Solved

F5 VPN Gateway Radisu Authentication with Safenet Authentication Manager OTP

Posted on 2014-10-19
2
780 Views
Last Modified: 2014-10-21
Our company use F5 BIG-IP APM (Access Policy Manager) VPN Gateway to authenticate remote access user. It is now an requirement to implement OTP (One Time Password) as an authentication method for the VPN client. We already have an Microsoft Active Directory in place and also installed the Safenet Authentication Manager Service to use OTP Hardware token.   According to the F5 BIG-IP VPN Technical document, it can use OTP authentication by pointing to a RADIUS Server instead of to the MS Active Directory.

My question shall we install the Network Policy Service (provided by Microsoft) as a RADIUS service or use the Safenet OTP Plug-in ?

Also, what is the high level step-by-step procedure for setting up such implementation ?

Appreciate you kind advice in advance.

Patrick
0
Comment
Question by:patricktam
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40391860
Maybe you can check out Safenet integration with F5 (guide - "Using SAS as an IDP of F5 BIG-IP APM Integration Guide"), it has the step through screenshot to configure APM. F5 APM must support Challenge/Response mode for Radius authentication.  Ensure that the RADIUS server is configured to recognize the APM as a client. Use the same shared secret in both the RADIUS server configuration and in the Access Policy Manager configuration.

the APM should be having the flow of
client (browser) >APM logon page(using otp as password) > Safenet Radius auth  >APM Resource assignment (based on Safenet auth check resp)

http://www.safenet-inc.com/resources/integration-guide/data-protection/Safenet_Authentication_Service/SafeNet_Authentication_Service__Using_SAS_as_an_IDP_of_F5_BIG-IP_APM_Integration_Guide/
(PDF file name - 007-012607-001_SAM_IntegrationGuide_F5-BIG-IP-APM_RADIUS_RevA.pdf)

Specifically for the OTP, catch the "Configuring the SAM Connector for OTP Authentication"
- inside the Safenet AAA server, in the "Token Policy Object Editor",  Connector for OTP Authentication should be enabled
- also under the "Connector for OTP Authentication", set the parameters (e.g. Authentication Code, etc) for the OTP Authentication connector.
0
 

Author Closing Comment

by:patricktam
ID: 40395873
Thank you for your explanation and will give it a try.
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now