Documentation

 

 

Introduction

SecureAuth IdP RADIUS server lets you configure two-factor authentication login access to a VPN and remote resources via RADIUS. This optional component of the SecureAuth IdP product is typically installed on a stand-alone server or on a SecureAuth IdP appliance.

Using the RADIUS feature, enterprises can provide strong, adaptive authentication for RADIUS clients such as VPNs and other applications that leverage RADIUS for two-factor authentication used in conjunction with SecureAuth IdP.

This document is organized into four parts:

  1. Topics in this guide include:
  2. Installation – see Installation guide - v2.4 - SecureAuth IdP RADIUS server
  3. Configuration – see Configuration guide - v2.4 - SecureAuth IdP RADIUS server
  4. End-user experience – see End-user experience - v2.4 - SecureAuth IdP RADIUS server

 


What's new in SecureAuth IdP RADIUS server v2.4 

  • Authentication workflow names standardized for consistency with IdP naming conventions

  • Text hints now appear on the IdP Realm page

  • One or more backup IdP hosts can now be specified for failover functionality
  • IdP Realms and RADIUS Clients can be enabled / disabled
  • RADIUS clients page lets you toggle between entering a NAS-IP or client IP address

  • Static values can now be entered in Global Aux ID fields and mapped to RADIUS attributes

  • Wild cards now supported when defining RADIUS client IP values

  • New workflows added for entering Username, Second Factor, and Password on a single page; PIN + TOTP entries; OTP as first entry followed by Password as a challenge

  • TLS 1.2 support added for NetMotion Mobility clients

  • MS-CHAPv2 support added for Microsoft Remote Desktop Gateway and Cisco ASA
  • Additional logging is now available for Adaptive Authentication steps

Previous SecureAuth IdP RADIUS server release

See SecureAuth IdP RADIUS Server v2.3.9+ Integration Guide for information about the previous product release.

 


Prerequisites 

  • SecureAuth IdP version 8.2 or later.
  • Authentication API (v9.1+v9.0v8.2) configured and enabled on the realm.

Supported SecureAuth IdP components and integrated components

SecureAuth IdP featuresSecureAuth IdP versionConfiguration notes
Adaptive Authentication

v9.1+, v9.0.x, v9.0.0, v8.2

Configure threat checking for:

  • User Groups – See Adaptive Authentication for RADIUS responses with user group checking enabled.
  • End-user Client IPs – Cisco, NetScaler, and Palo Alto Networks platforms only.
Push-to-Accept

v9.1+, v9.0.x, v8.2

 
Attribute Mapping

v9.1+, v9.0.x

Configure and enable Identity Management API (v9.1+ / v9.0.x) on the realm to grant / deny end-user logon access.

Group based authentication – Optionally configure Membership Connection Settings to grant / deny logon access:

  • Specify the name of the user group to be granted / denied access, or
  • Designate a Property from Profile Fields to identify the user group to be granted / denied access.
UPN Logon

v9.1+, v9.0.x

 

Multi-Factor Authentication methods

SecureAuth IdP versionSecureAuth IdP v9.x supported server and required components
Time-based One-Time Passcode (TOTP)v9.1+, v9.0, v8.2

NetMotion Wireless VPN:

  • PEAP protocol support requirements:
    • Public or private certificate
    • .PFX file
    • Private Key and Private Key Password
  • Microsoft Visual C++ requirements:
    • Redistributable for Visual Studio 2012 Update 4 installed on the Windows server on which SecureAuth IdP RADIUS server is deployed

NOTE: SecureAuth employees, refer to NetMotion Mobility RADIUS Configuration Guide.

SMSv9.1+, v9.0, v8.2
Phonev9.1+, v9.0, v8.2
Emailv9.1+, v9.0, v8.2
Passcode OTP (Push Notification)v9.1+, v9.0, v8.2
Mobile Login Requestv9.1+, v9.0, v8.2
PINv9.1+, v9.0, v8.2

Supported platforms

Server:

  • Windows Server 2008 R2
  • Windows Server 2012 R2

Protocols:

  • PAP
  • PEAP (NetMotion only)

SecureAuth IdP Adaptive Authentication IP Checking feature:

PlatformRADIUS end user IP

Cisco Systems

Calling-Station-Id

Citrix NetScaler

Calling-Station-Id

Juniper Networks

Tunnel-Client-Endpoint

Palo Alto Networks

PaloAlto-Client-Source-IP

Port settings  

Inbound:

  • Allow RADIUS Listener – Default is UDP port 1812.
  • Block TCP port 8088 – This port is used for the administrative web interface and should be blocked for security reasons.

RADIUS VPN and product support

Supported RADIUS clients:

  • Checkpoint
  • Cisco ASA with AnyConnect and Web Client
  • Cisco IPSec
  • Citrix NetScaler with Web Client
  • F5
  • Fortigate
  • Juniper VPN (IVE, MAG) Pulse Secure thick client
  • NetMotion Wireless VPN
  • Palo Alto Networks
  • SonicWall
  • VMware Horizon HTML Access
  • VMware Horizon View
  • WatchGuard

Other compatible RADIUS clients include:

  • Avocent
  • Barracuda
  • Microsoft Forefront

Contact SecureAuth Professional Services with inquiries.

 

 

To configure a Palo Alto Networks GlobalProtect VPN to send the client IP to SecureAuth IdP RADIUS server:

  • See Palo Alto Networks GlobalProtect VPN Configuration Guide (RADIUS) (v9.1+v9.0.x, and v8.2).
RADIUS client configuration  

Though not all RADIUS clients are configured in the same manner, basic connectivity parameters must be configured on RADIUS clients to be used with SecureAuth IdP; these include:

  • RADIUS server IP address.
  • Shared secret to use between the RADIUS server and RADIUS client(s).
  • Port 1812 to use for RADIUS authentication requests, and Port "0" for accounting when applicable or if used as the default port.
  • Timeout value Retries value.
  • Connection profile that will use the SecureAuth RADIUS authentication serverGroup policy of the connection profile to identify resources end-users can access once logged on the network.

NOTE: A valid certificate must be installed if using NetMotion Wireless VPN.

Sample RADIUS authentication server configuration:

Add Server dialogSecureAuth IdP RADIUS Server informationConfiguration notes
NameRADIUS Server description name (friendly name)

This configuration enables the administrator to control static IP assignment of the VPN client via SecureAuth IdP and the RADIUS server.

NOTE: SecureAuth IdP RADIUS server v2.4 can be configured to pass an IP address to the VPN for static IP assignment to the VPN client (for example: PC or Mac).

See SecureAuth IdP RADIUS Server Static IP Address Configuration Guide for step-by-step instructions. 

RADIUS ServerIP Address or Name of the RADIUS Server
Authentication Port1812
Shared SecretSecureAuth RADIUS Shared Secret
Accounting Port1813
Timeout60 Seconds (recommended)
Retries3 (recommended)

SecureAuth IdP RADIUS server v2.4 installation   

Upgrade

If SecureAuth RADIUS v1.0.x is currently installed, review the upgrade instructions in the Installation guide before installing the newer version of RADIUS.

If SecureAuth IdP RADIUS server v2.0.x - v2.2.x is currently installed, use the install instructions in this guide to upgrade while retaining the current configuration settings.

New installation

If installing SecureAuth IdP RADIUS server v2.3.9 / v2.3.12 for the first time on the designated appliance, follow the install instructions in the installation guide.

SecureAuth IdP RADIUS logs for troubleshooting

See SecureAuth IdP RADIUS server logs for information on using the RADIUS logs for troubleshooting.

 

 


Adaptive Authentication 

If Adaptive Authentication is used with the user group check feature enabled, RADIUS responds accordingly in these login failure scenarios based on the authentication workflow:

  • Workflow 1 = Password | Timed Passcode or Second Factor
  • Workflow 2 = Password & Mobile Login Request (Approve / Deny)
  • Workflow 3 = Password Only
  • Workflow 4 = Timed Passcode Only
  • Workflow 5 = Timed Passcode / Password 
  • Workflow 6 = Password | Timed Passcode
  • Workflow 7 = Timed Passcode | Password
  • Workflow 8 = Username | Second Factor
  • Workflow 9 = Username | Second Factor | Password
  • Workflow 10 = PIN + TOTP
  • Workflow 11 = Password & Timed Passcode

Login failure scenario

End-user experience from RADIUS
-- Workflows 1, 2, 6, 7, 8, 9, 11

End-user experience from RADIUS
-- Workflows 3, 4, 5, 10

Hard stop; refuse authentication request

Login failed message received

Login failed message received

Step up, require two-factor authentication

Prompt received for second authentication factor

Login request fulfilled

Step down, skip two-factor authentication

Second authentication factor skipped; login request fulfilled

Login request fulfilled

Resume authentication workflow

Prompt received for second authentication factor

Login request fulfilled

Skip to post-authentication

Second authentication factor skipped; login request fulfilled

Login request fulfilled

Redirect to realm or URL

Login failed message delivered

Login failed message received

No failure

Prompt received for second authentication factor

Login request fulfilled

 


SecureAuth IdP RADIUS server logs 

Enable logs

SecureAuth IdP RADIUS server logs can assist in troubleshooting the SecureAuth IdP RADIUS server.

To set up logs for the SecureAuth IdP RADIUS server:

1. Go to C:\idpRADIUS\bin\conf\log4j2.xml

2. Under "<Loggers>", find logger name="com.secureauth" and change the level value to "all". For example:

   <logger name="com.secureauth" level="all" additivity="false">

3. Save edits.

4. Find log files stored in C:\IdPRADIUS\bin\Logs\saRadiusServer

The table below shows log levels in order by verbosity::

Level

Description

New messages added in RADIUS server v2.4

ALL

Captures all logging

 

TRACE

Captures finer-grained informational events than DEBUG (contains all package attributes to
/ from the VPN)

 

DEBUG

Captures fine-grained informational events for debugging RADIUS

 

INFO

Captures diagnostic information at a coarse-grained level, and Adaptive Authentication password state results

  • PasswordState: Adaptive Auth results in status: Continue for user
  • PasswordState: Adaptive Auth results in status: TwoFactor for user

WARN

Designates potentially harmful situations

 

ERROR

Captures critical or error conditions that still allow RADIUS to run

 

FATAL

Captures emergency conditions for severe error events

 

OFF

Disables logging

 

Sample logs for different RADIUS failover scenarios

Failover to a SecureAuth IdP RADIUS backup server is configured under Step B: IdP Realms configuration, Add IdP Realm – see Configuration guide - v2.4 - SecureAuth IdP RADIUS server.

Failover scenario: Primary RADIUS server fails over to secondary RADIUS server which functions
[25/Oct/2018:13:18:16 -0700]  ERROR   IdPAPIAccess: Primary IdP server failed: https://secureauth.company.com/SecureAuth3. Checking failover servers.
[25/Oct/2018:13:18:16 -0700]  INFO    IdPAPIAccess: Falling back to server: sa01.company.com
[25/Oct/2018:13:18:17 -0700]  INFO    AuditLog: Start authentication session for user: user-adm; NAS-IP: 123.45.67.89
[25/Oct/2018:13:18:17 -0700]  DEBUG   RadiusLibFacade: sending response: id=230 type=Access-Challenge
[25/Oct/2018:13:18:17 -0700]  DEBUG   RadiusLibFacade: sending response: id=231 type=Access-Challenge
[25/Oct/2018:13:18:17 -0700]  DEBUG   RadiusLibFacade: sending response: id=232 type=Access-Challenge
[25/Oct/2018:13:18:17 -0700]  DEBUG   RadiusLibFacade: sending response: id=233 type=Access-Challenge
[25/Oct/2018:13:18:18 -0700]  DEBUG   RadiusLibFacade: sending response: id=234 type=Access-Challenge
[25/Oct/2018:13:18:18 -0700]  DEBUG   RadiusLibFacade: sending response: id=235 type=Access-Challenge
[25/Oct/2018:13:18:18 -0700]  INFO    SARadiusServer: GTCHandler has been called.
[25/Oct/2018:13:18:19 -0700]  DEBUG   RadiusLibFacade: sending response: id=236 type=Access-Challenge
[25/Oct/2018:13:18:39 -0700]  INFO    SARadiusServer: GTCHandler has been called.
[25/Oct/2018:13:18:39 -0700]  DEBUG   RadiusLibFacade: sending response: id=237 type=Access-Challenge
[25/Oct/2018:13:18:40 -0700]  DEBUG   RadiusLibFacade: sending response: id=238 type=Access-Accept
[25/Oct/2018:13:18:40 -0700]  INFO    AuditLog: Granted access to user: user-adm; NAS-IP: 123.45.67.89
Failover scenario: Primary RADIUS server fails over to other RADIUS servers, none of which are functioning
[25/Oct/2018:14:22:27 -0700]  INFO    AuditLog: Abandoned previous session for user: user-adm; NAS-IP: 123.45.67.89
[25/Oct/2018:14:22:27 -0700]  ERROR   IdPAPIAccess: Primary IdP server failed: https://secureauth.company.com/SecureAuth3. Checking failover servers.
[25/Oct/2018:14:22:28 -0700]  INFO    AuditLog: Start authentication session for user: user-adm; NAS-IP: 123.45.67.89
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=6 type=Access-Challenge
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=7 type=Access-Challenge
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=8 type=Access-Challenge
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=9 type=Access-Challenge
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=10 type=Access-Challenge
[25/Oct/2018:14:22:28 -0700]  DEBUG   RadiusLibFacade: sending response: id=11 type=Access-Challenge
[25/Oct/2018:14:22:29 -0700]  INFO    SARadiusServer: GTCHandler has been called.
[25/Oct/2018:14:22:29 -0700]  INFO    IdPAPIAccess: Password authentication failed: invalid; message: AppId is unknown.
[25/Oct/2018:14:22:29 -0700]  INFO    PasswordState: User/Password verification failed for user: user-adm.
[25/Oct/2018:14:22:29 -0700]  DEBUG   RadiusLibFacade: sending response: id=12 type=Access-Reject
[25/Oct/2018:14:22:29 -0700]  INFO    AuditLog: Denied access request by user: user-adm; NAS-IP: 123.45.67.89
Failover scenario: Primary RADIUS server fails over to secondary server which fails, but failover attempt to third server is successful
[25/Oct/2018:14:30:55 -0700]  ERROR   IdPAPIAccess: Primary IdP server failed: https://secureauth.company.com/SecureAuth3. Checking failover servers.
[25/Oct/2018:14:30:55 -0700]  INFO    IdPAPIAccess: Falling back to server: sa01.secureauth.com
[25/Oct/2018:14:30:56 -0700]  INFO    AuditLog: Start authentication session for user: user-adm; NAS-IP: 123.45.67.89
[25/Oct/2018:14:30:56 -0700]  DEBUG   RadiusLibFacade: sending response: id=13 type=Access-Challenge
[25/Oct/2018:14:30:56 -0700]  DEBUG   RadiusLibFacade: sending response: id=14 type=Access-Challenge
[25/Oct/2018:14:30:56 -0700]  DEBUG   RadiusLibFacade: sending response: id=15 type=Access-Challenge
[25/Oct/2018:14:30:56 -0700]  DEBUG   RadiusLibFacade: sending response: id=16 type=Access-Challenge
[25/Oct/2018:14:30:57 -0700]  DEBUG   RadiusLibFacade: sending response: id=17 type=Access-Challenge
[25/Oct/2018:14:30:57 -0700]  DEBUG   RadiusLibFacade: sending response: id=18 type=Access-Challenge
[25/Oct/2018:14:30:57 -0700]  INFO    SARadiusServer: GTCHandler has been called.
[25/Oct/2018:14:30:57 -0700]  DEBUG   RadiusLibFacade: sending response: id=19 type=Access-Challenge
[25/Oct/2018:14:31:18 -0700]  INFO    SARadiusServer: GTCHandler has been called.
[25/Oct/2018:14:31:18 -0700]  DEBUG   RadiusLibFacade: sending response: id=20 type=Access-Challenge
[25/Oct/2018:14:31:18 -0700]  DEBUG   RadiusLibFacade: sending response: id=21 type=Access-Accept
[25/Oct/2018:14:31:18 -0700]  INFO    AuditLog: Granted access to user: user-adm; NAS-IP: 123.45.67.89

============================
Primary IdP Host:
secureauth.company.com
Backup IdP Host:
secureauth2.company.com,sa01.secureauth.com

 


Release notes 

Release date: October 30, 2018
Version: 2.4
Compatibility: SecureAuth IdP versions 8.2 - 9.2

IDNew features and enhancements
---IdP Realms and RADIUS Clients can now be disabled / enabled
RAD-13Standardized authentication workflow names for consistency with IdP naming conventions
RAD-44Additional logging is now available for Adaptive Authentication steps
RAD-58Text hints now appear on the IdP Realm page
RAD-91Toggle now available on RADIUS clients page to enter either a NAS-IP or client IP address
RAD-107Single page workflow added for Username, Second Factor, Password
RAD-110Wild cards now supported when defining RADIUS client IP values
RAD-143One or more backup IdP hosts can now be specified for failover functionality
RAD-147PIN + TOTP end-user workflow added
RAD-172New workflow added for entering OTP as first option, and Password as challenge
RAD-209MS-CHAPv2 support added for Microsoft Remote Desktop Gateway and Cisco ASA
RAD-211NetMotion integration supported
RAD-228TLS 1.2 support added for NetMotion VPN with Mobility clients on version 11.02+
RAD-234Custom API header now accommodates millisecond-precision dates
IDBug fixes
RAD-215Custom API header with millisecond-precision dates now works with SecureAuth IdP version 9.2

Next step...

Install SecureAuth IdP RADIUS server v2.4