter User ID and password. Figure 31: RADIUS Client Simulator configuration 26 RSA Authentication Manager to IDENTIKEY Authentication Server

In the User ID field you enter vasco (the test user we have created.). In the password field you give the RSA SecurID PASSCODE (One Time Password). Click Login to test the authentication for this user. Also notice the returned RADIUS attributes. Figure 32: Successful logon with original users When the user vasco logged in successfully, he will be created automatically in the IDENTIKEY Authentication Server (Dynamic User Registration). From now on you can follow the steps written at 6.5 User configuration. 27 RSA Authentication Manager to IDENTIKEY Authentication Server

7.2 Migration results Once the user s properties and settings are changed to work with a DIGIPASS you will see that the authentication returns no RADIUS attributes. This proofs the authentication has been performed by IDENTIKEY Authentication Server. Figure 33: Migration results From now on, users can be migrated to a DIGIPASS one at the time when their SecurID token gets end of life or sooner. 28 RSA Authentication Manager to IDENTIKEY Authentication Server

8 About VASCO Data Security VASCO designs, develops, markets and supports patented Strong User Authentication products for e-business and e-commerce. VASCO s User Authentication software is carried by the end user on its DIGIPASS products which are small calculator hardware devices, or in a software format on mobile phones, other portable devices, and PC s. At the server side, VASCO s IDENTIKEY products guarantee that only the designated DIGIPASS user gets access to the application. VASCO s target markets are the applications and their several hundred million users that utilize fixed password as security. VASCO s time-based system generates a one-time password that changes with every use, and is virtually impossible to hack or break. VASCO designs, develops, markets and supports patented user authentication products for the financial world, remote access, e-business and e-commerce. VASCO s user authentication software is delivered via its DIGIPASS hardware and software security products. With over 25 million DIGIPASS products sold and delivered, VASCO has established itself as a world-leader for strong User Authentication with over 500 international financial institutions and almost 3000 blue-chip corporations and governments located in more than 100 countries. 29 RSA Authentication Manager to IDENTIKEY Authentication Server