Server Administrator Guide
Server Administrator Guide
Server Administrator Guide
Advanced Authentication
Version 6.0
Legal Notice
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
rights, patent policy, and FIPS compliance, https://www.netiq.com/company/legal/.
Copyright © 2016 NetIQ Corporation, a Micro Focus company. All Rights Reserved.
Contents
Contents 3
3.4.9 Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.4.10 PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.4.11 RADIUS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.4.12 SMS OTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.4.13 Security Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.4.14 Smartphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.4.15 Swisscom Mobile ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.4.16 Touch ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.4.17 Voice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.4.18 Voice OTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.5 Creating a Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.6 Configuring Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.6.1 Configuring an Existing Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.6.2 Creating a Customized Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.7 Managing Endpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
3.8 Configuring Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.8.1 Admin UI Whitelist Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.8.2 Authenticator Management Options Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.8.3 Cache Options Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.8.4 CEF Log Forward Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.8.5 Custom Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.8.6 Delete Me Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
3.8.7 Endpoint Management Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3.8.8 Event Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3.8.9 Geo Fencing Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3.8.10 Helpdesk Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
3.8.11 HTTPS Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
3.8.12 Kerberos SSO Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
3.8.13 Last Logon Tracking Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
3.8.14 Lockout Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
3.8.15 Login Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.8.16 Logo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.8.17 Logon Filter for AD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.8.18 Mail Sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
3.8.19 Multitenancy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
3.8.20 Password Filter for AD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
3.8.21 Public External URLs (Load Balancers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
3.8.22 SMS Sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
3.8.23 Services Director Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
3.8.24 SAML 2.0 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.8.25 Voice Sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.9 Configuring Server Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
3.9.1 Enabling Web Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
3.9.2 Uploading a Keytab File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.10 Adding a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
5 Configuring a Cluster 95
5.1 Registering a New Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.2 Registering a New Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.3 Resolving Conflicts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.4 Installing a Load Balancer for Advanced Authentication Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.4.1 Installing nginx on Ubuntu 16.04 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.4.2 Configuring nginx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.4.3 Configuring Advanced Authentication Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.5 Determining the Number of Web Servers for Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
11 Reporting 147
12 Logging 149
12.1 Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
12.2 RADIUS Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
12.3 Async Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.4 Web Server Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.5 Replication Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.6 Superuser Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.7 Background Tasks Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.8 NGINX Errors Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
12.9 WebAuth Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Contents 5
13 Managing Tokens 163
13.1 CSV File Format To Import OATH Compliant Tokens. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
16 Troubleshooting 169
16.1 Error During the Deployment of ISO File and Installation in the Graphic Mode . . . . . . . . . . . . . . . . 169
16.2 Partition Disks to Avoid Removal of Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
16.3 Networking Is Not Configured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
16.4 Error While Coying the DB Master Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
16.5 The ON/OFF Switch Is Broken If the Screen Resolution Is 110% . . . . . . . . . . . . . . . . . . . . . . . . . . 170
16.6 Error When Requesting For Update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
We are a global, enterprise software company, with a focus on the three persistent challenges in your
environment: Change, complexity and risk—and how we can help you control them.
Our Viewpoint
Adapting to change and managing complexity and risk are nothing new
In fact, of all the challenges you face, these are perhaps the most prominent variables that deny
you the control you need to securely measure, monitor, and manage your physical, virtual, and
cloud computing environments.
Our Philosophy
Selling intelligent solutions, not just software
In order to provide reliable control, we first make sure we understand the real-world scenarios in
which IT organizations like yours operate—day in and day out. That's the only way we can
develop practical, intelligent IT solutions that successfully yield proven, measurable results. And
that's so much more rewarding than simply selling software.
Our Solutions
Identity & Access Governance
Access Management
Security Management
Systems & Application Management
Workload Management
Service Management
Worldwide: www.netiq.com/about_netiq/officelocations.asp
Email: [email protected]
Worldwide: www.netiq.com/support/contactinfo.asp
Email: [email protected]
This Administration Guide is intended for system administrators and describes the procedure of
Advanced Authentication Server appliance configuration.
Intended Audience
This book provides information for individuals responsible for understanding administration concepts
and implementing a secure, distributed administration model.
Advanced Authentication™ is a multi-factor authentication solution that enables you to protect your
sensitive data by using a more advanced way of authentication on top of the typical username and
password authentication. With Advanced Authentication, you can authenticate on diverse platforms
by using different types of authenticators such as Fingerprint, Card, and OTP. Advanced
Authentication provides a single authentication framework that ensures secure access to all your
devices with minimal administration.
Something that you know such as password, PIN, and security questions.
Something that you have such as smartcard, token, and mobile phone.
Something that you are such as biometrics (fingerprint or iris).
You can achieve multi-factor or strong authentication by using any two factors out of this list. For
example, multi-factor authentication can include combination of a password and a token or a
smartcard and a fingerprint.
Section 1.1, “How Is Advanced Authentication Better Than Other Solutions,” on page 11
Section 1.2, “Key Features,” on page 11
Section 1.3, “Advanced Authentication Server Components,” on page 12
Section 1.4, “Architecture,” on page 14
Section 1.5, “Terminologies,” on page 18
Administration Portal
Add repositories: A repository is a database that stores users information. For example: An
organization, Digital Airlines contains an Active Directory that stores all of the user’s information
such as username, telephone, address, and so on. Administrator can add this Active Directory to
Basic Architecture
For example, the Figure 1-1 on page 15 displays two Advanced Authentication sites, Site A and Site
B.
Site A: The first site that is created for headquarters in New York. The first Advanced
Authentication server of site A contains the Global Master and Registrar roles. This server
contains a master database and it can be used to register new sites and servers.
Site B: Another site created for the office in London. The structure of site B is similar to site A.
The Global Master in another site has the DB Master role. DB servers interact with the DB
Master.
DB Server provides a database that is used for backup and fail-over. You can create a maximum
of two DB servers per site. When the Global Master is unavailable, the DB server responds to
the database requests. When the Global Master becomes available again, the DB server
synchronizes with the Global Master and the Global Master becomes the primary point of
contact for database requests again.
Endpoints interact with Global Master or DB Master servers. When these servers are not
available, they interact with DB servers.
NOTE: DB servers connect to each other directly. If the Global Master is down, the DB servers will
replicate.
A Global Master must have a connection to each of the LDAP servers. Hence in a data center with
Global Master, you must have LDAP servers for all the used domains.
You can convert DB server of primary site to Global Master. This requires corresponding DNS
changes. Nothing can be done if Global Master and all slaves are lost.
Web Servers: Web server does not contain a database. It responds to the authentication
requests and connects to Global Master. You need more web servers to serve more workload. It
is not recommended to deploy more than 5-6 web servers per site.
Load Balancer: A load balancer provides an ability to serve authentication requests from
External Endpoints. A load balancer is a third-party component. It must be configured to interact
with Web servers.
1.5 Terminologies
Section 1.5.1, “Authentication Method,” on page 18
Section 1.5.2, “Authentication Chain,” on page 18
Section 1.5.3, “Authentication Event,” on page 18
Section 1.5.4, “Endpoint,” on page 18
Section 1.5.5, “Tenant,” on page 18
You can create chains with multiple methods that are applicable for highly secure environments. You
can create authentication chains for specific group of users in the repositories.
1.5.4 Endpoint
An endpoint is a device on which you can authenticate. Endpoints can be computers, Laptops,
tablets, Smartphones, and so on.
1.5.5 Tenant
A tenant is a company with a group of users sharing common access with specific privileges. In
Advanced Authentication, tenants have the privileges to customize some of the configuration
settings.
Authentication
Advanced Authentication Server Appliance is intended for processing requests for authentication
coming from the Advanced Authentication system users.
After you set up an applicable server mode, the Advanced Authentication Administrative portal is
displayed.
To log in to the Advanced Authentication Administrative portal, perform the following steps:
NOTE: You can also use the format user@repository, if the Multitenancy mode is disabled.
2 Click Next.
3 The Admin Password chain is selected by default as the only available chain. Specify the
password that you specified while setting up the DB Master server mode.
4 Click Next.
The Dashboard page is displayed.
5 You can change the language from the list on the upper-right corner of the Administration portal.
The languages supported are: Arabic, Chinese Simplified, Chinese Traditional, Danish, Dutch,
English, French, German, Italian, Japanese, Polish, Portuguese (Brazilian), Russian, Spanish,
Hebrew, and Swedish.
IMPORTANT: Password of local\admin account expires by default. For uninterrupted access to the
Administration portal, it is strongly recommended to add authorized users or group of users from a
configured repository to the FULL ADMINS role. Then you must assign chains, which contain
methods that are enrolled for users, to the AdminUI event (at a minimum with an LDAP Password).
NOTE: It is not recommended to access the Advanced Authentication Administration portal through a
load balancer, as the replicated data may not be displayed.
To access Advanced Authentication Portal from Remote computer using OOB authentication,
perform the following steps:
Server Appliance
In the Administration portal, you can configure and manage various authentication settings such as
methods, events, and so on. You can also configure various policies that are required for
authentication.
Advanced Authentication Administration portal contains the Help option that guides you on how to
configure all settings for your authentication framework. The Help section provides you with
information on the specific section you are working on.
You can view the Dashboard for all the tenants or specific tenants.
Add widgets
Customize Dashboard
Update Dashboard
Customize the Default Widgets
Export Widgets
To move the widgets, click on the widget and the drag icon appears. You can then drag and drop
the widget to the desired location of the Dashboard.
Tenants
This widget displays information about the tenants and their login.
You can edit the title and change the time interval to view the records.
Servers
This widget displays the CPU, memory, and disk usage.
Authentications
This widget displays the total logon count for time interval. You can edit the display based on the
events: All logon events, Failed logon events, or successful logon events.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
Activity Stream
This widget displays information about user, tenant, chain, and method used for authentication, and
the result.
You can edit the display based on the events: All logon events, Failed logon events, or successful
logon events.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
Top 10 Events
This widget displays the top ten events the user has performed. You can edit the widget to customize
the display based on the event type.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
Top 10 Tenants
This widget displays the top ten tenants. You can edit the widget to customize the display based on
the event type.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
Top 10 Repo
This widget displays the top ten repositories. You can edit the widget to customize the display based
on the event type.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
Top 10 Events
This widget displays the top ten events. You can edit the widget to customize the display based on
the event type.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
To edit the widget, click Edit and select the appropriate fields. You can also select the number of
records from Size and sort in the ascending (previous to latest) or descending (latest to previous)
order.
You can edit the title and change the time interval to view the records.
For the tenants added, you can view the number of configured repositories and the license expiry
date. In the Edit tenant page, you can view the number of users and change the password for the
tenant administrator.
NOTE: A tenant administrator cannot add another tenant and cannot access the Server options,
Cluster, and Updates sections. For more information, see the Tenant Administration Guide.
Advanced Authentication supports any LDAP compliant directory such as Active Directory Domain
Services, NetIQ eDirectory, Active Directory Lightweight Directory Services, OpenLDAP, and
OpenDJ.
When you add a new repository, you can match the users in the repository to the authentication
chains. You require only the read permission to access a repository.
7 Click Add server. You can add the different servers in your network. The list is used as a pool of
servers. Each time the connection is open, a random server is selected in the pool and
unavailable servers are discarded.
8 Specify an LDAP server's Address and Port.
9 Turn SSL to ON to use the SSL technology (if applicable).
10 Click Save, next to server's credentials.
11 Add additional servers (if applicable).
12 (Conditional) To configure custom attributes, expand Advanced Settings. The Advanced Settings
are required for OpenDJ, OpenLDAP, and in some cases for NetIQ eDirectory.
13 Click Save.
NOTE: If you use NetIQ eDirectory with the option Require TLS for Simple Bind with Password
enabled, you may get the error: Can't bind to LDAP: confidentialityRequired. To fix the
error, you must either disable the option or do the following:
1. Click LDAP > LDAP Options > Connections in the NetIQ eDirectory Administration portal.
2. Set Client Certificate to Not Requested.
3. Set a correct port number and select SSL in the Repository settings.
4. Click Sync now with the added repository.
14 You can change the search scope and the Group DN (optional) functionality. In Advanced
Authentication 5.2, you had to specify a common Base DN for users and groups.
15 To verify the synchronization of a repository, click Edit and you can view the information in Last
sync.
16 Click Full sync to perform a complete synchronization of the repository.
Advanced Authentication performs an automatic synchronization of modified objects (fastsync)
on an hourly basis for AD. The complete synchronization (Full sync) is performed on a weekly
basis.
NOTE: If an LDAP server is unavailable for 2.5 seconds, Advanced Authentication excludes it from
the LDAP requests for a period of 3 minutes.
For Active Directory (AD), the default attributes are sAMAccountName and userPrincipalName. For
other repositories, cn is the default attribute.
For AD, the default attributes are sAMAccountName and userPrincipalName. For other repositories,
cn is the default attribute.
For Active Directory, the default attribute is sAMAccountName. For other repositories, cn is the default
attribute.
For Active Directory, the default attribute is sAMAccountName. For other repositories, cn is the default
attribute.
Advanced Authentication supports the RFC 2037 and RFC 2037 bis. RFC 2037 determines a
standard LDAP schema and contains a memberUid attribute (POSIX style). RFC 2037 bis determines
an updated LDAP schema and contains a member attribute. Active Directory, LDS, and eDir support
RFC 2037 bis. OpenLDAP contains posixAccount and posixGroup that follows RFC 2037.
OpenLDAP: posixGroup
Advanced Authentication supports the following attributes for the Group Name attributes:
OpenLDAP: posixGroup
OpenLDAP: memberUid.
NOTE: For information about the Logon filter settings (Legacy logon tag and MFA logon tag), see
Configuring Logon Filter.
NOTE: You must not disable the option for Active Directory repositories. It can also affect the
performance on other supported repositories such as NetIQ eDirectory.
If Enable nested groups support option is set to ON, then Advanced Authentication will authenticate
all the users of the group and its nested groups assigned to a chain. If Enable nested groups support
option is set to OFF, then Advanced Authentication will authenticate only the members of the group
assigned to the chain. The members of the nested groups cannot access the chain.
Consider there is a group by name All Users assigned to SMS Authentication chain and the All
Users group has subgroups Contractors and Suppliers. When Enable nested groups support
option is set to ON, then Advanced Authentication will authenticate All Users group and the nested
groups Contractors and Suppliers for SMS Authentication chain. When the option is set to OFF,
For Active Directory, when the Framed IPv4 Address is blank, the Advanced Authentication RADIUS
server returns value of the msRADIUSFramedIPAddress attribute as Framed-IP-Address after you log
in with the RADIUS event. When you specify any other attribute in Framed IPv4 Address attribute,
then the value of the specified attribute is returned as the Framed-IP-Address instead of the
msRADIUSFramedIPAddress attribute value. You can configure the Framed-IP-Address in Active
Directory Users and Computers > Dial-in > Assign Static IP Addresses and click Static IP
Addresses. It supports only IPv4.
For the other repositories, when the Framed IPv4 Address is blank, the Advanced Authentication
RADIUS server returns value of the radiusFramedIPAddress attribute as Framed-IP-Address after
you log in with the RADIUS event. When you specify any other attribute in Framed IPv4 Address
attribute, then the value of the specified attribute is returned as the Framed-IP-Address instead of
the radiusFramedIPAddress attribute value.
NOTE: The sAMAccountName and userPrincipalName attributes are supported only for AD DS
repository. The Active Directory LDS and eDirectory repositories do not support the attributes.
1. Search users
(&(usnChanged>=217368)(&(objectClass=user)(|(cn=*)(sAMAccountName=*)(userPrincipal
Name=*))))
Requested attributes:
2. Search groups
Requested attributes:
eDirectory Queries
The queries are the same as for Active Directory DS and Active Directory LDS, except for
'usnChanged' (this filter is not used).
1. Search users
(&(objectClass=user)(|(cn=*)(sAMAccountName=*)(userPrincipalName=*)))
Requested attributes:
2. Search groups
(&(objectClass=group)(|(cn=*)(sAMAccountName=*)))
Requested attributes:
(&(objectClass=user)(|(cn=pjones)(sAMAccountName=pjones)(userPrincipalName=pjones)
))
Requested attributes:
(&(objectClass=user)(objectGUID=\0f\d1\14\49\bc\cc\04\44\b7\bf\19\06\15\c6\82\55))
Requested attributes:
(|(member=CN=pjones,CN=Users,DC=company,DC=com)(objectSid=S-1-5-21-3303523795-
413055529-2892985274-513))
Requested attributes:
eDirectory Queries
(&(objectClass=user)(|(cn=pjones)(sAMAccountName=pjones)(userPrincipalName=pjones)
))
Requested attributes:
(&(objectClass=user)(GUID=\57\b6\c2\c1\b9\7f\4b\40\b9\70\5f\9a\1d\76\6c\d2))
Requested attributes:
(member=cn=pjones,o=AAF)
Requested attributes:
To configure an authentication method for Advanced Authentication, perform the following steps:
1 Click Methods.
You can translate the method name to a preferred language in the Custom Names section. The
localized method name will reflect in the Administration, Helpdesk, Self-Service, and Reporting
portals, Windows, Linux PAM, and Mac OS X clients, OSP, RADIUS, and custom events. To
customize and localize the method name to a specific language, perform the following steps:
1 Open the method for which you want to localize the method name.
2 Specify the method name in a specific language field in the Custom Names section.
3 Click Save.
A top administrator can enforce the configurations of a method on secondary tenants. After
configuring a method, you can lock the settings for that specific tenant. The tenant cannot edit the
locked settings in the tenant administrator console.
To enforce the configurations for a specific tenant, perform the following steps:
1 Click the Edit icon next to the authentication method for which you want to enforce the
configurations.
2 In Tenancy settings, click +.
3 Move the tenant to whom you want to enforce the configurations from Available to Used list in
the Force the configuration for the tenants section.
4 After you add a tenant, the Hide forced settings option is displayed. You can turn this option to
ON if you want to hide the settings that you have enforced on the tenant.
5 Click Save.
After configuring the authentication methods, you must create an authentication chain and map the
configured methods to the chain. You can also create a chain with a single method. For example, you
can create different authentication chains for an organization that has two departments, IT and
Finance. For the IT department, you can create a chain with Password and Smartphone methods.
For the Finance department, a chain with only the Fingerprint method can be created. For more
information about creating chains, see “Creating a Chain”.
Bluetooth
Card
Email OTP
Emergency Password
Fingerprint
LDAP Password
OATH OTP
Password
PKI
RADIUS Client
Security Questions
Smartphone
SMS OTP
Swisscom Mobile ID
Touch ID
FIDO U2F
Voice
Voice OTP
3.4.1 Bluetooth
In the Bluetooth method, you can enroll your smartphone or a mobile device. For example, Bob
wants to be authenticated through the Bluetooth method. He enrolls the Bluetooth method on the
Advanced Authentication Self-Service portal. He can get authenticated with the Bluetooth method
only when his smartphone is in the range.
By default, the Enable reaction on device removal option is enabled. When this option is enabled and
a user tries to logs in to Windows using Bluetooth, Windows gets locked automatically in the following
scenario:
NOTE: It is recommended to combine the Bluetooth method with another authentication method in a
chain to increase the security.
Advanced Authentication supports the Microsoft policy Interactive logon: Smart card removal
behavior that allows you to specify an action on the card event. You can configure the policy to
perform a force log off or lock a user session when a user places a card on the reader. Only Microsoft
Windows supports this policy.
By default, the Enable Tap&Go option is disabled. When this option is disabled, a card must be
placed on the reader when a user logs in. When the user removes the card from the reader, the
Windows Client runs an action that is specified in the Interactive logon: Smart card removal behavior
policy. When you set this option to ON, users can tap a card to perform the following actions
(depending on the Interactive logon: Smart card removal behavior policy) without keeping their cards
on the reader:
To log in
To lock a session
To log off
NOTE: The policy is supported for Microsoft Windows only and it is not supported for the PKI
authenticators.
Parameter Description
Body For the Plain Text format, you can specify the
following variables:
{user}: Username.
{endpoint}: Device that a user authenticates to.
{event}: Name of the event where the user is
trying to authenticate to.
{otp}: One-Time-Password to be sent to the user.
WARNING: An administrator can misuse this method by trying to access other user’s account. Full
administrator must be vigilant to select the right helpdesk administrators.
Parameter Description
Minimum password length The length of the password must be at least five
characters long.
Password age (days) The validity period of a password. The default value is
3 days.
Allow change options during enrollment When set to ON, this option allows a helpdesk
administrator to set Start date, End date, and
Maximum logons manually in the Helpdesk portal.
This manual configuration overrides the settings in the
Emergency Password method.
1 Set the Similarity score threshold by moving the slider to the desired score.
NOTE: Default and recommended value for Similarity score threshold is 25. Reducing the
score may result in different fingerprints getting validated.
NOTE: To improve the quality of the fingerprint enrollment, it is recommended to have multiple
captures. The total number of captures including all the enrolled fingers must not exceed 25.
4 Set Specify Fingers during enrollment to ON, if you want to enforce selected fingers for user to
enroll.
5 Select the preferred fingers to enroll from Selected Fingers list.
6 Click Save.
You can configure certificate settings for the FIDO U2F authentication method. By default, Advanced
Authentication does not require the attestation certificate for authentication by the FIDO U2F
compliant token. Ensure that you have a valid attestation certificate added for your FIDO U2F
compliant token, when you configure this method. The Yubico and Feitian attestation certificates are
pre-configured in the Advanced Authentication appliance.
To validate attestation certificate for the FIDO U2F authentication, perform the following steps:
Advanced Authentication supports the Microsoft policy Interactive logon: Smart card removal
behavior that allows you to specify an action on the U2F. You can configure the policy to perform a
force log off or lock a session when a user removes the U2F device from a computer. This policy is
supported for Windows only. When the user removes the U2F device from the computer, the
Windows Client runs an action that is specified in the Interactive logon: Smart card removal behavior
policy.
The YubiKey tokens may flash with a delay when the token is initialized in a combination mode. For
example, when authentication uses OTP and U2F methods. This may cause the users to wait for the
token to flash before enrollment or authentication. Therefore, it is recommended to flash the tokens
only in the U2F mode if the other modes are not needed.
This sections explains how to configure web server to use the FIDO U2F authentication in NetIQ
Access Manager for the OAuth 2.0 event.
According to the FIDO U2F specification, both enrollment and authentication must be performed for
one domain name. As NetIQ Access Manager and Advanced Authentication appliance are located on
different servers, you must configure web server to enable performing the following actions:
Port forwarding to Advanced Authentication appliance for the FIDO U2F method enrollment
Port forwarding to NetIQ Access Manager for further authentication using FIDO U2F tokens
Perform the following actions to configure a web server to use the FIDO U2F authentication.
To install Nginx, add the following two lines to the /etc/apt/sources.list file:
mkdir –p /etc/nginx/ssl
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/ssl/
proxy.key -out /etc/nginx/ssl/proxy.crt
Create a link and restart the nginx service running the following commands:
ln -s /etc/nginx/sites-available/proxy /etc/nginx/sites-enabled/proxy
service nginx reload
Enroll the U2F method in the Self-Service portal. For information about enrolling, see “Enrolling the
Authentication Methods”.
If you do not include the LDAP Password method in a chain, you will be prompted to perform a
synchronization. When you set Save LDAP password to ON, the prompt is displayed only for the first
time until the password is changed or reset. If you set this option to OFF, a prompt for synchronization
is displayed each time.
Set Enable SSPR integration to ON if you want to enable the Self Service Password Reset
integration for Advanced Authentication web portals.
Specify the SSPR link text. This link is displayed on the login page where user enters the LDAP
Password.
Specify the SSPR URL. This URL points to the Self Service Password Reset portal.
1. User data: It is used for OS logon (Windows Client, Mac OS X Client, and Linux PAM Client) and
is stored when Save LDAP password option in LDAP Password method is set to ON.
2. LDAP password authenticator: It is used while using cached logon. The password is stored when
the Enable local caching option is set to ON in the Cache Options Policy.
When the Enable cached logon option is set to OFF (default behavior), the Advanced Authentication
server always contacts the LDAP server to validate the user password. It may cause performance
issues. When you set this option to ON, during authentication user specified password is validated
with password stored (cached) in the Advanced Authentication server.
If the user password does not match with the stored password or password is not stored on the
Advanced Authentication server, then cached value gets reset and Advanced Authentication server
contacts the LDAP server to validate the user password.
If the user specified password matches the cached password, the Advanced Authentication server
validates user password with LDAP server in the background. If the validation failed, the password
stored on Advanced Authentication Server gets reset, so next logon will be without cache.
NOTE: The Enable cached logon option works only if any one of the following setting is set to ON:
Advanced Authentication supports the following two different types of OATH OTP:
OTP format: The number of digits in the OTP token. The default value is 6 digits. The value must
be the same as of the tokens you are using.
OTP window: The number of OTPs that the Advanced Authentication server will generate
starting from the current HOTP counter value to match an HOTP entered by the user during
authentication. The default value is 10. The maximum value for the OTP window is 100000
seconds.
This is required when users use tokens for accessing websites such as Google. After each use,
the HOTP counter increases by 1. Therefore, the counter will be out of sync between the token
and Advanced Authentication server. Also, users can press the token button accidentally.
WARNING: Do not increase the HOTP window value to more than 100 as it may decrease the
security by causing false matches.
During enrollment or HOTP counter synchronization in the Self-Service portal, Enrollment HOTP
window that has a value of 100,000 is used. This is helps in the following:
HOTP tokens may be used for a long period before the enrollment in Advanced Authentication
and the value is unknown and can be equal to some thousands.
Secure because users must provide 3 consequent HOTPs.
OTP period (sec): The value to specify how often a new OTP is generated. The default value is
30 seconds. The maximum value for the OTP period is 360 seconds.
OTP format: The number of digits in the OTP token. The default value is 6 digits. The value must
be the same as the tokens you are using.
OTP window: The value to specify the periods used by Advanced Authentication server for
TOTP generation. For example, if you have a period of 30 and a window of 4, then the token is
valid for 4*30 seconds before current time and 4*30 seconds after current time, which is 4
minutes. These configurations are used because time can be out-of-sync between the token and
the server and may impact the authentication. The maximum value for the OTP window is 64
periods.
IMPORTANT: You cannot use OTP window equal to 32 and higher for four digit OTPs as it can
lead to false matches and reduces the security.
Google Authenticator format of QR code (Key Uri): Option to scan the QR code for enrollment
of the software token with the Google Authenticator. Enable this option to use the Google
Authenticator or Microsoft Authenticator app in place of the Advanced Authentication
smartphone app to scan a QR code.
IMPORTANT: OTP format must be set to 6 digits when you use the Google Authenticator or
Microsoft Authenticator format of QR code.
You can import the PSKC or CSV files. These token files contain token information. To import these
files, perform the following steps:
5 Add the encrypted PSKC files. For this, select Password or Pre-shared key in PSKC file
encryption type and provide the information.
6 Click Upload to import tokens from the file.
NOTE: Advanced Authentication receives an OTP format from the imported tokens file and stores
the information in the enrolled authenticator. Therefore, you need not change the default value of OTP
format on the Method Settings Edit tab.
When the tokens are imported, you can see the list and you must assign the tokens to users. This can
be done in the following two ways:
Click Edit next to the token and select Owner and click Save.
A user can self-enroll a token in the Self-Service portal. Administrator must let the user know an
appropriate value from the Serial column for the self-enrollment.
NOTE: Tenancy settings are not supported for the OATH tokens. Therefore, the configurations in the
OATH Tokens tab cannot be enforced on tenant administrators.
Comma is a delimiter.
Token001, 15d2fa517d3c6b791bd4cc2044c241429307001f
Token002, 8c557fc050721037fd31e1d3345b5d3263263e0f, totp, 8
Token003, 658208efea5ac49d5331ba781e66f2c808cccc8e, hotp, 6
Token004, 89f0dfe1c90379da6a11aaca2fc1070f606efe36, totp, 6, 60
3.4.9 Password
In the Password authentication method, you can configure security options for passwords that are
stored in the appliance. For example, the local/admin user who does not have an LDAP Password
can use this option.
NOTE: Do not use the Password method in chains that contain only one factor. You must always
combine the Password method with other factors.
You can configure the following options for the Password method:
NOTE: It is recommended to use Custom names to rename the Password method because the
Rename to PIN setting will not be available in versions after Advanced Authentication 6.0.
IMPORTANT: Advanced Authentication does not generate notifications about the password expiry.
After the password expires, the local administrator cannot sign-in to the Administration portal and
users using this method cannot get authenticated.
However, an administrator and a user can change their passwords in the Self-Service portal.
3.4.10 PKI
The Public Key Infrastructure (PKI) creates, stores, and distributes digital certificates. These
certificates are used to verify whether a particular public key belongs to a specific entity.
In the PKI method, you must upload trusted root certificates. These certificates must meet the
following requirements:
NOTE: Advanced Authentication supports the p7b format of parent certificates. These p7b format
files can contain certificates and chain certificates, but not the private key. They are Base64 encoded
ASCII files with extensions .p7b or.p7c.
For more information, see Single Tier PKI Hierarchy Deployment and Two Tier PKI Hierarchy
Deployment.
You can configure the following options for the Radius Client method:
OTP Period: The lifetime of an OTP in seconds. The default value is 120 seconds.The maximum
value for the OTP period is 360 seconds.
OTP Format: The number of digits in the OTP. The default value is 6.
Body: The text in the SMS that is sent to the user. The following structure describes the text in
the OTP:
{user}: Name of the user.
{endpoint}: Device the user is authenticating to.
{event}: Name of the event where the user is trying to authenticate to.
{otp}: One-Time Password.
User cell phone attribute: The cell phone number of a user on which the OTP is sent through
SMS. You can use custom attributes such as mobile, homePhone, ipPhone, and other attributes
of a repository. You must define the attribute in “User Cell Phone Attributes” of the Repositories
section.
NOTE: If you do not configure the attribute in the method settings, then the first attribute defined
in the “User Cell Phone Attributes” section of Repository configuration is used when the user
tries to authenticate. For example, if you define mobile as the first attribute in User cell phone
attribute and do not configure the attribute in method settings of SMS OTP, then while
authenticating, the first attribute, which is the mobile attribute, is used for the SMS OTP method
authentication.
Security questions are often easy to guess and can often bypass passwords. Therefore, Security
Questions do not prove to be secure.
You must follow few guidelines to use this method. You must use Good security questions that meet
five criteria. Ensure that the answers to a good security question are:
Some examples of good, fair, and poor security questions according to goodsecurityquestions.com
are as follows. For a full list of examples, see the website (http://goodsecurityquestions.com/.)
GOOD
What is the first name of the person you first kissed?
FAIR
What was the name of your elementary / primary school?
In what city or town does your nearest sibling live?
What was the name of your first stuffed animal, doll, or action figure?
What time of the day were you born? (hh:mm)
What was your favorite place to visit as a child?
POOR
What is your pet's name?
In what year was your father born?
In what county where you born?
What is the color of your eyes?
What is your favorite _____?
Min. answer length: The minimum number of characters an answer must contain.
Correct answers for logon: The number of answers a user must answer correctly to get access.
Total questions for logon: The number of questions that are presented to the user while
authenticating.
For example, if the Correct answers for logon is set to 3 and the Total questions for logon is set to 5,
the user needs to specify only 3 correct answers out of a set of 5 questions.
3.4.14 Smartphone
Advanced Authentication provides the Smartphone method that facilitates users to authenticate
through their Smartphone. The authentication happens through the NetIQ smartphone app to perform
the out-of-band authentication. The out-of-band authentication is typically a two-factor authentication
that requires a secondary verification through a separate communication channel along with the ID
and password.
The authentication flow for the Smartphone method in Advanced Authentication is described in the
following image.
1 When the authentication request is initiated, the endpoint contacts the Advanced Authentication
server.
2 The Advanced Authentication server validates the user’s credentials.
3 After validating the credentials, the Advanced Authentication server sends a push message to
proxy.authasas.com.
4 Depending on the platform of the Smartphone, the server selects an appropriate push service
and then forwards the push message to the Smartphone.
5 The push message is then delivered to the user’s Smartphone to inform that an authentication
request has been initiated.
6 When the user opens the Smartphone app, the app reaches the Advanced Authentication server
to validate if there is an authentication needed. The authentication is indicated by the Accept
and Reject options. The user’s selection is then sent to the server.
7 Finally, the server validates the authentication and the endpoint gets authenticated.
This authentication method is recommended to use in combination with another method such as
Password or LDAP Password to achieve multi-factor authentication and protect a user from getting
SPAM push messages.
The following are the configurations required for the Smartphone method.
Advanced Authentication server must be accessible by the specified Server URL address from
smartphones (HTTPS, outbound).
Advanced Authentication server must have a permitted outbound connection to
proxy.authasas.com (HTTPS).
Bob wants to authenticate on the myexample.com website. When he logs in to the website, the
Smartphone authentication method sends a push message to Bob’s mobile phone. When he opens
the Smartphone app installed on his phone, he sees Accept and Reject options. If he selects the
Accept option, the authentication request is sent over the mobile network (secure) back to the
Authentication framework. Without specifying an OTP code, Bob has been authenticated to
myexample.com.
When your smartphone does not have a network connection, you can use a backup OTP as offline
authentication.
Parameter Description
Push salt TTL The lifetime of an authentication request sent to the smartphone.
Learn timeout The time that is valid for the user to scan the QR code for enrollment.
Auth salt TTL The lifetime in which the out-of-band authentication needs to be accepted
before authentication fails.
TOTP Length The length of OTP token used for backup authentication.
TOTP step The time a TOTP is displayed on a screen before the next OTP is
generated. The default time is 30 seconds.
TOTP time window The time in seconds in which the TOTP entered is accepted. The default
time is 300 seconds.
Server URL The URL of Advanced Authentication server to where the smartphone
app connects for authentication. This URL points to the Public External
URLs (Load Balancers) policy. For example, http://
<AAServerAddress>/smartphone (/smartphone cannot be changed).
Use http only for testing and https in a production environment. You need
a valid certificate when using https.
Require PIN Set to ON to enforce the Enable PIN setting for the Smartphone
application. A user will not be able to edit the settings on the Smartphone
NOTE: If the PIN is not set, then the user is prompted to set the PIN
during authentication.
Minimum PIN length The minimum PIN length. The available options are 4,5, and 6.
Require biometrics Set to ON to enforce the fingerprint setting for the Smartphone
application. A user will not be able to edit the settings on the Smartphone.
Use image on mobile devices Select the option to use a customized image on your Smartphone app.
Browse the image. This image is displayed in the About screen of your
Smartphone app. The resolution of the image must be 2732×637 pixels.
If a user has configured a 4-digit PIN but a 6-digit PIN has been
enforced by the administrator, then the user will be able to use the 4-
digit PIN until the user decides to change the PIN.
If Require biometrics is set in the policies, but a user’s device does
not support fingerprint, the policy will not be applied for the device.
If a user has authenticators enrolled for two different Advanced
Authentication servers with different policies, then the policies are
combined for the device and the most secure policies are applied for
the app.
Use Smartphone network info to Set to ON, if you want to enforce the Advanced Authentication server to
check location calculate user’s accurate geo-location based on the network data (Wi-Fi
BSSID and Cellular ID) received from the smartphone.
The Google API calculates the geo-location and sends the calculated
location to Advanced Authentication server. The Advanced Authentication
server compares calculated location with location received from the
smartphone and concludes as follows:
Specify the valid Geocode API key that converts address into geographic
co-ordinates (like latitude and longitude values) in the Google Geocode
API Key.
Geo Zones You can configure Geo-fencing with the Smartphone method. Geo-
fencing allows you to authenticate with the Smartphone method with one
more factor, which is the geographical location. When you enable geo-
fencing, users will be able to authenticate with Smartphone from only
allowed geographical locations. You must enable the policy Geo Fencing
Options to use geo-fencing.
1. Click Add.
2. Specify the name of the zone.
3. Click the Search icon and specify the address to locate the required
geographical location.
You can click the full-screen icon to view the map in the full
screen.
You can also edit the marked polygon by clicking the edit icon.
7. Click Save.
NOTE: To use geo-fencing, ensure that access to the location is enabled for the NetIQ Advanced
Authentication app on the smartphone.
1. Browse Client SSL certificate. The required certificate must be in a .pem format and self-signed
with a private key.
2. Specify Private key password for the certificate.
3. Click Save.
For more information about the Swisscom Mobile ID method, see the Mobile ID Reference guide.
3.4.16 Touch ID
Advanced Authentication provides the Touch ID method that facilitates users to authenticate through
the MacBook Pro. User should place their fingers on the Touch id to enroll and authenticate. When
the user place their fingers, the sensor quickly scans the fingerprint and automatically authenticates
the user.
3.4.17 Voice
In the Voice authentication method, a user receives a call with an OTP through voice.
The following workflow describes the Voice authentication method in Advanced Authentication:
IMPORTANT: Phone number with extensions are supported for this method.
Special characters “,” and “x” are used to indicate wait time and can be used as separators between
phone number and extension.
For example, if +123456789 is the phone number and 123 is the extension, then it can be specified
as +123456789,,,,123.
In the above example, “,” is specified 4 times and this multiplied by 0.5 (default value in Twilio)
indicates the wait time, which is 2 (4*0.5) seconds. First, call is sent to the number 123456789 and
after a wait period of 2 seconds, the extension 123 is dialed.
Minimum pin length: The length of the PIN must be at least three characters long.
Maximum pin age: The validity period of a PIN. The default value is 42 days. If you set the age to
0, the PIN will not expire.
User cell phone attribute: The cell phone number of a user that is used to call the user for voice
authentication. You can use custom attributes such as mobile, homePhone, ipPhone, and other
attributes of a repository. You must define the attribute in “User Cell Phone Attributes” of the
Repositories section.
NOTE: If you do not configure the attribute in the method settings, then the first attribute defined
in the “User Cell Phone Attributes” section of Repository configuration is used when the user
tries to authenticate. For example, if you define mobile as the first attribute in User cell phone
attribute and do not configure the attribute in method settings of Voice, then while
authenticating, the first attribute, which is the mobile attribute, is used for the Voice method
authentication.
OTP period: The time period for which the Voice OTP is valid. Default time is 120 seconds. The
maximum value for the Voice OTP period is 360 seconds.
OTP format: The length of the Voice OTP token. Default length is 4.
Body: The text or number in the Voice OTP that is sent to the user. Here, you can specify the
{otp} variable, which is the actual one-time password. To repeat the one-time password during
the call you can specify: Use the OTP for authentication: {otp}. OTP: {otp}.
User cell phone attribute: Cell phone number of a user that is used to send the OTP through a
call. You can use custom attributes such as mobile, homePhone, ipPhone, and other attributes of
a repository. You must define the attribute in “User Cell Phone Attributes” of the Repositories
section.
NOTE: If you do not configure the attribute in the method settings, then the first attribute defined
in the “User Cell Phone Attributes” section of Repository configuration is used when the user
tries to authenticate. For example, if you define mobile as the first attribute in User cell phone
attribute and do not configure the attribute in method settings of Voice OTP, then while
authenticating, the first attribute, which is the mobile attribute, is used for the Voice OTP method
authentication.
Advanced Authentication contains the following chains that are created by default:
1. LDAP Password Only: Any user from a repository can use this chain to get authenticated with
the LDAP Password (single-factor) method.
2. Password Only: Any user who has a Password method enrolled can use this chain to get
authenticated with the Password (single-factor) method.
You can create any number of chains with multiple authentication methods. To achieve better
security, you can include multiple methods in a chain.
Something that you know such as password, PIN, and security questions.
Something that you have such as smartcard, token, and mobile phone.
Something that you are such as biometrics (fingerprint or iris).
After you create a chain, you can use the chain on specific user groups in your repository. The chain
is then mapped to an event.
To create a new chain or edit an existing chain, perform the following steps:
2 Click Add to create a chain. You can also click the edit icon against the chain that you want
to edit.
3 Specify a name of the chain in Name.
4 Specify a Short name. The short name is used by a user to move to a chain. For example, if you
name a chain containing the LDAP Password and SMS methods as SMS, then a user can
specify <username> sms and the user is forced to use SMS as the chain. This is helpful in
scenarios when the primary chain is not available.
IMPORTANT: It is not recommended to use groups such as All Users group in Active
Directory, from which you will not be able to exclude users. This is because you will not be able
to free up a user's license.
NOTE: The Endpoint owner feature is supported for Windows Client, Mac OS Client, and Linux
PAM Client only.
10 Specify the MFA tags. When a user logs in to Windows on a workstation with Advanced
Authentication Windows Client installed, the user's account is moved to the group specified in
MFA tags.
For example if you specify a Card users group from Active Directory in MFA tags, then the user
will be moved from the legacy group (specified in the Advanced Settings of Active Directory
repository) to the Card users group. This functionality is available when you set the Enable filter
to ON in the Logon Filter for AD policy and have configured the Logon Filter.
NOTE: The MFA tag does not work while connecting to Remote Desktop, if the user credentials
were saved with Remember my credentials.
11 Set Required chain to Nothing, if this is a normal (high-security) chain. If you want to configure a
simple chain within a specific time period after successful authentication with a high-security
chain, choose an appropriate high-security chain. In this case you also need to specify a Grace
period (mins). Within this time period the chain will be used instead of the appropriate high-
security chain. The maximum value for grace period is 44640 minutes (31 days).
For example, LDAP Password+Card is a high-security chain and Card is a simple chain. The
users must use LDAP Password+Card chain once in every 8 hours and within this period, they
must provide only the Card method to authenticate.
12 A top administrator can enforce the configurations of a chain on secondary tenants. After the
administrator configures the settings for a chain, the administrator can freeze those
configurations for that specific tenant. The tenant will not be able to edit the settings in the tenant
administrator console that have been enforced by the top administrator for that chain.
To enforce the configurations for a specific tenant, perform the following steps:
12a In the Tenancy settings, click + to expand the settings.
12b Select the tenant to whom you want to enforce the configurations in Force the configuration
for the tenants.
12c After you add a tenant, the Hide forced settings option is displayed. You can turn this option
to ON if you want to hide the configurations that you have enforced on the tenant. This will
be hidden on the tenant administrator console.
13 (Conditional) In Custom names, you can specify the chain name in a specific language. To do
this click + to expand the settings and specify the chain name.
14 Click Save.
IMPORTANT: If you have configured more than one chain using one method (for example,
LDAP Password, LDAP Password+Smartphone) and assigned it to the same group of users and
the same event, then the top chain is always used if the user has enrolled all the methods in the
chain. An exception is the use of a high-security chain and its appropriate simple chain, where
the simple chain must be higher than its high-security chain.
Third-party integrations.
To use Windows Client, Linux PAM Client or Mac OS X Client on both the domain joined and
non-domain workstations and it requires to have a separate event to use the non-domain mode.
Integrations using SAML 2.0 and OAUTH 2.0.
2 Click the edit icon against the event that you want to edit.
3 Ensure that Is enabled is set to ON if you want to use the event.
4 Select the event type.
For most of the predefined events, you cannot change the Event type. For events such as
Windows logon, Linux logon, and Mac OS logon, you can change the Event type from OS
Logon (domain) to OS Logon (local) if the workstations are not joined to the domain.
5 Select the Authenticator category. The Authenticator category option is displayed only if you
have added categories in the “Event Categories” policy.
6 Select the chains that you want to assign to the current event.
In an event, you can configure a prioritized list of chains that can be used to get access to that
specific event.
7 If you want to restrict access of some endpoints to the event, add all the endpoints that must
have access to the Endpoint whitelist. The remaining endpoints are blacklisted automatically. If
you leave the Endpoints whitelist blank, all the endpoints will be considered for authentication.
Move the endpoints from the Available to Used list if you want to blacklist an endpoint.
8 Set Geo-fencing to ON to enable geo-fencing. Move the permitted zones from Available to Used.
For more information about configuring geo-fencing, see the Smartphone method.
IMPORTANT: You must enable the Geo Fencing Options policy to use the geo fencing
functionality.
9 Select Allow Kerberos SSO if you want to enable single sign-on (SSO) to the Advanced
Authentication portals. Kerberos SSO is supported for AdminUI, Authenticators Management,
Helpdesk, and Report logon events.
IMPORTANT: To use the Kerberos SSO feature, you must configure the Kerberos SSO Options
policy and upload a keytab file.
10 Set Bypass user lockout in repository to ON, if you want to allow repository locked-out users to
be authenticated on the Advanced Authentication. By default, Bypass user lockout in repository
is set to OFF and users locked on repository is not allowed to authenticate.
11 You as a top administrator can enforce the configuration of events (except the Radius Server
event) on secondary tenants. After configuring the settings for the event, you can freeze those
settings for a specific tenant. The tenant cannot edit the settings in the tenant administrator
console that have been enforced by the top administrator for that event.
To enforce the configurations for a specific tenant, perform the following steps:
11a In the Tenancy settings, click +.
11b Select the tenant to in Force the configuration for the tenants to whom you want to enforce
the configurations.
11c After you select a tenant, the Hide forced settings option is displayed. You can set Hide
forced settings to ON if you want to hide the configurations that you have enforced on the
tenant. When this option is set to ON, the tenant administrator console does not show
setting changes.
12 Click Save.
13 If you want to revert the changes to the default configuration, click Initialize default chains.
TIP: It is recommended to have a single chain with the Emergency Password method at the top of
the chains list in the Authenticators Management event and other events, which are used by users.
The chain will be ignored if the user does not have the Emergency Password enrolled. The user can
use the Emergency Password immediately after the helpdesk administrator enrolls the user with the
Emergency Password authenticator.
ADFS Event
AdminUI Event
Authenticators Management Event
Helpdesk Event
Helpdesk User Event
Linux Logon Event
Mac OS Logon Event
NAM Event
NCA Event
RADIUS Server Event
Report Logon Event
Search Card Event
Tokens Management Event
Windows Logon Event
ADFS Event
Use this event to integrate Advanced Authentication with ADFS using the ADFS plug-in. For more
information about ADFS, see “Configuring Advanced Authentication Server” in the Advanced
Authentication - ADFS Plug-in guide.
NOTE: The ADFS plug-in is discontinued and it is recommended to use integration with ADFS using
SAML. For more information about integration with ADFS using SAML, see “Configuring Integration
With ADFS”.
AdminUI Event
Use this event to access the Administration portal. You can configure the chains that can be used to
get access to the /admin URL.
WARNING: You must be careful when changing the default chains that are assigned to this event.
You may block the access to the Administration portal.
Add an LDAP Password chain as the last chain in the list of chains to ensure secure access to the
portal for users who have methods enrolled.
IMPORTANT: If the Administration portal uses a repository that does not have any user, you must
enable a chain with Password only (Authenticators Management - Password) for this event. This
action enables you accessing the Self-Service portal or changing the password in the Self-Service
portal.
You can also perform basic authentication with Advanced Authentication. To achieve basic
authentication, set the Allow basic authentication option to ON in the Event Edit screen for
Authenticators Management.
NOTE: The basic authentication is supported only for the Authentication Management event and for
the Password (PIN), LDAP Password, and HOTP methods.
You must specify /basic with the URL to login to the enrollment page. The Login page appears and
the format of the Username you must provide is: username:PASSWORD|LDAP_PASSWORD|HOTP:1. For
example: admin:PASSWORD:1.
When you log in to the Self Service portal, by default the chain with the highest priority is displayed.
To display the other chains with the enrolled methods, set Show chain selection to ON.
NOTE: If you enable to show the chain selection, but a chain is not displayed in the list of available
chains in the Self-Service portal, ensure that all the methods of the chain are enrolled by the user.
For more information, see “Authenticators Management” in the Advanced Authentication- User guide.
Helpdesk Event
Configure the settings of this event to enable the Helpdesk administrator to access the Helpdesk
portal. One of the roles of a Helpdesk administrator is to set an emergency password for users. An
emergency password is a temporary password for users when they lose their smart card or smart
phone. Some companies restrict self-enrollment and have the Helpdesk administrator who does the
enrollment after hiring. You can promote the repository administrators or users as Helpdesk
administrators in the Repositories > LOCAL > Edit > Global Roles > ENROLL ADMINS section.
For more information, see “Authenticators Management” in the Advanced Authentication- Helpdesk
Administrator guide.
You must enable the Ask credentials of management user option in the Helpdesk Options policy
before using this event.
NAM Event
Configure the settings of this event to facilitate the integration of Advanced Authentication with NetIQ
Access Manager.
NCA Event
Configure the settings of this event to facilitate the integration of Advanced Authentication with NetIQ
CloudAccess. CloudAccess must be configured to use Advanced Authentication as an authentication
card and user stores must be added for the repositories for the integration to work. For more
information, see the Advanced Authentication CloudAccess documentation.
Third-party integrations.
When you must use Windows Client or Linux PAM Client, or Mac OS X Client on both the
domain joined and non-domain workstations and you must have a separate event to use the
non-domain mode.
For integrations using SAML 2.0 and OAUTH 2.0.
Generic
OS Logon (domain)
OAuth2
SAML2
RADIUS
9 Set Bypass user lockout in repository to ON, if you want to allow repository locked-out users to
be authenticated on the Advanced Authentication. By default, Bypass user lockout in repository
is set to OFF and users locked on repository is not allowed to authenticate.
10 A top administrator can enforce the configuration of events (except the Radius Server event) on
secondary tenants. For more information, see Step 11 on page 62.
11 Click Save.
NOTE: When you create a custom event, you must specify the custom event in the configuration file
of the related endpoints. For more information, see the Advanced Authentication- Linux PAM Client,
Advanced Authentication - Mac OS X Client, or Advanced Authentication - Windows Client guides
related to the specific endpoint.
The steps to create an OS Logon (domain) event are similar to the Generic event.
IMPORTANT: Enable the WebAuth option in Server Options before configuring OAuth2 event.
9 Set Bypass user lockout in repository to ON, if you want to allow repository locked-out users to
be authenticated on the Advanced Authentication. By default, Bypass user lockout in repository
is set to OFF and users locked on repository is not allowed to authenticate.
10 A top administrator can enforce the configuration of events (except the Radius Server event) on
secondary tenants. For more information, see Step 11 on page 62.
11 Click Save.
After you have created an OAuth 2 event, perform the following steps to access the consumer web
application:
1 Specify the Client ID, Client secret, and redirect URIs in the consumer web application.
2 Specify the appliance end point (authorization end point) in the web application. For example,
https://<Appliance IP>/osp/a/TOP/auth/oauth2/grant.
3 Authenticate with the required authentication method(s) to access the consumer web
application.
NOTE: Authorization is provided in the form of Authorization Code Grant or Implicit Grant or
Resource Owner Password Credentials Grant.
IMPORTANT: You must enable the Geo Fencing Options policy to use the geo fencing
functionality.
9 You can either insert your Service Provider's SAML 2.0 metadata in SP SAML 2.0 metadata or
click Browse and select a Service Provider's SAML 2.0 metadata XML file to upload it.
NOTE: You must enable the SAML 2.0 options policy for the SAML 2.0 event to work
appropriately.
The endpoints are automatically added when you install a plug-in such as NAM or install Windows
Client. The RADIUS endpoint, an OSP endpoint that is used for WebAuth authentication, and
Endpoint41 and Endpoint42 are the predefined endpoints.
NOTE: Endpoint41 and Endpoint42 are created for the integration with legacy NAM and NCA plug-
ins, which are used in NAM 4.2 and earlier versions with Advanced Authentication 5.1.
The NAM and NCA plug-ins work with the hard coded endpoint ID and secret. In Advanced
Authentication 5.2 and later, you must register the endpoints. This breaks the backward compatibility
with old plug-ins. These two legacy endpoints allow to keep the old plug-ins working.
1 In the Endpoints section, click Edit against the endpoint you want to edit.
2 You can rename the endpoint, change its description or endpoint type.
3 Set Is enabled to ON to enable the endpoint.
4 Set Is trusted to ON if the endpoint is trusted. In some integrations such as Migration Tool,
Password Filter, NAM, and NCA you must enable the Is trusted option for their endpoints.
5 Specify an Endpoint Owner if you have configured a specific chain to be used by the Endpoint
owner only. This is a user account that must be able to use a different chain than the other users
for authentication.
The Endpoint Owner feature is supported for Windows Client, Mac OS Client, and Linux PAM
Client only.
NOTE: Additional information such as Operating System, Software version, Last session time
and Device information are displayed. Also in Advanced properties, RAM information is
displayed.
Advanced Authentication Windows Client 5.6 or newer, Advanced Authentication Linux PAM
Client 6.0 or newer, Advanced Authentication Mac OS X Client 6.0 or newer must be installed on
the endpoint.
6 Click Save.
You can create an endpoint manually. This endpoint can be used for the third-party applications that
do not create endpoints.
NOTE: You will not be able to get the Endpoint ID and Endpoint Secret later on the appliance.
8 Click OK.
IMPORTANT: You must ensure not to remove an endpoint that has at least one component running
on it such as Windows Client, Logon Filter, RD Gateway plug-in, or ADFS plug-in. Endpoint is
removed automatically when you uninstall Windows Client. However you must remove the endpoint
manually when you uninstall Logon Filter, RD Gateway plug-in or ADFS plug-in.
If you remove an endpoint accidentally, ensure to remove the records with prefix endpoint* from the
%ProgramData%\NetIQ\Windows Client\config.properties file and re-start the machine. This
recreates the endpoint.
2 Click the Edit icon against the policy you want to configure.
You can also double-click on the policy to edit the configuration.
3 Make the required changes for a specific policy.
A top administrator can enforce the configurations of a policy on secondary tenants. After
configuring a policy, you can lock the settings for that specific tenant. The tenant cannot edit the
locked settings in the tenant administrator console.
To enforce the configurations for a specific tenant, perform the following steps:
3a In Tenancy settings, click +.
3b Move the tenant to whom you want to enforce the configurations from the Available to the
Used list in the Force the configuration for the tenants section.
3c After you add a tenant, the Hide forced settings option is displayed. You can turn this option
to ON if you want to hide the configurations that you have enforced on the tenant.
NOTE: The Tenancy settings are not supported for the following policies: CEF log
forwarding, Event categories, HTTPS Options, Logo, and Multitenancy options.
A tenant administrator cannot access the CEF log forwarding and Multitenancy options
policies.
4 Click Save.
IMPORTANT: The configured policies are applied for all the Advanced Authentication servers.
By default, all the IP addresses are considered as whitelist. To configure a restriction so that only a
particular IP address can access the Administration portal, perform the following steps:
Enable sharing: This setting allows a user to authenticate with his or her authenticator to another
user’s account. The helpdesk administrator can link an authenticator of one user to another user.
NOTE: Linked authenticators work only in the online mode. Cached login does not work for the
linked authenticators.
The supported methods for sharing authenticators are TOTP, HOTP, Password, Fingerprint,
Card, and FIDO U2F.
Disable re-enrollment: This setting allows you to restrict users from re-enrolling, editing, and
deleting the enrolled authenticators in the Self-Service portal.
To disable re-enrollment or removal of authenticators, set Disable re-enrollment to ON.
WARNING: If you access the Administration portal with local user credentials such as
local\admin, you might get into a lockout situation. This can happen when the administrator's
password expires and it is not possible to change the password through the Self-Service portal.
Therefore, to use the Disable re-enrollment option, you must configure the access of a
repository account to the Administration portal. To do this:
Add authorized users or a group of users from a repository to the FULL ADMINS role.
Assign chains, which contain methods that are enrolled for users, to the AdminUI event (at
a minimum with an LDAP Password method).
NOTE: This setting disables re-enrollment and removal of the authenticators only in the Self-
Service portal. The setting has no effect on the Helpdesk portal.
The caching functionality enables the storing of credentials on the Client for offline authentication
when the Advanced Authentication server is not available. Therefore a user who has successfully
logged in once to the server with the authentication, can now login with the offline authentication.
By default, the Enable local caching option is enabled. To disable the caching, set the option to OFF
and click Save.
NOTE: The caching period cannot be configured. The cache will be cleared only if the Enable local
caching option is disabled.
NOTE: The same Syslog configuration is used for each server type. Each server type in the
appliance records its own log file.
Only logs from the Syslog section are forwarded to the external Syslog server. For more information
about Syslog, see Chapter 12, “Logging,” on page 149.
For example, if you customize the logon error message in German - Anmeldung nicht erfolgt to
Benutzer nicht registriert, then on the Self-Service portal, when the user specifies wrong user
name, the customized error message is displayed.
1. You can use Administration portal to localize only the main messages.
2. You can download the custom localization file and update the preferred messages.
To customize all required messages using the Custom localization file, perform the following steps:
When you set Enable delete me feature to ON, the users can view the Delete me option in a drop-
down by clicking on the user name on the top-right corner of the Self-Service portal.
Set Require admin password to register endpoint/workstation to ON for endpoints to provide the
local administrator's credentials during the registration of endpoint.
You must disable the option when installing any components from the Advanced Authentication
distributives package that uses endpoints (Advanced Authentication Windows Client, Mac OS X
Client, Linux PAM Client, Logon Filter, and RDG plug-in). Otherwise, the endpoints are not created.
You must use the option for third-party integrations only.
NOTE:
You can enroll only one authenticator of one type for each category.
The Authenticator category option in Events is not displayed when no category is created.
The LDAP Password method is an exception. There is one LDAP password authenticator
always, it can be used with any category.
To enable geo-fencing, set Enable geo fencing to ON. For more information about how to configure
the geo-zones, see the “Smartphone” method.
NOTE: When you enable the Geo-fencing options policy, the functioning of the TOTP mode of the
Smartphone method, which is used in the offline mode, is affected. An error message TOTP login is
disabled is displayed to the users when they try to authenticate with this method.
Set Ask credentials of management user to ON to prompt the helpdesk administrator to provide the
credentials of the user in the Helpdesk portal. Ensure that you have specified a chain (with all the
methods of the chain enrolled for the users) for the Helpdesk User event.
When you set the option to OFF, it may not be secure, but the user management is done faster.
Enable TLS 1.0: It is recommended to keep this option disabled by default to ensure security
vulnerabilities are prevented because TLS 1.0 is considered as an unsafe protocol. In some
scenarios, you can enable the option to support the older versions of browsers. For more
information on browser support for TLS, see TLS support for web browsers.
Enable HTTP compression: This setting allows you to enable the HTTP compression to
accelerate performance in the scenarios of low bandwith or when the network connectivity is
slow.
NOTE: This feature works only for a single Active Directory repository at a time and is disabled
in the Multitenancy mode.
3. Generate a keytab file for each Advanced Authentication server and upload them in the
appliance for each server. For more information, see Uploading Keytab File.
4. After configuring the Kerberos SSO options and uploading the keytab files, enable Allow
kerberos SSO for the required event. For more information on configuring an event, see
Configuring Events.
By default, the basic authentication window is displayed in your browser while accessing an
Advanced Authentication portal. Advanced Authentication servers’ sites must be added to the local
intranet in the browser on the domain-joined workstations to avoid it. Perform the following steps to
do it for Internet Explorer:
1. From the Start menu, navigate to Control Panel > Network and Internet > Internet Options.
2. In the Internet Properties window, click the Security tab and select Local intranet.
You can configure Advanced Authentication to perform an SSO authentication to access the
Advanced Authentication web portals: Administration portal, Self-Service portal, Helpdesk portal, and
Reporting portal.
Perform the following steps to configure Advanced Authentication to perform an SSO authentication:
NOTE: This feature works only for a single Active Directory repository at a time.
4 Click Save.
5 Log in to a Domain Controller.
6 Generate the keytab files for the Kerberos authentication for each Advanced Authentication
server.
A Sample command to create the keytab file is:
where
aas1 is a server name (according to the record in DNS), the domain name is netiq.loc.
aas1srv is a service account created in the Active Directory for the Advanced
Authentication server. The password of this account is Q1w2e3r4.
The keytab file keytab_aas1srv is created in the C:\Temp folder.
7 Go to the Advanced Authentication Administration portal.
8 Click Server Options.
9 Scroll down to the Keytab file section.
10 Click Choose File and select a keytab file for the Advanced Authentication server.
11 Click Upload.
12 Repeat Step 8 to Step 11 for the other Advanced Authentication servers.
13 Click Events on the Global Master server.
14 Open the properties of any supported event: AdminUI, Authenticators Management, Helpdesk,
or Report logon.
15 Scroll down and set Allow Kerberos SSO to ON.
IMPORTANT: You must add the Advanced Authentication server sites to the local intranet in the
browser of the domain-joined workstations. To know how to do this for the Internet Explorer and
Firefox browsers, see the following note.
By default, Firefox browser does not support SSO. If you use the Firefox browser, you can enable
SSO by performing the steps defined on the Single Sign-On in Firefox page.
For example, if a user authenticates with the LDAP Password+Card chain once in a day, the user can
further use only the Card method without the LDAP Password method, or if a user authenticates with
the Fingerprint method once in every four hours, the user can authenticate once with this chain and
next authentication he can use only the Smartphone chain.
To enable tracking, set Enable tracking option to ON. You must enable this policy for the Require
chain option while creating a chain.
To configure a high-security chain and the corresponding simple chain, see Creating Chains.
IMPORTANT: You must configure the appropriate settings in your repository for the options to
function appropriately. For Active Directory Domain Services, you must enable the Account
lockout threshold policy on Domain Controllers.
For NetIQ eDirectory, you must configure the Intruder Detection properly.
After a user’s account is locked (not in the repository), you can unlock the user account. To do this,
click Repositories > Edit > Locked Users and click Remove against the user’s account name.
For example, if pjones is a member of the company repository, then while logging in, instead of
specifying company\pjones, you can specify only pjones.
To add a repository as default, move the repository from Available to Default and click Save.
3.8.16 Logo
This policy allows you to set and customize an image as a logo for the Administration and Self-
Service portal. You can also set an alternate text instead of an image as logo.
To set a logo for the Administration and Self-Service portal, perform the following steps:
NOTE: The logo is applied for all the tenants. A tenant administrator cannot customize the logo.
NOTE: Before enabling the policy, you must ensure the Advanced Authentication Logon Filter is
installed on all the Domain Controllers in the domain. Else, you might face problems with password
validation during password synchronization on workstations that have the Windows Client installed.
For information about how to configure Logon Filter, see Configuring Logon Filter.
Authentication Flow
The authentication flow for the Mail sender is described in the following image.
A user wants to authenticate on an endpoint such as a laptop or a website with the Email OTP
method. The following steps describe the authentication flow:
1 When the authentication request is initiated, the endpoint contacts the Advanced Authentication
server.
2 The Advanced Authentication server validates the user’s credentials and gets an email address
of the user from a repository.
Access configuration
Advanced Authentication server - Mail Server (SMTP, outbound).
A tenant is a company with a group of users sharing common access with specific privileges. The
Multitenancy options policy helps you to create a single instance of Advanced Authentication
solution that supports multiple tenants.
Enable Multitenancy mode to support more than one tenant on a single appliance.
For workstations with Windows Client, Mac OS X Client, or Linux PAM Client installed, you must
perform the following steps before you enable Multitenancy options:
1. Ensure that you have installed Advanced Authentication 5.4 or later Client components.
2. Configure the Clients to point to a tenant.
For information about how to configure Multitenancy in Windows Client, see Configuration
Settings for Multitenancy.
For information about how to configure Multitenancy in Mac OS X Client, see Configuration
Settings for Multitenancy.
For information about how to configure Multitenancy in Linux PAM Client, see Configuration
Settings for Multitenancy.
These steps are critical and if not performed, the users on the workstations cannot login.
IMPORTANT: The Multitenancy options policy is hidden when your license does not have the
Multitenancy feature. To have the policy, you must apply for a license that contains the Multitenancy
feature.
Set Update password on change to OFF to prompt the user to synchronize the LDAP password
while logging in to Windows when the password is changed in the Active Directory.
Set Update password on reset to ON to update the LDAP password automatically in Advanced
Authentication when it is it is reset in the Active Directory.This helps users to authenticate without
getting a prompt to synchronize the password if it is reset.
Set Update password on reset to OFF to prompt the user to synchronize the LDAP password
while logging in to Windows when the user's password has been reset in the Active Directory.
NOTE: Endpoint for the Password Filter must be trusted. To do this, perform the following steps:
The following work flow describes the working of this policy in a multi-site environment for the
Smartphone authentication.
1. Smartphone app receives and updates the list of callback URLs during enrollment and in the
background when the Smartphone app starts.
2. When a user opens the Smartphone app, the app sends the request get salt to all callback
URLs.
3. Only one callback URL returns the salt to the Smartphone and this is an Advanced
Authentication server, which initiated the authentication.
4. The Smartphone app sends the user's answer (Accept/Reject) only to this Advanced
Authentication server.
NOTE: A tenant administrator cannot access the Public external URLs policy.
Generic
Twilio
MessageBird
NOTE: The parameters may differ for different SMS service providers. But the {phone} and
{message} variables are mandatory.
To configure SMS sender settings for Twilio service, perform the following steps:
To configure SMS sender settings for MessageBird service, perform the following steps:
IMPORTANT: MessageBird API v2 is not supported. To activate MessageBird API v1, perform the
following steps:
You can test the configurations for the SMS sender policy in the Test section.
1 Specify the phone number in Phone to which you want to send the SMS OTP.
2 Specify a message to be sent to the phone in Message.
3 Click Send test message!.
4 Click Save.
Real messaging uses async sender. Ensure that you have configured a chain with the SMS
method and assigned it to an event. Then sign-in to the Self-Service portal and test the SMS
authenticator. If it does not work, see the async logs.
Authentication Flow
The authentication flow for the SMS sender in Advanced Authentication is described in the following
image.
1 When the authentication request is initiated, the endpoint contacts the Advanced Authentication
server.
2 The Advanced Authentication server validates the user’s credentials and gets a phone number
of the user from a Repository.
3 Advanced Authentication server sends the request to a configured SMS Service Provider to
send an SMS message with the content that includes a one-time password (OTP) for
authentication.
4 SMS Service Provider sends the SMS message to the user's phone.
5 SMS Service Provider sends the 'sent' signal to the Advanced Authentication server.
6 Advanced Authentication server sends a request to the user to specify an OTP on the endpoint.
7 The user specifies the OTP from the SMS message. The Advanced Authentication server gets
the OTP.
8 Advanced Authentication server then validates the authentication. The authentication is done or
denied.
Access configuration
Advanced Authentication server - SMS Service Provider (HTTP/HTTPS, outbound).
1 Set Enable integration to ON to enable the integration of Advanced Authentication with Services
Director.
2 Specify the Public DNS name of Advanced Authentication, Services Director DNS Name, Tenant
Admin Name, and Tenant Admin Password of Services Director to integrate it with Advanced
Authentication.
IMPORTANT: The WebAuth option must be enabled in Server Options before configuring this policy.
For more information about configuring this policy, see “SAML 2.0”.
For information about how to configure Advanced Authentication integration with Salesforce using
SAML 2.0, see “Configuring Integration With Salesforce”.
To configure Voice Sender settings for Twilio service, perform the following steps.
Authentication Flow
The authentication flow for the Voice sender in Advanced Authentication is described in the following
image.
A user wants to authenticate on an endpoint such as a laptop or a website with the Voice Call method.
The following steps describe the authentication flow:
1 When the authentication request is initiated, the endpoint contacts the Advanced Authentication
server.
2 The Advanced Authentication server validates the user’s credentials and gets a phone number
of the user from a repository.
3 Advanced Authentication server sends the request to a configured voice call service provider
(Twilio) to call the user.
4 The voice call service provider calls the user.
5 The user picks up the phone, listens to the call, and specifies the PIN followed by the hash (#)
sign.
6 Voice call provider sends the specified PIN to the Advanced Authentication server.
7 Advanced Authentication server then validates the authentication. The authentication is done or
denied.
Access configuration
Advanced Authentication server - Voice Call Service Provider (HTTP/HTTPS, inbound/ outbound).
NOTE: The certificate must not contain any of the encrypted private keys.
IMPORTANT: Smartphone and Voice Call authentication providers work only with a valid SSL
certificate. Self-signed certificate does not work.
1 Log in to the Advanced Authentication Administration portal directly and not through a load
balancer or Access Manager.
2 Click Server Options.
3 Click Browse and select a new SSL certificate. The file must contain both the certificate and the
private key.
Intermediate certificates must also be placed in the certificate file in the .pem or .crt or .pfx
format if they are present.
4 Click Upload.
You can set a custom login page background. It must be a JPEG or PNG image and the
recommended resolution is 1920x774 px, 72 dpi. You must not use backgrounds whose size exceeds
100KB. To apply a custom login page background, perform the following steps:
NOTE: The changes that you do to the WebAuth settings do not replicate to the other servers.
1 Generate a keytab file for Kerberos authentication to the Advanced Authentication server on a
Domain Controller. For information on generating a keytab file, see the website.
Sample command to create the keytab file: ktpass /princ HTTP/[email protected]
/mapuser [email protected] /crypto ALL /ptype KRB5_NT_PRINCIPAL /mapop set
/pass Q1w2e3r4 /out C:\Temp\keytab_aas1srv
Information about the sample command is as follows:
HTTP in upper-case is mandatory in the parameter for keytab file. For more information, see
the website.
aas1 is a server name (according to record in DNS), the domain name is netiq.loc.
aas1srv is a service account specially created in Active Directory for the Advanced
Authentication server, Q1w2e3r4 is the password.
The keytab file keytab_aas1srv is created in the folder C:\Temp.
IMPORTANT: If there are multiple Advanced Authentication servers in the cluster, generate a
keytab file for each Advanced Authentication server. Different users must be used for the keytab
file generation for each server.
NOTE: Keytab file can be removed only when an Active Directory repository is selected in the
Kerberos SSO Options policy.
1. Click Licenses.
2. Click Add.
3. Click Browse and select the valid license.
4. Click Upload to upload the license.
A user license is consumed when a user enrolls at least one authenticator through an automatic
enrollment, enrollment by a Helpdesk administrator, or self-enrollment. This is an exception for the
LDAP password, as a license is not consumed for it. An automatic enrollment is done only when a
user performs a first authentication.
IMPORTANT: The Advanced Authentication server uses ports 443 and 80. These ports cannot be
changed.
Advanced Authentication supports port forwarding but it is not recommended. Here, the entire
appliance is available through the internet. It is recommended to use reverse proxy to map only the
specific URLs.
By default, the Advanced Authentication server uses the following RFC standard ports.
Database replication 5432: This port is TCP Database replication between DB servers
required only for
the installation of a
new DB Server.
Then the port can
be closed.
LDAPS 636 TCP,UDP LDAP over TLS/SSL (if used with repository)
IMPORTANT: Any port can be used in case of reverse proxy. For example, https://dnsname:888/
smartphone. A reverse proxy redirect is done from port 888 to port 443 internally to appliance. Port
888 is used from outside, but port 443 is used inside the appliance.
Smartphone
/smartphone/adddevice/{path}/{enc_dev_id}
/smartphone/confirm/{path}
/smartphone/pushid/{path}
/smartphone/requestsalt/{path}
/smartphone/saltpushid/{path}
/twilio/gather/{proc_id}
/twilio/otp/{proc_id}
/twilio/otp_anon/{tenant_id}/{otp}
/twilio/status/{proc_id}
In a production environment, you must use more than one Advanced Authentication server for fault
tolerance, load balancing, and redundancy. In Advanced Authentication, a cluster consists of sites.
Each site is installed in a specific geographical location and contains the following:
A DB Master server
One or two DB servers that are used for only backup and fail-over
Maximum of 6 Web servers without a database that are used in combination with a third-party
load balancer for load balancing.
All these servers handle the authentication requests from clients of the same location. The Advanced
Authentication server that you deploy first gets the Global Master and Server Registrar roles.
Desc: Status of the server. Click the edit icon to add or edit the description.
Heartbeat: Time of the last ping. Each server is pinged every 5 minutes.
Configuring a Cluster 95
IMPORTANT: Ensure to take regular snapshots of all the DB servers at the same time or to
clone them to protect the environment from any hardware issues or accidental failures. It is
recommended to do this for the following scenarios:
Each time you change the configuration of repositories, methods, chains, events, and
policies.
After performing the enrollment.
In large companies, the enrollment can be used on a daily basis as a massive
enrollment. In such scenarios, it is good to create snapshots regularly (it can be
fortnightly or monthly).
When you are adding or removing servers in the cluster.
Before you upgrade Advanced Authentication servers in the environment.
You can convert a DB server of the primary site to a Global Master server or a DB server
from the secondary site to a DB Master server of the same site. You must update the DNS
settings after the conversion. If the Global Master and the DB servers from the primary site
are lost, you cannot replace them.
NOTE: All the servers in a cluster must have the same version.
5 Click Register new site if your company is geographically distributed and to deploy a DB Master
server in another site. For information about creating a new site, see Registering a New Site.
6 Click Register new server to register a new server in one of the existing sites. For information
about creating a new site, see Registering a New Server.
If you have configured a cluster and you receive a replication conflict, click Resolving Conflicts.
Before registering a new site, ensure that the following requirements are met:
You have an administrator’s privilege to access the Advanced Authentication Server Registrar.
You have installed the Advanced Authentication server appliance that has the same version as
the Global Master server. Ensure that you have not configured for a DB server in the new site.
To register a new site and to deploy a DB Master server in the site, perform the following steps:
WARNING: You must specify a DNS hostname instead of an IP address because appliance
does not support the changing of IP address.
6 Click Next.
7 Specify a password for the LOCAL\admin account.
You may get the error Remote host returned error: Wrong password of key file
(AuError) when you are trying to deploy a DB server on the previous versions of Advanced
Authentication server. You must have Advanced Authentication 5.5-326 or later installed.
8 Click Next.
In Import database information, a message Waiting for Global Master.... is displayed.
9 Goto the Advanced Authentication Administration portal of the Advanced Authentication Server
Registrar.
10 Click Register new site in Cluster.
11 Specify a host name for the new DB server of the new site in Master server host.
TIP: If the new server is behind NAT, you can forward its port 443 on a temporary basis and
specify an external hostname:port. You must close the port after installation.
NOTE: Each of the DB servers in the list is pinged every 5 minutes. If an issue occurs, the server
is marked in red. To view the details of connectivity issues click View log. To view the replication
issues, click Conflicts.
Configuring a Cluster 97
NOTE
You must install the new servers one at a time. Simultaneous installations may cause replication
issues.
The inter-site replication interval is 10 seconds.
After you create a Global Master (in the primary site) or a DB Master (in the secondary site), you must
deploy DB servers for database backup. For this, you must register a new server or a Web server.
Before registering a new site, ensure that the following requirements are met:
You have an administrator’s privilege to access the Advanced Authentication Server Registrar.
You have installed the Advanced Authentication server appliance that has the same version as
the Global Master server. Ensure that you have not configured for a new server.
To deploy a new DB server or a Web server in an existing site, perform the following steps:
WARNING: You must specify a DNS hostname instead of an IP address because appliance
does not support the changing of IP address.
6 Click Next.
7 Specify a password for the LOCAL\admin account.
You may get the error Remote host returned error: Wrong password of key file
(AuError) when you are trying to deploy a DB server on previous versions of Advanced
Authentication server. You must have Advanced Authentication 5.5-326 or later installed.
8 Click Next.
In Import database information, a message Waiting for Global Master.... is displayed.
9 Goto the Advanced Authentication Administration portal of the Advanced Authentication Server
Registrar.
10 Click Register new server in Cluster.
11 Specify the new server's host name in Server host.
TIP: If the new server is behind NAT, you can forward its port 443 on a temporary basis and
enter external hostname:port. You must close the port after installation.
NOTE: If you select DB Server, you must copy the database from Global Master. Open database
port <Registrar_host_name>:5432 on your NAT/Firewall. You must close the port after
installation.
NOTE: Each of the DB servers in the list are pinged for every 5 minutes. If an issue occurs, the
server is marked in red. To view the details of connectivity issues click View log. To view the
replication issues, click Conflicts.
NOTE: You must install the new servers one at a time. Simultaneous installations may cause
replication issues.
During upgrade when a new server communicates with the old server.
When two unique objects have been added.
Outgoing conflict indicates an incoming conflict on the destination server. Unique object collision
causes two corresponding conflicts: incoming and outgoing conflicts on both the source and target
servers.
Configuring a Cluster 99
Smarter way: Click Fix on a server in one site and click Forget on a server in the other site.
Possible way: Click Forget outgoing on the servers in both the sites. You can use this method
for UPDATE conflicts. Object changes are lost but will sync on next object change.
Zero way: Source server automatically re-sends the changes until you forget the outgoing
conflict.
Purge working tables: This method is used as a last resort. If you see low-level errors in the
replication log, if conflict resolution does not work for you, you may force the replication system
to forget all pending replicas and re-initialize.
Advanced Authentication scans for the replication conflicts, automatically. To resolve the existing
conflicts, in the Cluster section of the Advanced Authentication Server Registrar, click Conflicts. If no
conflicts are detected, only the information is displayed. If there are any conflicts, the details and
controls to resolve the conflicts are displayed. You will get a confirmation request with each action.
The confirmation contain notes that help you to resolve the conflicts.
NOTE: Advanced Authentication supports DNS round-robin and third-party VIP, but only with Sticky
sessions. The DNS Discovery mechanism is excluded from the workflow. Advanced Authentication
clients are pointed to a load balancer that manages all traffic.
Target configuration:
Before you start the configuration, ensure that the following requirements are met:
round-robin: The requests to the application servers that are distributed in a round-robin fashion.
least-connected: Next request assigned to the server with the least number of active
connections.
ip-hash: A hash-function that is used to determine which server must be selected for the next
request (based on the client’s IP address).
This document describes the ip-hash configuration because the REST queries that are balancing
require sticky-session enabled and ip-hash is a similar mechanism.
In this document, the ip-hash configuration has been described because for the REST queries that
are balancing, the sticky-session must be enabled. The ip-hash has a similar mechanism.
1 Create a backup of the original configuration file by running the following command:
sudo cp /etc/nginx/nginx.conf /etc/nginx/nginx.conf_original.
NOTE: This configuration file allows to balance REST, Administration, and Self-Service portal
requests.
2 Copy the certificate from any Advanced Authentication server in a cluster from the directory /
etc/nginx/cert.pem to the same directory on a load balancer.
3 Open the nginx.conf file and replace with the following:
user www-data;
worker_processes auto;
pid /run/nginx.pid;
events {
worker_connections 768;
# multi_accept on;
}
http {
##
# Basic Settings
##
sendfile on;
#tcp_nopush on;
# server_names_hash_bucket_size 64;
# server_name_in_redirect off;
#include /etc/nginx/mime.types;
#default_type application/octet-stream;
##
# SSL Settings
##
##
# Logging Settings
##
access_log /var/log/nginx/access.log;
error_log /var/log/nginx/error.log;
##
# Gzip Settings
##
gzip on;
gzip_disable "msie6";
gzip_vary on;
gzip_proxied any;
gzip_comp_level 6;
gzip_buffers 16 8k;
gzip_http_version 1.1;
gzip_types text/plain text/css application/json application/javascript text/
xml application/xml application/xml+rss text/javascript;
##
# Virtual Host Configs
##
include /etc/nginx/conf.d/*.conf;
include /etc/nginx/sites-enabled/*;
resolver 192.168.1.56 valid=300s ipv6=off; # ip address of DNS
resolver_timeout 10s;
upstream aaf-clu {
ip_hash; # Type of load balancing mechanism
server aaf-clu-gm.utopia.locl:443; #192.168.1.70:443;
server aaf-clu-gs.utopia.locl:443; #192.168.1.71:443;
}
server {
listen 443 ssl;
# Rule for REST
location ~ ^/user/api/ {
proxy_set_header X-Real-IP $remote_addr;
1 Install Windows Client. To install Windows Client, see “Installing Windows Client” in the
Advanced Authentication - Windows Client guide.
2 Open the configuration file: C:\ProgramData\NetIQ\Windows Client\config.properties.
You can determine the optimal number of Web servers only with experimenting. It is recommended to
identify the number of Web servers when the user’s activity is high. For example, when all users start
their workday.
upstream aucore443 {
server 192.168.108.32:443 weight=1;
server 192.168.108.33:443 weight=2;
server 192.168.108.34:443 weight=2;
}
3b Using least_conn:
upstream aucore443 {
least_conn;
server 192.168.108.32:443;
server 192.168.108.33:443;
server 192.168.108.34:443;
}
You can also use the following instructions to promote a DB server from a secondary site to a new DB
Master of the same site when the current DB Master of the site is broken.
NOTE: If you have two DB servers in the site, you must reinstall the second DB server to get the
latest database.
12 Log in to the Administration portal on Web servers. If you are not able to log in, reboot the Web
servers. If you are still unable to log in, redeploy the Web servers.
Advanced Authentication server supports the following ways to enroll the authentication methods:
Automatic enrollment: This type of enrollment is used for the SMS, Email, RADIUS, LDAP
Password, and Swisscom Mobile ID methods.
The methods are enrolled automatically if the chains containing them are assigned to any event.
Enrollment by Administrator: This type of enrollment is used for the OATH Tokens.
An administrator can import tokens from the PSKC or CSV files in the Administration portal >
Methods > OATH OTP > OATH Tokens tab. You can assign tokens to the specific users.
Enrollment by Helpdesk administrator: This type of enrollment is used by the Helpdesk
administrator.
A Helpdesk administrator can access the Helpdesk portal with the address: https://<NetIQ
Server>/helpdesk. In the Helpdesk portal, the Helpdesk administrator can enroll the
authentication methods for users. A Helpdesk administrator must be a member of the Enroll
Admins group (Repositories > Local > Edit > Global Roles) to manage users' authenticators.
Enrollment by User: This method is applicable for the users. A user can access the Self-Service
portal with the address: https://<NetIQ Server>/account, where the users can enroll any of
the authentication methods.
Advanced Authentication facilitates clients to integrate with the third-party solutions using the
following interface.
OAuth 2.0
RADIUS Server
SAML 2.0
REST API
The information about configuring Advanced Authentication with some of the third party solutions is
as follows:
In OAuth 2.0 authorization, the third-party client requests access to the resources that are controlled
by the resource owner. Instead of using the resource owner's credentials to access the protected
resources, the third-party client obtains an access token. The third-party clients can be web
applications, mobile phones, handheld devices, and desktop applications.
Resource Owner: Entity that grants access to a protected resource. It can be a system or a
person (end-user) owning the resources.
Resource Server: Server that hosts the protected resources. It accepts and responds to the
protected resource requests using the access tokens.
Client: Application that requests and get authorization on behalf of the resource owner to access
a protected resource.
Authorization Server: Server that issues access tokens to the client after the successful
authentication of the resource owner and obtaining authorization.
The authorization grant type depends on the method used by the application to request authorization,
and the grant types supported by the API.
1. The OAuth client initiates the flow when it directs the user agent of the resource owner to the
authorization endpoint. The OAuth client includes its client identifier, requested scope, local
state, and a redirection URI.
2. The authorization server authenticates the resource owner through the user agent and
recognizes whether the resource owner grants or denies the access request.
3. If the resource owner grants access, the OAuth client uses the redirection URI provided earlier to
redirect the user agent back to the OAuth client. The redirection URI includes an authorization
code and any local state previously provided by the OAuth client.
4. The OAuth client requests an access token from the authorization server through the token
endpoint. The OAuth client authenticates with its client credentials and includes the authorization
code received in the previous step. The OAuth client also includes the redirection URI used to
obtain the authorization code for verification.
5. The authorization server validates the client credentials and the authorization code. The server
also ensures that the redirection URI received matches the URI used to redirect the client in Step
3. If valid, the authorization server responds back with an access token.
It is used for user-agent-based clients. For example, single page web apps that cannot keep a
client secret because all the application code and storage is easily accessible.
Secondly, instead of the authorization server returning an authorization code which is exchanged
for an access token, the authorization server returns an access token.
1. The OAuth client initiates the flow by directing the user agent of the resource owner to the
authorization endpoint. The OAuth client includes its client identifier, requested scope, local
state, and a redirection URI. The authorization server sends the user agent back to the
redirection URI after access is granted or denied.
2. The authorization server authenticates the resource owner through the user agent and verifies
whether the resource owner grants or denies the access request.
3. If the resource owner grants access, the authorization server redirects the user agent back to the
client using the redirection URI provided earlier. The redirection URI includes the access token in
the URI fragment.
4. The user agent follows the redirection instructions by making a request to the web server without
the fragment. The user agent retains the fragment information locally.
The following web application describes the functionalities supported when Advanced Authentication
is integrated with OAuth 2.0. OAuth 2.0 server is an authorization and resource server. As an
Authorization Server, the OAuth server can prompt the users to go through authentication chains and
as a resource server, the OAuth server can prompt the users to provide user details.
app = Bottle()
client_id = 'id-rSCzuBLQgXCATfkXZ4fsedAo8sPsWxSs'
client_secret = 'secret-91DpzWFD26RriURR7KJ1pryFx7V9QeDm'
redirect_uri = 'http://localhost:8088/' # this app callback URI
authorization_endpoint = 'https://192.168.0.151/osp/a/TOP/auth/oauth2/grant'
attributes_endpoint = 'https://192.168.0.151/osp/a/TOP/auth/oauth2/
getattributes'
state = {}
@app.get('/getattr')
def get_attributes():
params = urlencode({
'attributes': 'client username userRepository user_dn user_cn mail sid
upn netbiosName',
'access_token': state['access_token']
})
url = attributes_endpoint + '?' + params
print('getattr url: {}\n'.format(url))
req = urllib.request.Request(url)
gcontext = ssl.SSLContext(ssl.PROTOCOL_TLSv1_2) # avoid cert checking
with urllib.request.urlopen(req, context=gcontext) as response: # perform
GET request and read response
rsp = response.read()
attributes = json.loads(rsp.decode('utf-8'))
return template('attributes.html', items=attributes.items(),
refresh_token=urllib.parse.quote(state['refresh_token']))
@app.get('/')
@app.get('/logon')
def do_logon():
pr=list(urlparse(authorization_endpoint))
# set query
pr[4]=urlencode({
'response_type': 'code',
'client_id': client_id,
'redirect_uri': redirect_uri
})
# perform redirection to OAuth 2 authentication server
redirect(urlunparse(pr))
@app.get('/logon-implicit')
def do_logon_implicit():
# parse authorization_endpoint URL
pr = list(urlparse(authorization_endpoint))
# set query
pr[4] = urlencode({
'response_type': 'token',
'client_id': client_id,
})
# perform redirection to OAuth 2 authentication server
redirect(urlunparse(pr))
@app.get('/logon-creds')
def do_logon_creds():
return template('logonform.html')
@app.post('/logon-creds')
def do_logon_creds_post():
username = request.forms.get('username')
password = request.forms.get('password')
token = get_token_password(username, password)
state.update(token)
return template('token.html', items=token.items(),
refresh_token=urllib.parse.quote(token['refresh_token']))
def get_token_code(code):
# prepare POST parameters - encode them to urlencoded
data = urlencode({
'grant_type': 'authorization_code',
'code': code,
'redirect_uri': redirect_uri
})
data = data.encode('ascii') # data should be bytes
resp_text = post_data(data, prepare_headers())
print(resp_text)
return json.loads(resp_text)
def refresh_access_token(refresh_token):
print('refresh_token: {}'.format(refresh_token))
# prepare POST parameters - encode them to urlencoded
data = urlencode({
'grant_type': 'refresh_token',
'refresh_token': refresh_token,
})
data = data.encode('ascii') # data should be bytes
resp_text = post_data(data, prepare_headers())
print(resp_text)
return json.loads(resp_text)
NOTE: In the script, you must change the values for client_id, client_secret, and Advanced
Authentication server address in authorization_endpoint and attributes_endpoint (lines
10-14).
<!DOCTYPE html>
<html>
<head lang="en">
<meta charset="UTF-8">
<title></title>
<script type="text/javascript">
//<![CDATA[
function getHashParam(name) {
var hash = window.location.hash;
if (hash) {
if (name = (new RegExp('[#&]' + encodeURIComponent(name) +
'=([^&]*)')).exec(hash))
return decodeURIComponent(name[1]);
}
}
function showResult() {
if (window.location.hash) {
document.getElementById('result').innerHTML = '<table
border="1">'+
'<tr><td>access_token</
td><td>'+getHashParam('access_token')+'</td></tr>'+
'<tr><td>token_type</
td><td>'+getHashParam('token_type')+'</td></tr>'+
'<tr><td>expires_in</
td><td>'+getHashParam('expires_in')+'</td></tr>'+
'</table>';
} else {
document.getElementById('result').innerHTML = 'Implicit
granted token is not found';
}
}
// ]]>
</script>
</head>
<body onload="showResult();">
<div id="result">result</div><br/>
<br/>
Click <a href="/logon">here</a> to obtain an authentication token through
Authorization Code Grant<br/>
Click <a href="/logon-implicit">here</a> to obtain an authentication token
through Implicit Grant (the token will be received in hash part of THIS
page)<br/>
Click <a href="/logon-creds">here</a> to obtain an authentication token through
Resource Owner Password Credentials Grant<br/>
</body>
</html>
<!DOCTYPE html>
<html>
<head lang="en">
<meta charset="UTF-8">
<title></title>
</head>
<body>
Attributes<br/>
<table border="1">
% for k, v in items:
<tr>
<td>{{k}}</td>
<td>{{v}}</td>
</tr>
% end
</table>
<br/>
<a href="/refresh?refresh_token={{refresh_token}}">Refresh token</a>
</body>
</html>
5. Logon form for Resource Owner Password Credentials Grant mode (logonform.html)
<!DOCTYPE html>
<html>
<head lang="en">
<meta charset="UTF-8">
<title></title>
</head>
<body>
<form method="post" action="/logon-creds">
User name: <input type="text" name="username"><br/>
Password: <input type="password" name="password"><br/>
<input type="submit">
</form>
</body>
</html>
user_name pjones
repository_name TESTCOMPANY
naafUserSID S-1-5-21-3320677580-2179873152-1514081409-1103
naafUserDN CN=Paul
Jones,CN=Users,DC=testcompany,DC=local
naafUserUPN [email protected]
naafUsernameNetBIOS TESTCOMPANY\pjones
client id-0TRljvJEe3qKwJiXvy3IbjvcixfiiY1Q
naafUserEmail [email protected]
The following table displays the OAuth 2.0 attributes for a local user.
Attribute Value
user_name ADMIN
repository_name LOCAL
client id-0TRljvJEe3qKwJiXvy3IbjvcixfiiY1Q
The sign endpoint helps to create a signed and encrypted data packet that can be used to supply data
to other endpoints. For more information, see the Sign class documentation.
The only endpoint with which the signed data is currently used is the grant endpoint when it is used
with the authorization code grant and implicit grant types.
The signed data can be used to supply one or both of the following:
Username: Supplying the username for a client application is useful when you already know the
username.
Advanced Authentication chain: An Advanced Authentication server (5.6 or later) can be used
to supply one or more additional authentication factors by authenticating with Advanced
Authentication OAuth 2.0 for a user who is already authenticated. The username and name of
the desired authentication chain containing the factor(s) is supplied.
You must be able to resolve username in an Advanced Authentication repository and you must
configure the chain in the Advanced Authentication event for the OAuth 2.0 client used.
You can accomplish OAuth 2.0 client authentication with HTTP Basic or Bearer authorization header
value.
Request parameters
See OAuth2Constants.OAUTHX_REQUEST_PARAM_DATA.
ttl (optional): The time-to-live period of the result data in milliseconds. If no value is supplied,
then the default value of 30 seconds is used.
The Advanced Authentication server provides a built-in RADIUS server that can authenticate any
RADIUS client using one of the chains configured for the event.
IMPORTANT
1 Click Events.
2 Click Edit next to the Radius Server event.
3 Ensure that Is enabled is set to ON.
4 Select the chains that you want to assign to the event.
5 Select Radius from Endpoint whitelist.
6 Click Add to add and assign a RADIUS Client to the event:
6a Specify the IP address of the RADIUS Client in IP Address.
6b Specify the RADIUS Client name in Name.
6c Specify the RADIUS Client secret and confirm the secret.
6d Ensure that the RADIUS Client is set to ON.
NOTE: It is mandatory to specify NAS ID for new RADIUS event but not for the default RADIUS
server event.
8 Set Bypass user lockout in repository to ON, if you want to allow repository locked-out users to
be authenticated on the Advanced Authentication. By default, Bypass user lockout in repository
is set to OFF and users locked on repository is not allowed to authenticate.
9 Click Save.
1. Each chain assigned to the RADIUS event may be assigned to a different LDAP group. For
example, LDAP Password+Smartphone chain is assigned to a Smartphone users group, LDAP
Password+HOTP chain is assigned to a HOTP users group. If a RADIUS user is a member of
both groups, the top group is used.
2. You can use the RADIUS authentication using any chain when entering <username>&<chain
shortname> in username. For example, pjones&sms. Ensure that you have the short names
specified for the chains. You cannot use this option in your RADIUS client (similar to FortiGate).
3. By default, the top chain specified in the Radius Server event in which all the methods are
enrolled is used. But, you can authenticate with the RADIUS authentication using another chain
from the list when specifying <username>&<chain shortname> in username. For example,
pjones&sms. Ensure that you have specified the short names for chains. Advanced
Authentication does not support this option for some RADIUS clients such as FortiGate.
NOTE: If you use the LDAP Password+Smartphone chain, you can use an offline authentication by
specifying the following the password in the <LDAP Password>&<Smartphone OTP> format. For
example, Q1w2e3r4&512385. This option is supported for LDAP Password+OATH TOTP,
Password+Smartphone, Password+OATH TOTP, Password+OATH HOTP.
Challenge-Response Authentication
If you have configured a multi-factor chain such as LDAP Password&SMS OTP or any other
combination chain, some users (during the authentication) might not be able to specify the
<Password>&<OTP> in a single line (because of the Password length limit in RADIUS). In this case,
you can configure the existing RADIUS Client by performing the following steps:
When you enable Multitenancy, you can use one of the following formats to represent the user name:
<repository_name>\<username>
<tenant_name>\<repository_name>\<username>
<username>@<tenant_name>
<repository_name>\<username>@<tenant_name>
Advanced Authentication stores the RADIUS event settings only on a server where the administrator
performs the configuration (typically this is the DB Master server). After the DB Slave server is
converted to DB Master server, the configuration may be lost. Goto the Radius Server event settings
and click Save to apply the configuration.
SAML 2.0 is an XML-based protocol that uses security tokens containing assertions. The assertions
are used for sending the information about a subject (an entity that is often a human user) from a
SAML authority (Identity Provider) to a SAML consumer (Service Provider).
To integrate Advanced Authentication with the third-party solutions using SAML 2.0, perform the
following steps
NOTE: You must enable the WebAuth option separately for each server where ever required.
8 Copy and paste your Service Provider's SAML 2.0 metadata to SP SAML 2.0 metadata.
OR
Click Browse and select a Service Provider's SAML 2.0 metadata XML file to upload it.
9 Click Policies > SAML 2.0 options.
10 (Conditional) If required in External URL, specify the Identity Provider’s URL.
11 Click Download IdP SAML 2.0 Metadata to open a metadata.The metadata opens in a new
browser page.
12 Save the metadata (XML text) from the browser.
13 (Conditional) If required, use the downloaded metadata file in your Service Provider.
14 (Conditional) If required, use the Identity Provider certificate in your Service Provider.
15 Change used hash to SHA-1 in your Service Provider, if the option is presented.
To configure the Advanced Authentication integration with Barracuda SSL VPN, perform the following
steps.
Citrix NetScaler VPX (version NS11.0 has been used to prepare these instructions) is installed.
Advanced Authentication 5 appliance is installed.
Fortinet FortiGate virtual appliance v5 (Firmware version 5.2.5, build 8542 has been used to
prepare these instructions) is installed.
Advanced Authentication v5 appliance is installed.
NOTE: The Token Code field has a limitation of 16 digits. Hence you may face issues when using the
YubiKey tokens that enters 18-20 digits code.
OpenVPN v2 appliance (version 2.0.10 was used to prepare these instructions) is installed.
Advanced Authentication v5 appliance with a configured repository is installed.
You have selected a chain from the Used section in the Radius Server settings for connecting to
OpenVPN.
You have set the default repository name in Policies > Login options of the Advanced
Authentication v5 appliance.
You must specify a Short name of the chain in the username after the <username> and space (you
can specify the Short name in the Chains section of the Advanced Authentication v5 appliance), if:
You have selected multiple chains from the Used section for connecting to OpenVPN.
NOTE: Some of the authentication methods require a correct time on the OpenVPN appliance. You
can sync the time of the OpenVPN appliance using the following commands:
/etc/init.d/ntp stop
/usr/sbin/ntpdate pool.ntp.org
Workaround: OpenVPN assumes each attempt of the challenge response (request of additional
data in chain) as an error.
NOTE: This configuration has been tested with PAN-OS 6.1.5 to 7.1.x and GlobalProtect 2.1x.
Perform the following steps to configure the integration of Advanced Authentication appliance with
Salesforce using SAML 2.0:
-----BEGIN CERTIFICATE-----
MIIDkzCCAnugAwIBAgIESsmdMzANBgkqhkiG9w0BAQsFADB6MRAwDgYDVQQGEwdVbmtub3duMR
Aw
DgYDVQQIEwdVbmtub3duMRAwDgYDVQQHEwdVbmtub3duMREwDwYDVQQKEwhBdXRoYXNhczESMB
AG
A1UECxMJQXV0aGFzYXNhMRswGQYDVQQDExJvc3AuYXV0aGFzYXMubG9jYWwwHhcNMTYwNTI2MD
Uz
NjI0WhcNMjYwNDA0MDUzNjI0WjB6MRAwDgYDVQQGEwdVbmtub3duMRAwDgYDVQQIEwdVbmtub3
du
MRAwDgYDVQQHEwdVbmtub3duMREwDwYDVQQKEwhBdXRoYXNhczESMBAGA1UECxMJQXV0aGFzYX
Nh
MRswGQYDVQQDExJvc3AuYXV0aGFzYXMubG9jYWwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwgg
EK
AoIBAQCw3YLz03qhSZPXjBc/Ws+cZ2/
E5oogqKeJ3p4RR6USOoarjnmvQPq+maRfvexriwQjRDgS
OFRb58cert/
misqzsHBVmQDnfMwicFVzuuKjDEbWFp9vL1gRkDzIlpCyl3eNmBWuWXM49Z6mm8XS
fIwlAoydNp5DK0o0Yrk6FNOi0nOrnI5kHGVD0bd5SpDtvXSF1WLfc5YT9UBUpfZneKsVPWSkbe
BX
F84hYJWBtdzcTEyjdso9Ra7UtxLIUW0UH3LWTgn9zS97nLkmhetmD1I3mEAeAE9SAmqTRyH1FN
XZ
3c In Single Sign-On Settings, click New and specify the required details.
1. Name: Advanced Authentication
2. API Name: AAF
3. Issuer: https://AdvancedAuthenticationServerAddress/osp/a/TOP/auth/
saml2/metadata, where you must replace AdvancedAuthenticationServerAddress
with the domain name or IP address of your Advanced Authentication server.
4. Entity ID: https://CompanyName.my.salesforce.com/
5. Click Choose File to open the Identity Provider Certificate.
6. SAML Identity Type: Select Assertion contains the Federation ID from the User
object.
7. SAML Identity Location: Select Identity is in an Attribute element.
8. Attribute Name: upn.
9. Service Provider Initiated Request Binding: Select HTTP Redirect.
10. Identity Provider Login URL: https://AdvancedAuthenticationServerAddress/
osp/a/TOP/auth/saml2/sso.
11. Select User Provisioning Enabled.
12. Click Save.
3d Click Edit for Federated Single Sign-On Using SAML.
3e Select SAML Enabled.
3f Click Save.
3g Click Settings > Users.
3h Click Edit for the required Salesforce users by adding Federation ID for the user accounts.
The Federation ID corresponds to userPrincipalName attribute in Active Directory. For
example, [email protected].
NOTE: The name that you specify in Federation ID is case sensitive. The following error
may occur, if you ignore the case:
We can't log you in. Check for an invalid assertion in the SAML Assertion
Validator (available in Single-Sign On Settings) or check the login history
for failed logins.
3i Click your profile icon and click Switch to Salesforce Classic. This mode is required to tune
the domain options.
IMPORTANT: You must use the server name or IP address specified in the Issuer field of
Salesforce.
NOTE: Verify that you can access the file in your browser. If the file is not displayed, you
have an issue on ADFS that you need to resolve.
1g Click Policies.
1h Set External URL to https://AdvancedAuthenticationServerAddress/ and replace
AdvancedAuthenticationServerAddress with the domain name or IP address of your
Advanced Authentication server.
1i Click Download IdP SAML 2.0 Metadata. You must open the file as an XML file.
NOTE: If {"Fault":{... ` is displayed, it indicates that you have not configured properly.
Verify the configuration.
Perform the following steps to configure the integration of Advanced Authentication appliance with
Google G Suite using SAML 2.0:
NOTE: As a prerequisite, ensure that you finalize the setup of G Suite by accepting the agreement
and clicking Finalize setup.
NOTE: You cannot use the Google administrator account with SAML.
7 Create a new text file and add the Service Provider metadata to it:
<EntityDescriptor entityID="google.com"
xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
<SPSSODescriptor
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</
NameIDFormat>
<AssertionConsumerService index="1"
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://www.google.com/a/mycompany.com" />
</SPSSODescriptor>
</EntityDescriptor>
NOTE: You must use the Service Provider metadata when one domain exists in the G Suite. If
you have more than one domain in G Suite, then every Service Provider metadata for each
domain must have google.com as entityID replaced with google.com/mycompany.com, where
mycompany.com is your domain name.
Authentication
NOTE: It is required to assign chains to the Report logon event in the Events section.
The Reporting portal does not work behind a load balancer. You need to open it directly.
System
CPU load in the AuCore stats 3 dashboard
Memory load in the AuCore stats 3 dashboard
You can select Last N minutes in the top-right corner to change the period of the report. To switch
dashboard, click Load saved dashboard icon in the toolbar and select a required dashboard.
FULL ADMINS can view the reports from all tenants. To view the reports of a specific tenant, you
must login to the Reporting portal as the tenant admin.
Reporting 147
148 Advanced Authentication - Administration
12 Logging
12
Advanced Authentication provides the logging functionality. All the administrative and user actions
and events are logged. You can export the logs to a compressed file in the tar.gz format.
Syslog
RADIUS
Async
Web server
Replication
Superuser
Background tasks
NGINX Errors
WebAuth logs (OAUTH 2.0, SAML 2.0)
NOTE: A tenant administrator cannot access the Web server logs, Replication logs, Superuser logs,
and Background tasks logs.
You can change a time zone in the upper-right section that displays your local time zone. The
changes are applied for only the logs displayed and are not applied for the exported logs. Advanced
Authentication resets the time zone when you switch from the Logs section or close the
Administration portal.
You can export the log files. To export logs, perform the following steps:
You can clear all the logs on the server that you are currently logged on. To clear the logs, perform the
following steps:
A message appears to confirm that you want to continue clearing the logs.
NOTE: It is a good practice to export the logs to save as backup before you delete them.
Logging 149
12.1 Syslog
These logs contain information about the system events and actions.
0 - 100: Maintenance
100 - 200: Access
200 - 300: App data
300 - 400: Endpoints
400 - 500: Repositories
500 - 600: Local users
600 - 700: Repository users
700 - 800: User templates
800 - 900: Policies
900 - 1000: Licenses
1000 - 1100: Settings
1100 - 1200: Password filter
1201 - 1300: Background logon
Logging 151
Code Name Class Severity Optional Example
Parameters
tenant_name=Mycompany
Logging 153
Code Name Class Severity Optional Example
Parameters
tenant_name=Mycompany
Logging 155
Code Name Class Severity Optional Example
Parameters
Logging 157
Code Name Class Severity Optional Example
Parameters
Logging 159
Code Name Class Severity Optional Example
Parameters
To configure logs forwarding to a third-party syslog server, see CEF Log Forward Policy.
Logging 161
12.3 Async Logs
These logs contain information about the asynchronized delivery of OTP messages for the SMS,
Email, and Voice methods.
There is a hard coded log rotation based on the file size. The maximum size of a log file is 20 MB and
for WebAuth logs it is 10 MB. Advanced Authentication stores last ten log files of each type.
With Managing Tokens you can import a file that contains information about multiple tokens and
assign the tokens to users.
You must assign chains to the Tokens Management event in the Events section to access Tokens
Management portal.
5 Add the encrypted PSKC files. For this, select Password or Pre-shared key in PSKC file
encryption type and provide the information.
6 Click Upload to import tokens from the file.
NOTE: Advanced Authentication receives an OTP format from the imported tokens file and stores
the information in the enrolled authenticator. Therefore, Advanced Authentication Administrator need
not change the default value of OTP format on the Method Settings Edit tab. For more information on
the OTP format, see OATH OTP.
When the tokens are imported, you can see the list of tokens. You must assign these tokens to the
users. The token is assigned in the following ways:
Comma is a delimiter.
Token001, 15d2fa517d3c6b791bd4cc2044c241429307001f
Token002, 8c557fc050721037fd31e1d3345b5d3263263e0f, totp, 8
Token003, 658208efea5ac49d5331ba781e66f2c808cccc8e, hotp, 6
Token004, 89f0dfe1c90379da6a11aaca2fc1070f606efe36, totp, 6, 60
IMPORTANT: For the YubiKey tokens, you must use the traditional format of the CSV (check
YubiKey Personalization Tool > Settings tab > Logging Settings) with comma as a delimiter. Use
Yubico csv file type (Advanced Authentication Administration portal > Methods > OATH OTP >
OATH Tokens).
With the Search Card portal, you can get a card holder’s contact information by tapping the card on
the card reader. Information such as name of the card holder, repository information, email address,
and mobile number of the user can be obtained.
You must assign chains to the Search card event in the Events section.
IMPORTANT: To use this feature, you must have the Device Service installed on the computer.
To get the user information from the card, perform the following steps:
NOTE: If the card was not enrolled before, a message No user was found for this card is
displayed.
Authentication Servers
You can monitor the performance of Advanced Authentication servers by performing the following:
1 When you are in the configuration console, press ALT+F9 to get access to CPU/Memory usage
data.
2 If you want to see stats ordered by memory usage:
2a Press F6 to open Sort by options.
2b Press the down arrow to switch to MEM%.
2c Press Enter to save.
3 Press ALT+F12 to get information about active connections and IOSTAT.
For more information, see Determining the Number of Web Servers for Load Balancing.
NOTE: This chapter contains solutions for known issues. If you encounter any problems that are not
mentioned here, contact the support service.
Section 16.1, “Error During the Deployment of ISO File and Installation in the Graphic Mode,” on
page 169
Section 16.2, “Partition Disks to Avoid Removal of Data,” on page 169
Section 16.3, “Networking Is Not Configured,” on page 169
Section 16.4, “Error While Coying the DB Master Database,” on page 170
Section 16.5, “The ON/OFF Switch Is Broken If the Screen Resolution Is 110%,” on page 170
Section 16.6, “Error When Requesting For Update,” on page 170
This issue can occur if you click Continue without selecting I agree in End User License Agreement.
As a result I don't agree is automatically selected and Yes is selected on the next screen.
Troubleshooting 169
Select OK and configure networking manually using the Configuration Console. For more
information, see the Configuring Appliance Networking chapter.
The error occurs due to the incorrect reverse DNS and incorrect hostname specified during the
installation:
While installing the DB Master, the pre-populated aucore.your-router DNS hostname was
selected
DB Slave is up and re-registered the aucore host in DHCP/DNS on the router
the pre-populated aucore.your-router DNS hostmane was selected on the DB Slave
The pre-populated DNS names cannot be used during the installation. In such scenarios, you must
specify the IP address. DNS hostnames must be specified on the corporate DNS server.
After rebooting, the following error is displayed and the problem repeats:
Check the networking configuration and HTTP Proxy configuration in the Configuration Console.
Ensure that the DNS servers you have specified are able to resolve the address
repo.authasas.com.
Ensure your company's firewall does not lock Internet connection to the address on the
appliance.