Introduction
SecureAuth IdP RADIUS server lets you configure two-factor authentication login access to a VPN and remote resources via RADIUS. This optional component of the SecureAuth IdP product is typically installed on a stand-alone server or on a SecureAuth IdP appliance.
Using the RADIUS feature, enterprises can provide strong, adaptive authentication for RADIUS clients such as VPNs and other applications that leverage RADIUS for two-factor authentication used in conjunction with SecureAuth IdP.
This document is organized into four parts:
- Topics in this guide include:
- Installation – see Installation guide - v2.4 - SecureAuth IdP RADIUS server
- Configuration – see Configuration guide - v2.4 - SecureAuth IdP RADIUS server
- End-user experience – see End-user experience - v2.4 - SecureAuth IdP RADIUS server
What's new in SecureAuth IdP RADIUS server v2.4
Authentication workflow names standardized for consistency with IdP naming conventions
Text hints now appear on the IdP Realm page
- One or more backup IdP hosts can now be specified for failover functionality
- IdP Realms and RADIUS Clients can be enabled / disabled
RADIUS clients page lets you toggle between entering a NAS-IP or client IP address
Static values can now be entered in Global Aux ID fields and mapped to RADIUS attributes
Wild cards now supported when defining RADIUS client IP values
New workflows added for entering Username, Second Factor, and Password on a single page; PIN + TOTP entries; OTP as first entry followed by Password as a challenge
TLS 1.2 support added for NetMotion Mobility clients
- MS-CHAPv2 support added for Microsoft Remote Desktop Gateway and Cisco ASA
- Additional logging is now available for Adaptive Authentication steps
Previous SecureAuth IdP RADIUS server release
See SecureAuth IdP RADIUS Server v2.3.9+ Integration Guide for information about the previous product release.
Prerequisites
- SecureAuth IdP version 9.1 or later.
- Authentication API (v9.1+) configured and enabled on the realm.
Supported SecureAuth IdP components and integrated components
SecureAuth IdP features | SecureAuth IdP version | Configuration notes | ||||||||||||||||
Adaptive Authentication | Configure threat checking for:
| |||||||||||||||||
Push-to-Accept | ||||||||||||||||||
Attribute Mapping | Configure and enable Identity Management API (v9.1+) on the realm to grant / deny end-user logon access. Group based authentication – Optionally configure Membership Connection Settings to grant / deny logon access:
| |||||||||||||||||
UPN Logon | ||||||||||||||||||
Multi-Factor Authentication methods | SecureAuth IdP version | SecureAuth IdP v9.x supported server and required components | ||||||||||||||||
Time-based One-Time Passcode (TOTP) | v9.1+ | NetMotion Wireless VPN:
NOTE: Refer to the NetMotion Mobility RADIUS configuration guide. | ||||||||||||||||
SMS (OTP only) | v9.1+ | |||||||||||||||||
Phone | v9.1+ | |||||||||||||||||
Email (OTP only) | v9.1+ | |||||||||||||||||
Passcode OTP (Push Notification) | v9.1+ | |||||||||||||||||
Mobile Login Request | v9.1+ | |||||||||||||||||
PIN | v9.1+ | |||||||||||||||||
Supported platforms | ||||||||||||||||||
Server:
| Protocols:
| SecureAuth IdP Adaptive Authentication IP Checking feature:
| ||||||||||||||||
Port settings | ||||||||||||||||||
Inbound:
| ||||||||||||||||||
RADIUS VPN and product support | ||||||||||||||||||
Supported RADIUS clients:
| Other compatible RADIUS clients include:
Contact SecureAuth Professional Services with inquiries. | To configure a Palo Alto Networks GlobalProtect VPN to send the client IP to SecureAuth IdP RADIUS server:
| ||||||||||||||||
RADIUS client configuration | ||||||||||||||||||
Though not all RADIUS clients are configured in the same manner, basic connectivity parameters must be configured on RADIUS clients to be used with SecureAuth IdP; these include:
NOTE: A valid certificate must be installed if using NetMotion Wireless VPN. Sample RADIUS authentication server configuration:
| ||||||||||||||||||
SecureAuth IdP RADIUS server v2.4 installation | ||||||||||||||||||
Upgrade If SecureAuth RADIUS v1.0.x is currently installed, review the upgrade instructions in the Installation guide before installing the newer version of RADIUS. If SecureAuth IdP RADIUS server v2.0.x - v2.2.x is currently installed, use the install instructions in this guide to upgrade while retaining the current configuration settings. New installation If installing SecureAuth IdP RADIUS server v2.3.9 / v2.3.12 for the first time on the designated appliance, follow the install instructions in the installation guide. SecureAuth IdP RADIUS logs for troubleshooting See SecureAuth IdP RADIUS server logs for information on using the RADIUS logs for troubleshooting. |
Adaptive Authentication
If Adaptive Authentication is used with the user group check feature enabled, RADIUS responds accordingly in these login failure scenarios based on the authentication workflow.
Note that the following workflows do not correlate exactly to the workflows in SecureAuth IdP. Some of the following workflows are not included in SecureAuth IdP "Login Screen Options" and vice versa. For example, RADIUS does not have an option for "Username only" (while SecureAuth IdP does) and SecureAuth IdP does not have an option for "PIN + OTP" (while RADIUS does).
- Workflow 1 = Password | Timed Passcode or Second Factor
- Workflow 2 = Password & Mobile Login Request (Approve / Deny)
- Workflow 3 = Password Only
- Workflow 4 = Timed Passcode Only
- Workflow 5 = Timed Passcode / Password
- Workflow 6 = Password | Timed Passcode
- Workflow 7 = Timed Passcode | Password
- Workflow 8 = Username | Second Factor
- Workflow 9 = Username | Second Factor | Password
- Workflow 10 = PIN + TOTP
- Workflow 11 = Password & Timed Passcode
Login failure scenario | End-user experience from RADIUS | End-user experience from RADIUS |
---|---|---|
Hard stop; refuse authentication request | Login failed message received | Login failed message received |
Step up, require two-factor authentication | Prompt received for second authentication factor | Login request fulfilled |
Step down, skip two-factor authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
Resume authentication workflow | Prompt received for second authentication factor | Login request fulfilled |
Skip to post-authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
Redirect to realm or URL | Login failed message delivered | Login failed message received |
No failure | Prompt received for second authentication factor | Login request fulfilled |
SecureAuth IdP RADIUS server logs
Enable logs
Set up logs for the SecureAuth IdP RADIUS server by completing the following:
- Download the following log configuration file, and place it in a temporary folder on the SecureAuth RADIUS server.
- Rename C:\idpRADIUS\bin\conf\log4j2.xml so you can use it to disable logging when you finish debugging.
The paths you use might be different, depending on your RADIUS server version or the destination folder selected when you installed the RADIUS server. The following are examples of default paths:- C:\idpRADIUS\bin\conf\log4j2.xml
- C:\Program Files (x86)\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- C:\Program Files\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- Place the downloaded log4j2.xml file in the *\bin\conf folder, which is the same folder used in step 2.
- Run the services.msc application, then restart the SecureAuth RADIUS service.
- Replicate the issue you have encountered.
- Find log files stored in *\bin\Logs\saRadiusServer.log.
- Receive assistance with resolving the issue by forwarding log files to the SecureAuth Support team when you create a support ticket.
- Restore the original log4j2.xml after debugging is completed.
Trace level logging uses a substantial amount of disk space and can create disk space issues over time.
Sample logs for different RADIUS failover scenarios
Failover to a SecureAuth IdP RADIUS backup server is configured under Step B: IdP Realms configuration, Add IdP Realm – see Configuration guide - v2.4 - SecureAuth IdP RADIUS server.
Release notes
Release date: October 30, 2018
Version: 2.4
Compatibility: SecureAuth IdP versions 8.2 - 9.3
ID | New features and enhancements |
---|---|
--- | IdP Realms and RADIUS Clients can now be disabled / enabled |
RAD-13 | Standardized authentication workflow names for consistency with IdP naming conventions |
RAD-44 | Additional logging is now available for Adaptive Authentication steps |
RAD-58 | Text hints now appear on the IdP Realm page |
RAD-91 | Toggle now available on RADIUS clients page to enter either a NAS-IP or client IP address |
RAD-107 | Single page workflow added for Username, Second Factor, Password |
RAD-110 | Wild cards now supported when defining RADIUS client IP values |
RAD-143 | One or more backup IdP hosts can now be specified for failover functionality |
RAD-147 | PIN + TOTP end-user workflow added |
RAD-172 | New workflow added for entering OTP as first option, and Password as challenge |
RAD-209 | MS-CHAPv2 support added for Microsoft Remote Desktop Gateway and Cisco ASA |
RAD-211 | NetMotion integration supported |
RAD-228 | TLS 1.2 support added for NetMotion VPN with Mobility clients on version 11.02+ |
RAD-234 | Custom API header now accommodates millisecond-precision dates |
ID | Bug fixes |
RAD-215 | Custom API header with millisecond-precision dates now works with SecureAuth IdP version 9.2 |
ID | Known issues |
RAD-485 | Invalid characters in user IDs sent to the RADIUS server cause a RADIUS server failure. Workaround: Ensure that user IDs contain the following valid characters only:
|
Next step...
Install SecureAuth IdP RADIUS server v2.4