Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction



Similar documents
ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

Chapter 3 Authenticating Users

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Connecting an Android to a FortiGate with SSL VPN

Using SonicWALL NetExtender to Access FTP Servers

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

Configuring Global Protect SSL VPN with a user-defined port

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

NETASQ ACTIVE DIRECTORY INTEGRATION

Introduction SSL-VPN. Creating and Installing Digital Certificates on SonicWALL SSL-VPN Appliances

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Configuring User Identification via Active Directory

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Managed Security Web Portal USER GUIDE

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring Internet Authentication Service on Microsoft Windows 2003 Server

DIGIPASS Authentication for Check Point Connectra

Chapter 5 Configuring the Remote Access Web Portal

Access to Webmail services via a Non Trust Computer

Two-Factor Authentication

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

SonicWALL SSL VPN 3.5: Virtual Assist

IP Phone Service Administration and Subscription

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

Introduction. Versions Used Windows Server 2003

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Authentication Methods

Contents. Platform Compatibility. Known Issues

Deploying RSA ClearTrust with the FirePass controller

Security Assertion Markup Language (SAML) Site Manager Setup

Summary. How-To: Active Directory Integration. April, 2006

netld External Authentication Setup Guide

SSL VPN Setup for Windows

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

DIGIPASS Authentication for Cisco ASA 5500 Series

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

Citrix Access on SonicWALL SSL VPN

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

SonicWALL SRA Virtual Appliance Getting Started Guide

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

SSL VPN Portal Options

Configure Single Sign on Between Domino and WPS

VPN Web Portal Usage Guide

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

How To Configure SSL VPN in Cyberoam

Chapter 10 Encryption Service

App Orchestration 2.5

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

OpenClinica SSL VPN Access New User Setup Guide

Client configuration and migration Guide Setting up Thunderbird 3.1

Configuring the Active Directory Plug-in

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

Chapter 7 Managing Users, Authentication, and Certificates

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

Exchange 2013 mailbox setup guide

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business SSO Connecting to Active Directory

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Scenario: IPsec Remote-Access VPN Configuration

FortiClient SSL VPN Client User s Guide

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

Exam : 1Y Citrix Access Gateway 8.0 Enterprise Edition: Administration. Title : Version : DEMO

Connecting to Delta College Exchange services off-campus

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Integration Guide. Swivel Secure Authentication

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

Contents. Before You Install Server Installation Configuring Print Audit Secure... 10

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

What is the Barracuda SSL VPN Server Agent?

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Mozilla Thunderbird: Setup & Configuration Learning Guide

SchoolBooking LDAP Integration Guide

SonicWALL Security Quick Start Guide. Version 4.6

WHMCS LUXCLOUD MODULE

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

EMR Link Server Interface Installation

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Entrust IdentityGuard Comprehensive

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

User Guide. You will be presented with a login screen which will ask you for your username and password.

Configuring Single Sign-on for WebVPN

Section 4 Application Description - LDAP

Creating a generic user-password application profile

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

NEFSIS DEDICATED SERVER

Transcription:

SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access for every user via the Global Policies and for users / groups via the Local Users / Local Groups configuration. You can choose to authenticate using Local users or the authentication server within the company s network. Authenticating with local users will require the Administrator to configure every user within the SSL- VPN appliance. The SSL-VPN also allows you to authenticate also via Active Directory, LDAP and Radius. When using an external authentication server, user accounts will be automatically created within the Local User database. This prevents the administrator from creating different policies for authenticated groups like Administrators, Sales department, Management department, etc. These policies need to be set on every user. This will be time consuming when a number of users need adjustments to their security policy. For Group authentication, it is more convenient to use LDAP and have different Portals for every LDAP Group. Since every LDAP group requires its own portal, each group will require a different URL for its corresponding portal. This technote provides procedures on how to configure different policies for Active Directory authenticated users on group level within one Portal. For this we will use 2 different users adminssl and userssl who we are going to give different policies on group level for access, the adminssl user will have all services allowed but the userssl user will have only HTTP access allowed. Created by P. van Herten

Windows 2003 Active Directory Before setting up the SSL-VPN appliance it is necessary to have the users adminssl and userssl configured within the Active Directory Users and Computers. SonicWALL SSL-VPN Appliance The following steps will explain how to setup the SSL-VPN appliance with multiple user groups for one single Active Directory domain. The setup as mentioned will be done via one single Portal for an Active Directory Domain authentication. To log into the Portal it will be necessary to setup a Portal and an Active Directory Domain.

This setup as mentioned is to ensure the security of the Network; therefore it has been chosen for a setup where all possibilities for the users to create their own bookmarks and file shares within the created Portal are disabled. To do this go to Portal > Portal Layout and press the configure button. The following popup screen will appear: With the setup Portal SNWL-EMEA it will be difficult for the Users to create any vulnerability for the network; however with this setup it will be the task of the Administrator to manage the bookmarks and policies. Now that the Portal is created it will be necessary to create a Domain which handles the authentication for the users. For this document I have chosen an Active Directory Domain. To create a new domain go to Portal > Domains and press the Add Domain button. The illustration on the left is an example Active Directory setup within the SSL-VPN appliance. This allows the Active Directory users of the (in this case) snwl-emea.com domain to login to the portal SNWL-EMEA (via the Portal URL). The only problem with this is that every user of the domain can login onto the Portal and, as we have mentioned, we would like to narrow the allowed policies for the users adminssl and userssl. Creating an external domain will automatically create a Local Group with the name of the domain within the SSL- VPN appliance.

It is possible to setup the allowed policies per user as mentioned within the introduction but it will be time consuming and difficult to manage when there are a lot of users which are allowed to use the SSL-VPN Portal login. It will be more difficult when multiple company departments need to login via the SSL-VPN appliance. To illustrate that kind of setup we will consider the adminssl user to be a member of a different department as the user userssl. For this it is necessary to have the groups for the different departments created already within the SSL-VPN. These groups can be created at the SSL-VPN Local Groups and doesn t need to match the groups within the Active Directory group (it is advisable to use the same user group as what has been set within the Active Directory). To create a Local Group go to Users > Local Groups and press the Add Group button. The illustration on the right shows an example how such a group is created. As you can see the Domain has been set to the Active Directory Domain snwl-emea.com which has been entered within the SSL-VPN appliance. For our setup we create two groups snwladmin and snwl-user, the user adminssl will be set within the group snwl-admin and the user userssl will be set within the group snwl-user. By authenticating via Active Directory it creates automatically an External User within the Local User Database, unfortunately it doesn't allow the administrator to change the Group for this user. Therefore, when you want to specify different policies for every user group, then you need to create manually the users adminssl and userssl within the Local User Database. To create a Local User go to Users > Local Users and press the Add User button. The illustration on the left shows an example how such a local user is created. As you can see the Group/Domain has been set to the Local Group snwl-user which has been entered within the SSL-VPN appliance. After this local user is created it will have the user s adminssl and userssl login in on a single portal and within their own group. This provides the Administrator a bit more workload but also the capability to manage the bookmarks and policies for every member of a group (like Sales Department) on group level and not per user based.

By default it is set to have no restricted policies set on the SSL-VPN portal; therefore it is advisable to narrow the allowed users to the user groups that have been set within the SSL-VPN appliance. For this the Global Policy can be used to deny any access (make it the most restricted policy) and create allow policies on the groups which has been set on the SSL-VPN appliance. The automatically created group snwl-emea.com will not be used for any allow policies and bookmarks to avoid any other user than the users adminssl and userssl. To create a security policy within the SSL-VPN go to Users > Local Groups, and press the configure button behind the group where the policy needs to be created within. The following illustration shows a way to setup a policy to allow HTTP access to any IP address. For this setup we have set this policy on the snwl-user group. (keep in mind the restrictions as set on the policy for the group). For the group snwl-admin we need to create a similar policy but for All Services. This way we have specified the policies as mentioned within the Introduction to have the user adminssl with every service allowed and the user userssl with only HTTP access. Now that the security is set for all the portals, groups and users it will leave one more task to do for the administrator. This task is to create bookmarks for the users to use and access. These bookmarks can be done for the different departments on the Local Groups snwl-admin and snwl-user which is easier to manage for the Administrator.