Skip to main content

System Info Tab Configuration

Introduction

Use this guide to configure the System Info tab in the Web Admin for each SecureAuth IdP realm.

This includes cloud services, certificate authorities, and proxy integrations.

NOTE: This tab is mostly for reference and requires no configuration unless a proxy integration is required, SCEP is being used, or if there are specific preferences.

Prerequisites

1. On SecureAuth v9.1 or later, create a New Realm for the target resource for which the configuration settings will apply, or open an existing realm for which configurations have already been started

2. Configure the Overview, Data, Workflow, Multi-Factor Methods, Post Authentication, and Logs tabs on the Web Admin before configuring the System Info tab

3. Ensure the implementation of each of these items:

a) For Proxy Integrations
  • An established Proxy Server is up and running

b) For SCEP
  • The Issuing CA (Certificate Authority) is running on Windows 2008 Enterprise edition to enable SCEP / NDES functionality

  • The Certification Authority's (root and intermediates) certificate distribution point is available to all clients (internal and / or external) to allow access to the AIA and CDP files (CRT and CRL files)

  • The SCEP / NDES (Network Device Enrollment Service) service is already pre-installed and functional

  • The SCEP / NDES Listener URL is obtained

SecureAuth IdP Web Admin Configuration Steps - System Info Tab

Step A: Review / Configure System Info and Plugin Info

44833166.png

1. In the System Info section, the SecureAuth Version number is provided for reference

In SecureAuth IdP version 9.1, the License Expires date is also provided for reference – this information does not appear in SecureAuth IdP version 9.2

2. If necessary, click Decrypt to decrypt the web.config file so that the web.config file can be viewed in its entirety

Plugin Info

3. Plugin information is provided for reference, and no configuration is required unless a specific version is required (not typical)

44833174.png
44833175.png

Step B: Complete WSE 3.0 / WCF Configuration

47241140.png

4. Select True from the following dropdowns if SecureAuth IdP is to use message-level security (WSE 3.0 / WCF) to make a web service call to issue a certificate (default), and keep the default URL settings:

  • Certificate Use WSE 3.0

  • Telephony Use WSE 3.0

  • SMS Use WSE 3.0

  • Push Use WSE 3.0

  • Geo-Location Use WSE 3.0

  • SecureAuth Threat Service Use WSE 3.0

5. Select False from the Trx Use WSE 3.0 dropdown if SecureAuth IdP will not use the message encryption endpoint to make a web service call to issue a certificate (default) – i.e. if transport encryption via TLS will be used instead of WSE 3.0

Or select True if SecureAuth IdP will use the WSE 3.0 message encryption endpoint to make a web service call to issue a certificate, and modify the URL to end in /msg

6. Click Test to ensure the connection is working properly

Tip

The following URLs in this section can be configured and updated as necessary, if using the specified feature(s) on this realm:

URL

SecureAuth IdP Feature

Link-to-Accept URL

SecureAuth Link-to-Accept Multi-Factor Authentication Method

Phone Fraud Service URL

Phone Number Profiling Service

Geo-Location URL

Adaptive Authentication

SecureAuth Threat Service URL

Adaptive Authentication

However, if a proxy server will be used with SecureAuth IdP, click the Proxy Integration Configuration link directly below and follow steps in that section

Step C: Complete SCEP Configuration

47241149.png

7. Select False from the Use SCEP dropdown and keep the default values unless SCEP is in use

If using SCEP, click the SCEP Configuration link directly below and follow steps in that section

Step D: Complete Proxy Server Configuration

47241167.png

8. Select False from the Use Proxy Server dropdown and keep the default values

However, if a proxy server will be used with SecureAuth IdP, click the Proxy Integration Configuration link directly below and follow steps in that section

Step E: Complete IP Configuration

47241160.png

Note

If a proxy server will be used with SecureAuth IdP, follow the steps in the Proxy Integration Configuration section below

9. Provide the Public IP Address if NAT is used to alter the SecureAuth IdP IP Address to a Public IP Address

10. Provide the Proxy IP List of addresses that are used between user devices and SecureAuth IdP (proxy, load balancer, gateway, etc.) – separating entries in this list by commas

11. Leave the IP Http Header Field Name as default unless a different Field Name is required

Step F: Review / Configure Remaining Sections

License Info

47241148.png

12. No configuration is required in the License Info section, and the Cert Serial Nbr is typically the same as the Client Cert Serial Nbr in the WSE 3.0 / WCF Configuration section

Certificate Properties

47241154.png

13. Select Default from the SAN, DC 1, and DC 2 dropdowns to use the default certificate settings

Select Custom to customize a SAN, DC 1, or DC 2 property in a certificate

Select the Field(s) from the Custom SAN / DC 1 / DC 2 dropdown and click Add to customize the property

14. Select No DC 3 from the DC 3 dropdown to eliminate the DC 3 property from the certificate; select Hard drive serial number hash to include the DC 3 property as the hard drive serial number hash

15. Select the hashing algorithm to be used for certificate signing requests from the Certificate Key Identifier dropdown

Advanced Configuration

47241155.png

16. Select True from the Force Frame Break Out to enable SecureAuth IdP pages to break out of iFrame web pages

User Input Restriction

47241161.png

Note

NOTE: This section applies only to SQL, ODBC, and Oracle data stores

17. Set the Max Length for User ID (number of characters)

18. Set the Max Length for Password (number of characters)

19. Set the Max Length for OTP (number of digits)

20. Set the Max Length for KBA (number of characters)

Note

If no limit, set to 0 (default)

21. Create a list of Disallowed Keywords, comma separated

Warning

Click Save once the configuration is complete and before leaving the System Info page to avoid losing changes

Links

44833178.png

22. Click Click to view Web Config Backups to view backups and see modifications that have been made

Configuration Back Up Files
47241162.png

22a. View configuration changes and open backup files

22b. Use the back arrow on the browser to return to the Links section

23. Click Click to edit Web Config file to view the entire web.config code file to review and make modifications

Web Config Editor
44833179.png

23a. View the web.config file and make any code modifications here

If a proxy server will be used with SecureAuth IdP, click the Proxy Integration Configuration link directly below and follow steps in that section

Warning

Click Save once the configurations have been completed and before leaving the Web Config File page to avoid losing changes