ESET Secure Authentication Java SDK



Similar documents
Your guide to the HSBC Digital Security Device. HSBC Bank USA, N.A All rights reserved.

HOTPin Integration Guide: DirectAccess

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Deployment of Keepit for Windows

BlackShield ID Best Practice

Smart Card Two Factor Authentication

McAfee One Time Password

Electronic Questionnaires for Investigations Processing (e-qip)

Copyright

Securing Administrator Access to Internal Windows Servers

Swivel Multi-factor Authentication

Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Accessing the Media General SSL VPN

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

1. Please login to the Own Web Now Support Portal ( with your address and a password.

Upgrade Guide BES12. Version 12.1

Enrollment Process for Android Devices

ESET SECURE AUTHENTICATION. Check Point Software SSL VPN Integration Guide

Egnyte Single Sign-On (SSO) Installation for OneLogin

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

Two Factor Authentication - USER GUIDE

Device LinkUP + Desktop LP Guide RDP

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

4cast Server Specification and Installation

DocuSign for Microsoft Dynamics CRM

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Print Manager Plus 2010 How to Migrate your Database to a New SQL or Print Server

Integration Guide. Swivel Secure Authentication

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.

Ultra-strong authentication to protect network access and assets

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets

Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems

IIS SECURE ACCESS FILTER 1.3

Macs are not directly compatible with Noetix.

OnCommand Performance Manager 1.1

External Authentication with Citrix Access Gateway Advanced Edition

Wireless Guest Server User Provisioning Instructions

User Manual. Version Yeastar Technology Co., Ltd.

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Integration Guide. Duo Security Authentication

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Integration Guide. SafeNet Authentication Service. VMWare View 5.1

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

HTTPS hg clone plugin library SSH hg clone plugin library

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

Safewhere*Identify 3.4. Release Notes

IDENTIKEY Server Windows Installation Guide 3.2

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Keeping your VPN protected

Premium Server Client Software

Using Authorize.net for Credit Card Processing in YogaReg

Step by Step. Use the Cloud Login Website

MBAM Self-Help Portals

Checkmate 5.5 Self Hosted Quick Start Guide

YubiKey Authentication Module Design Guideline

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

IDENTIKEY Server Windows Installation Guide 3.1

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Virtual Code Authentication User s Guide. June 25, 2015

educ Office Remove & create new Outlook profile

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Link and Sync Guide for Hosted QuickBooks Files

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

A Guide to New Features in Propalms OneGate 4.0

TARGETPROCESS HELP DESK PORTAL

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Using Blackboard Learn 9 Web Services - Part 2 Learning About The Web Service Classes And Methods

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

OpenScape Business V2

Proven. Trusted.

Sugar Open Source Installation Guide. Version 4.5.1

Installation Guide. (June 2014)

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

Microsoft SQL Server Staging

ESET SECURE AUTHENTICATION. Product Manual

Creating a User Profile for Outlook 2013

Case Closed Installation and Setup

Security Upgrade FAQs

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

ESET SECURE AUTHENTICATION. Cisco ASA Internet Protocol Security (IPSec) VPN Integration Guide

Mobile OTP Issuance Existing Users Non- Roaming Flow (Private Computer)

Integration Overview. Web Services and Single Sign On

SAS Agent for Outlook Web App

This manual will illustrate how to integrate your WordPress Blog or website with the Docebo Learning Management System.

Video Administration Backup and Restore Procedures

Integrating with IBM Tivoli TSOM

Transcription:

ESET Secure Authentication Java SDK Getting Started Guide Document Version 1.0

ESET Secure Authentication Java SDK 2 Introduction This document details what is required to add a second authentication factor to an existing application by using the ESET Secure Authentication SDK. SDK Overview The ESET Secure Authentication SDK provides both user management and authentication functionality. The SDK integrates with custom applications by storing 2FA data in the system s existing user database. This means that there are minimal external dependencies making it possible for system architects to add 2FA to nearly any custom system. Figure 1: Before ESET Secure Authentication SDK integration

ESET Secure Authentication Java SDK 3 Figure 2: After ESET Secure Authentication SDK integration The remainder of this document provides instructions for obtaining the SDK, using the example code and finally integrating the SDK into your existing platform. Step 1: Activate Your License To use the ESET Secure Authentication SDK, you require an API Key and a Shared Secret. These credentials are derived from your ESET Secure Authentication license. To derive your SDK credentials, navigate to https://esa.eset.com/sdk. Log in using the ESET Secure Authentication license information you used to access the SDK download. The resulting page will display your SDK license information. To activate your license for the SDK, click Activate in the SDK Information section, as depicted in Figure 3.

ESET Secure Authentication Java SDK 4 Step 2: Running the Sample Code The quickest way to get up and running with the SDK is to run the sample code. Download the sample application.zip file from https://esa.eset.com/sdk/docs/samples/ The zip file contains a README.txt follow the instructions therein. Step 3: Using the SDK Users of the SDK can consult the ESET Secure Authentication SDK Developer Guide for instructions on integration with their platform. The SDK Developer Guide is available here: https://esa.eset.com/sdk/docs/ This guide contains: How to reference the SDK library in an application An overview of how to use the SDK Detailed reference documentation for namespaces and classes Step 4: SDK System Integration Once the SDK has been evaluated, it must be integrated with your existing authentication system. The following steps are required to integrate the ESET Secure Authentication SDK into a system: Extend the user storage database with extra 2FA fields Implement classes for reading and writing 2FA data for users Update existing login UI to accept OTPs Update existing user management UI to manage a user s 2FA settings Implement optional components The subsequent sections of this document describe these steps.

ESET Secure Authentication Java SDK 5 Database Requirements The ESET Secure Authentication SDK stores a user s 2FA data in your existing database as a string. You will therefore need to add a column capable of storing unicode strings of varying length. MySQL users: We recommend that you use the TEXT datatype Postgres users: We recommend that you use the character_data datatype Oracle users: We recommend that you use the NCLOB datatype Microsoft SQL Server users: We recommend that you use the nvarchar(max) datatype If you do not have a mobile telephone number field for each user, it is highly recommended that you create a field capable of storing mobile numbers (varying length numerical string). This will help ensure compatibility with future ESET Secure Authentication releases. Reading and Writing 2FA Data The ESET Secure Authentication SDK exposes the IUserStorage interface that transports data between the SDK and your database; this interface must be implemented to read and write 2FA data (see the SDK Developer Guide for details). The interface uses two methods that must be implemented, LoadUser and SaveUser: loaduser This method uses the following input parameter: string username - the user whose 2FA data will be retrieved This method has the following return type: string data - the 2FA data for the user In other words, the supplied username must be used to return the 2FA data for that user.

ESET Secure Authentication Java SDK 6 saveuser This method has the following input parameters: string username - the user whose 2FA data you want to store string data - the 2FA data to store This method has no return value. In other words, the SDK will provide the username and 2FA data make sure that this data is written to the 2FA field in your user database. Update Login UI With 2FA Methods This section describes the authentication logic that must be implemented for 2FA users. Once a user has authenticated their static password against the existing system, the pre-authenticate method must be called for that user. This method checks the 2FA type for the user (SMS, Mobile App, etc.) and sends an SMS OTP if required. It returns a result that contains the expected credential type, which must be used to guide the user during the logon process. Details of this type may be found in the Developer Guide. An example of a single-factor authentication system is provided in 4 Figure 4: Single factor authentication logic (before integration) An example of authentication logic after the ESET Secure Authentication SDK has been integrated is depicted in Figure 5. Note that the logic for this will vary from system to system, depending on the requirements.

ESET Secure Authentication Java SDK 7 Figure 5: Two-factor authentication logic with the ESET Secure Authentication SDK

ESET Secure Authentication Java SDK 8 Update the Management UI to Enable/Disable 2FA For Users User management is performed via the TwoFactorUser class. Users can be enabled for 2FA using mobile app OTPs or SMS OTPs. The transitioning state allows a user to upgrade from SMS to Mobile App OTPs. An administrator may perform user management, or users may enroll themselves. The TwoFactorUser class exposes methods (actions) that may be performed on users. Additional Components The following components are optional. Logging Integration (Recommended) The ESET Secure Authentication SDK logs non-critical events via a logging wrapper, so as not to limit you to any logging framework. This means it is easy to use your existing logging framework. See the Developer Guide for further details. Auditing Integration (Recommended) The SDK audits various critical events via the IAuditor interface. If this interface is not implemented, auditing events are sent to the configured logger. The implementation is set on the Auditor property of the TwoFactorConfiguration class. Using an Alternative SMS Gateway (Optional) The ESET Secure Authentication SDK sends SMS messages via theglobal ESET SMS gateway. You can configure your own SMS Gateway by implementing the ITextMessageSender interface.