Technical Integration Guide For Entrust® Identityguard 9.3 and Microsoft Forefront Unified Access Gateway (Uag) 2010
Technical Integration Guide For Entrust® Identityguard 9.3 and Microsoft Forefront Unified Access Gateway (Uag) 2010
Technical Integration Guide For Entrust® Identityguard 9.3 and Microsoft Forefront Unified Access Gateway (Uag) 2010
3 and
Microsoft Forefront Unified Access Gateway(UAG) 2010
Integration information
Entrust product: Entrust IdentityGuard 9.3
Partner name: Microsoft
Partner product: Forefront Unified Access Gateway
Product version: 2010 SP1
Check the Platform Support and Integration Center for the latest supported version information at:
https://www.entrust.com/support/psic/index.cfm
Note: The Entrust IdentityGuard server supports additional authentication protocols and authentication methods.
See the Entrust IdentityGuard documentation for more information if you are integrating different VPN devices.
Out-of-band one-time
Two-step authentication only. PAP, MS-CHAPv2
password* (OTP)
Risk Based
IPGeo only PAP, MS-CHAPv2
Authentication
* Can also include a personal verification number (PVN). A PVN is an additional authentication feature that can be
added to other authentication methods. Grid, token, or out-of-band one-time password (OTP) authentication must
be configured.
The Entrust IdentityGuard Radius proxy does not support the creation of new passwords or PVNs. Administrators
must assign users their initial passwords and PVNs. Administrators can use the Entrust IdentityGuard Web interface
to force users to change their PVNs. It is possible for VPN users to change their own PVNs. A new option called
“Separate Challenge for PVN update” has been introduced since 9.1. See Using a PVN with your second-factor
authentication response for more information.
VPN capabilities
The Microsoft Forefront Unified Access Gateway VPN allows for an easy integration of Entrust IdentityGuard
authentication using the RADIUS protocol.
Figure 1: Overview of Entrust IdentityGuard integrated with a VPN and Radius server
Figure 2: Overview of Entrust IdentityGuard integrated with a VPN and first-factor authentication resource
Figure 4 Overview of Entrust IdentityGuard integrated with VPN and Active Directory
Forced migration
With forced migration, you have an existing VPN that provides access to a protected resource and you want to use
the Entrust IdentityGuard Administration interface to migrate all users to Entrust IdentityGuard at a pre-announced
switch-over date.
Advantages
• Easy to implement.
• Effective with a small number of users.
Disadvantages
• Administrators may experience a large number of problems on the switch-over date.
• No user feedback that a pilot would generate.
• Need an external process that maintains users between the existing system and the new Entrust IdentityGuard
system.
3) Once the Trunk settings are displayed, select the Configure button next to Configure trunk settings.
Advanced Trunk Configuration dialog appears
8) Ensure that the Active Directory server entry is first on the list, ahead of the IdentityGuard server entry.
4) Ensure that the name of the IdentityGuard server defined in your Forefront Unified Access Gateway
configuration is the same name used in the line <%if repository_name = "RadiusServer" then%>.
5) Save and close Entrust_Login.asp.
6) In your Authentication window, point your User logon page and On-the-fly user logon page to the modified
file.