Authentication and Directory Servers
•Configuring Local Authentication Server
•Configuring ACE Authentication Server
•Configuring RADIUS Authentication Server
•Configuring Certificate Authentication Server
•Configuring LDAP Authentication Server
•Configuring SAML Authentication Server
•Configuring TOTP Authentication Server
•Configuring MDM Authentication Server
•Configuring Active Directory Authentication Server
Introduction
The access management framework supports the following types of AAA servers: Local, External (standards-based), and External (other).
- Local includes "Local Authentication Server", "Certificate Server".
- External (standards-based) includes "LDAP Server", "RADIUS Server".
- External (other) includes "MDM Server", "RSA ACE Server", "TOTP Server".
AAA Traffic Management
Ivanti Connect Secure Virtual appliances and Appliances allow the administrator to choose the communicating interface or the network for each authentication server.
This feature allows the AAA traffic across physical interfaces, VLAN ports, and virtual ports on physical and VLAN ports.
Configuring AAA Traffic Management Across Interfaces
To configure AAA traffic management across interfaces:
- Select the gateway from the Gateways list, and click Authentication > Authentication Servers.
- Click Enable Auth Traffic Control.
- In the Confirm Traffic Decoupling Enabling prompt, click Enable Traffic Decoupling.
Configuring Authentication Servers
To add an authentication server:
- Log into the nSA as a Tenant Admin.
- From the ICS menu, click Gateways > Gateways List. In the Gateways list page, select the standalone ICS Gateway or Cluster node that you want to configure.
- From the ICS menu, click Authentication > Authentication Servers.
- Click the Add icon and select the Authentication server type from the list.
Configuring Local Authentication Server
You can create multiple local authentication server instances. When you define a new local authentication server, you must give the server a unique name and configure options for passwords.
To create a local authentication server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select Local from the list to display the configuration page.
- Complete the configuration and save changes.
Enter a Server Name.
Select Password Options.
Select the Allow users to change passwords option if you want users to be able to change their passwords.
Select the Force password change after option to specify the number of days after which a password expires. The default is 64 days.
Select the Prompt users to change password option to specify when to prompt the user to change passwords.
Select the Enable account lockout for users option to manage user authentication failures for admin users of local authentication server.
Enter the number of consecutive wrong password attempts after which the admin user account will be locked. The default value is 3 retries.
Enter the time in minutes for which admin user account will remain locked. The default value is 10 minutes.
Configuring ACE Authentication Server
RSA Authentication Manager (formerly known as ACE/Server) is an authentication and authorization server that allows user authentication based on credentials from the RSA SecurID® product from RSA Security Inc.
To configure authentication with the ACE server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select ACE from the list to display the configuration page.
- Complete the configuration and save changes.
Enter a Server Name.
Enter the default port of the authentication server.
Click and browse Import New Config File to upload the sdconf.rec configuration file.
Select the Enable User Record Synchronization option to retain the bookmarks and individual preferences regardless of which system you log in to.
Enter a logical authentication server name.
Configuring RADIUS Authentication Server
To configure authentication with the RADIUS server:
-
Select Authentication > Authentication Servers.
-
Click the Add icon and select RADIUS from the list to display the configuration page.
-
Complete the configuration and save changes.
Settings page
-
Enter a Server Name.
-
Enter the name that identifies the Network Access Server (NAS) client to the RADIUS server.
-
Enter the name or IP address of the RADIUS server.
-
Enter the authentication port value for the RADIUS server. Default port number: 1812, 1645 (legacy servers).
-
Enter the NAS IP address. If you leave this field empty, the internal IP address is passed to RADIUS requests. You can also fill this field with IPv6 address.
-
Enter the interval of time in seconds to wait for a response from the RADIUS server before timing out the connection.
-
Enter the number of times to try to make a connection after the first attempt fails.
-
Select the Users authenticate using tokens or one-time passwords option to prompt the user for a token instead of a password.
-
Click Next.
Backup server & Accounting page (required only if Backup server exists)
-
Enter the secondary RADIUS server.
-
Enter the Authentication Port.
-
Enter the Shared Secret.
-
Enter the Accounting Port.
-
Enter the user information to the RADIUS accounting server.
-
Enter Interim Update Interval in minutes to achieve more precise billing for long-lived session clients and during network failure.
-
Select the Use VPN Tunnel assigned IP Address for FRAMED-IP-ADDRESS/FRAMED-IPV6-ADDRESS attribute value in RADIUS Accounting option to use the VPN Tunneling IP address for the FRAMED-IP-ADDRESS/FRAMED-IPV6-ADDRESS attribute instead of the pre-authenticated (original) IP address. Framed IPv6 addresses based attribute fetching and parsing:
- NAS-IPv6-Address
- Login-IPv6-Host
-
Enable the Send Interim Updates for sub sessions created inside parent sessions check box to send interim updates for sub sessions (child sessions) created inside parent sessions.
-
Click Next.
Rules page
-
Select the Enable processing of Radius Disconnect Requests check box. The Radius Disconnect requests received from the backend Radius server will terminate sessions that match the attributes in the request.
-
Select the Enable User Record Synchronization option to retain the bookmarks and individual preferences regardless of which system you log in to.
-
Enter a logical authentication server name.
-
Configuring Certificate Authentication Server
The certificate server is a local server that allows user authentication based on the digital certificate presented by the user without any other user credentials.
To configure authentication with the Certificate server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select Certificate from the list to display the configuration page.
- Complete the configuration and save changes.
Enter a Server Name.
Enter a username template. Specify how the system should construct a username. You may use any combination of certificate variables contained in angle brackets and plain text.
Select the Enable User Record Synchronization option to retain the bookmarks and individual preferences regardless of which system you log in to.
Enter a logical authentication server name.
From the drop-down list, select the Secondary Authentication server. From 22.6R1 version, ZTA supports SAML Authentication server as a Secondary Authentication server.
Configuring LDAP Authentication Server
Lightweight Directory Access Protocol (LDAP) facilitates the access of online directory services. LDAP directory consists of a collection of attributes with a name, known as a distinguished name (DN). Each of the entry's attributes, known as a relative distinguished name (RDN), has a type and one or more values. The types are typically mnemonic strings, such as CN for common name. The valid values for each field depend on the types.
To configure authentication with the LDAP server:
-
Select Authentication > Authentication Servers.
-
Click the Add icon and select LDAP from the list to display the configuration page.
-
Complete the configuration and save changes.
Settings page
-
Enter a Server Name.
-
Select the Enable Domain Name option if you want to fetch a list of servers from the DNS server. Clear this option if you want to manually enter all the domain controllers host names.
-
Enter the LDAP server name or the IP address.
-
(Optional) Enter the parameters for backup LDAP server1. Default port number: 389
-
Enter the parameters for backup LDAP port1.
-
(Optional) Specify the parameters for backup LDAP server2.
-
Enter the parameters for backup LDAP port2.
-
Select the backend LDAP server type from the following choices: Generic, Active Directory, iPlanet, Novell eDirectory.
-
Select one of the following options for the connection to the LDAP server:
- Unencrypted - The device sends the username and password to the LDAP Directory Service in cleartext.
- LDAPS - The device encrypts the data in the LDAP authentication session using the Secure Socket Layer (SSL) protocol before sending it to the LDAP Directory Service.
- Start TLS - The device allows both secure and plain requests against an LDAP server on a single connection.
-
Enter the time (in seconds) to wait for connection to the primary LDAP server, and then to each backup LDAP server. Default: 15 seconds
-
Enter the time (in seconds) to wait for search results from a connected LDAP server.
-
Click Next.
Authentication & Users page
-
Select the Authentication required to search LDAP option to require authentication when performing search or password management operations.
-
Enter the administrator DN for queries to the LDAP directory.
-
Enter the password for the LDAP server.
-
Enter the backup administrator DN for queries to the LDAP directory, as a fallback when primary Admin DN fails (due to account expiration).
-
Enter the backup administrator password for the LDAP server.
-
Under Finding user entries:
- Enter the base DN under which the users are located. For example, dc=sales,dc=acme, dc=com.
- Enter a unique variable that can be used to do a fine search in the tree. For example, samAccountname=<username> or cn=<username>.
- Select the Strip domain from Windows username option to pass the username without the domain name to the LDAP server.
-
Click Next.
-
Membership & Sync page
Enter the base DN to search for user groups.
Enter a unique variable which can be used to do a fine search in the tree. For example, samAccountname=<username> or cn=<GROUPNAME>.
Enter all the members of a static group. For example, member or uniquemember (iPlanet specific Deprecated for 21.x).
Select the Reverse group search option to start the search from the member instead of the group. This option is available only for Active Directory server types.
Enter an LDAP query that returns the members of a dynamic group. For example, memberURL.
Enter how many levels within a group to search for the user. The higher the number, the longer the query time, so we recommend that you specify to perform the search no more than two levels deep.
Select one of the following options: Nested groups in Server Catalog, Search all nested groups.
Configuring SAML Authentication Server
SAML is an XML-based framework for communicating user authentication, entitlement, and attribute information. The standard defines the XML-based assertions, protocols, bindings, and profiles used in communication between SAML entities. SAML is used primarily to implement Web browser single sign-on (SSO). SAML enables businesses to leverage an identity-based security system like Ivanti Connect Secure to enforce secure access to web sites and other resources without prompting the user with more than one authentication challenge.
For complete details on the SAML standard, see the OASIS web site:
To configure authentication with the SAML server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select SAML from the list to display the configuration page.
- Complete the configuration and save changes.
Settings
Enter a name to identify the server instance.
Select SAML version used by the SAML IdP.
Select to override the Host FQDN for the SAML server. Host FQDN is used to update the Unique SAML Identifier and ACS URL of the SAML Authentication Server.
Select Manual or Metadata for Configuration Mode. If a metadata file or location is available from the SAML identity provider, use the metadata option to make configuration simpler and less prone to error.
Enter Identity Provider Entity ID. The identity provider entity ID is sent as the Issuer value in the assertion generated by the SAML identity provider.
Enter Identity Provider Single Sign On Service URL. The identity provider SSO service URL is a URL provisioned by the SAML identity provider. The setting is required to support service-provider-initiated SSO.
Specify User Name Template to derive the username from the assertion.
Specify the maximum allowed difference in time between the system clock and the SAML identity provider server clock.
Select Support Single Logout. Single logout is a mechanism provided by SAML for logging out a particular user from all the sessions created by the identity provider. Select this option if the system must receive and send a single logout request for the peer SAML identity provider.
Click Save Changes. The SAML Authentication Server gets listed in the Authentication Servers page.
SSO
Select the SSO tab.
Select Artifact to use the Artifact binding. The system then contacts the Artifact Resolution Service (ARS) to fetch the assertion using SOAP protocol. If the ARS is hosted on a HTTPS URL, then the certificate presented by the ARS is verified by the system.
Select POST to use the POST binding, the system uses a response signing certificate to verify the signature in the incoming response or assertion. The certificate file must be in PEM or DER format. The certificate you select should be the same certificate used by the identity provider to sign SAML responses.
Use the Add and Remove buttons to select authentication context classes to be sent in the authentication requests to the SAML identity provider. These are included in the RequestedAuthnContext element.
Click Save Changes.
Metadata Settings
Select the Metadata tab.
Enter the number of days the metadata is valid. Valid values are 0 to 9999. 0 specifies the metadata does not expire.
Select Do Not Publish SA Metadata if you do not want to publish the metadata at the location specified by the Entity ID field.
Select Download Metadata. This button appears only after you have saved the authentication server configuration. Use this button to download the metadata of the current SAML service provider.
Click Save Changes.
Configuring TOTP Authentication Server
Time-based One-Time Password (TOTP) algorithm as defined in RFC6238 is an authentication mechanism where a one-time password (a.k.a token) is generated by the authentication server and client from a shared secret key and the current time. ICS can act as TOTP authentication server. Any third-party TOTP applications (for example, Windows Authenticator or Google Authenticator) available on the mobile and desktop client platforms generate TOTP tokens.
To configure the TOTP server as Local:
- Select Authentication > Authentication Servers.
- Click the Add icon and select TOTP from the list to display the configuration page.
- Complete the configuration and save changes.
TOTP Auth Server Settings - Local
Select Local as Server Type. TOTP context is created locally and user database is maintained locally on the same device.
Time Skew - Specify maximum time difference between Ivanti Connect Secure and end user device while authenticating a user's token. (minimum: 1 minute, maximum: 5 minutes).
Number of attempts allowed - Specify maximum number of consecutive wrong attempts allowed after which account will be locked (minimum: 1 attempt, maximum: 5 attempts).
Custom message for registration page - Specify a custom message which can be shown on new TOTP user registration web-page.
Allow Auto Unlock - When checked, locked account will be automatically unlocked after specified period. (minimum: 10 minutes, maximum: 90 days).
Allow new TOTP user registration to happen via external port - When unchecked (default), new TOTP user registrations will happen only via internal port.
Accept TOTP authentication from remote ICS devices - When checked, REST access to this TOTP server is allowed from other Ivanti Connect Secure devices.
Display QR code during user registration - When checked, displays QR code during user registration.
Disable generation of backup codes - When unchecked, generates backup codes.
TOTP Auth Server Settings - Remote
- Select Remote as Server Type. In this configuration, authentication checks take place on the remote TOTP server.
- If the Allow new TOTP user registration to happen via external port option is not selected, new TOTP user registrations happen only via company intranet network.
- Enter remote host name or IP address where the TOTP server is configured. The IP address or host name must match the common name mentioned in the remote TOTP server certificate.
- Enter TOTP Server Name configured on the Remote TOTP server.
- Enter the REST API login name.
- Enter the REST API password.
- Enter the realm name, which refers to the realm that should be used for authenticating the REST user (using the auth. server mapped to the Realm).
- Use the Test Connection button to validate the connection to the remote TOTP server.
Exporting/Importing TOTP Users
To export/import TOTP users:
1.Select Authentication > Authentication Servers.
2.Click the link for the authentication server you want to manage.
3.Click the Users tab to display the user accounts table. The user accounts table includes entries for the accounts that have been created.
4.Use the Export and Import buttons located at the bottom of the user accounts table to export and import TOTP users data.
5.(Optional)To enhance the security of the TOTP users' data, Ivanti recommends to encrypt the data with a password. This password should adhere to Ivanti Password policy. To import the user data, enter the password if file is password protected.
Configuring MDM Authentication Server
The access management framework MDM authentication server configuration includes details on how the system communicates with the MDM Web RESTful API service and how it derives the device identifier from the certificates presented by endpoints.
To configure authentication with the MDM server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select MDM from the list to display the configuration page.
- Complete the configuration and save changes.
- Type - Select one of the following options: VMWare Workspace One (formerly AirWatch), Ivanti (formerly MobileIron), Microsoft Intune
Applicable to VMWare Workspace One and Ivanti
- Enter the URL for the MDM server. This is the URL the MDM has instructed you to use to access its RESTful Web API (also called a RESTful Web service).
- Enter the URL for the MDM report viewer. This URL is used for links from the Active Users page to the MDM report viewer.
- Enter a timeout period (5-60 seconds) for queries to the MDM server. The default is 15 seconds.
- Enter the username and password for an account that has privileges to access the MDM RESTful Web API.
- (AirWatch only) Copy and paste the AirWatch API tenant code.
Applicable to Microsoft Intune
- Enter Azure AD Tenant ID.
- Enter Web application ID that has been registered in Azure AD.
- Enter Secret key of the web application registered in azure AD.
- Enter a timeout period (5-60 seconds) for queries to the MDM server. The default is 15 seconds.
Device Identifier
- Construct a template to derive the device identifier from the certificate attributes. The template can contain textual characters as well as variables for substitution.
- Select the device identifier type that matches the selection in the MDM SCEP certificate configuration:
UUID - The device Universal Unique Identifier. This is the key device identifier supported by MobileIron MDM.
Serial Number - The device serial number.
UDID - The device Unique Device Identifier. This is the key device identifier supported by AirWatch MDM.
Device ID - The device unique identifier.
Configuring Active Directory Authentication Server
Active Directory is a directory service used in Windows domain networks. It is included in most Windows server operating systems. Enterprise servers that run Active Directory are called domain controllers. An Active Directory domain controller authenticates and authorizes users and computers in a Windows domain network.
When you use Active Directory as the authentication and authorization service for your Ivanti access management framework, users can sign in to Ivanti Connect Secure using the same username and password they use to access their Windows desktops. You can also use Active Directory group information in role mapping rules.
To configure authentication with the MDM server:
- Select Authentication > Authentication Servers.
- Click the Add icon and select Active Directory from the list to display the configuration page.
- Complete the configuration and save changes.
Specify a name to identify the server within the system.
Specify the NetBIOS domain name for the Active Directory domain.
Specify the FQDN of the Active Directory domain.
Specify a username that has permission to join computers to the Active Directory domain.
Specify the password for the special user.
Select Save Credentials. If this setting is not enabled, the credentials entered will be destroyed after successfully joining the domain.
Specify the machine account name. The default computer name is derived from the license hardware in the following format: 0161MT2L00K2C0. We recommend the Computer Name string contain no more than 14 characters to avoid potential issues with the AD/NT server. Do not include the '$' character.
Specify the protocol to use during authentication. The system attempts authentication using the protocols you have enabled in the order shown on the configuration page. For example, if you have selected the check boxes for Kerberos and NTLMv2, the system sends the credentials to Kerberos. If Kerberos succeeds, the system does not send the credentials to NTLMv2. If Kerberos is not supported or fails, the system uses NTLMv2 as the next protocol in order.
Contact trusted domains. Select this option to contact domain controllers of trusted domains directly without proxying authentication requests and group membership checks through the domain controller.
Enter the maximum number of simultaneous domain connections (1 to 10).
Enable periodic password change of machine account. Select this option to change the domain machine account password for this configuration.
Click Save Changes.