Contents

VASCO IDENTIKEY Authentication Server Integration Guide

VASCO IDENTIKEY Authentication Server® is an off-the-shelf centralized authentication server that supports the deployment, use, and administration of DIGIPASS strong user authentication.

This document describes how to integrate VASCO IDENTIKEY Authentication Server with a WatchGuard Firebox. You can use the combination of these two products to set up a more secure remote connection between the outside world and your company’s internal network.

Platform and Software

The hardware and software used to complete the steps outlined in this document include:

  • Firebox or WatchGuard XTM device installed with Fireware v11.10.x
  • VASCO IDENTIKEY Authentication Server version 3.9 installed on Windows Server 2012 R2.

VASCO IDENTIKEY Server supports integration into an existing environment with a RADIUS Server, Active Directory Server or LDAP Server. In this document, we use a RADIUS Server as an example. To demonstrate user authentication in this document, we use the WatchGuard Mobile VPN with SSL client.

To set up the VASCO IDENTIKEY Authentication Server, refer to the instructions in the VASCO IDENTIKEY Authentication Server Installation Guide. In this document, we describe how to configure the IDENTIKEY Authentication Server and Firebox to work together.

The figure below demonstrates the workflow described in this document.

  1. The user initiates an authentication request to the Firebox. The user password is the static password plus the One-Time Password (OTP) shown on DIGIPASS.
  2. The Firebox sends the authentication request to the IDENTIKEY Authentication Server.
  3. The IDENTIKEY Authentication Server checks the password combination; if it is correct, it sends a response to the Firebox.
  4. The Firebox grants access to the user.

IDENTIKEY Authentication Server Configuration

Create a New Policy

In the Authentication Server > Policies menu you define the authentication behavior.

  1. Select Policies > Create.

  1. In the Policy ID text box, type a meaningful name for the policy.

  1. Click Create to create the new policy.
  2. Click Edit to edit the policy settings.

  1. From the Local Authentication drop-down list, select Digipass/Password.
  2. Click Save.

Define the Firebox as a Client

In the Clients configuration you specify the location from which IDENTIKEY Authentication Server will accept requests and the protocol it uses. To do this, you must add the Firebox as a RADIUS client.

  1. Select Clients > Register.

  1. To set the Client Type, click Select from list and select RADIUS Client.

  1. In the Location text box, type the IP address of the Firebox.
  2. From the Policy IP drop-down list, select the policy that you created in the Policies configuration.
  3. From the Protocol ID drop-down list, select RADIUS.
  4. In the Shared Secret and Confirm Shared Secret text boxes, type the shared secret.
    This shared secret must match the password you configure in the RADIUS server settings on the Firebox.
  5. In the Character Encoding text box, type the encoding used if required, or keep it blank.
  6. Click Create to finish and create the RADIUS client.

Add Users to the IDENTIKEY Authentication Server

For a user to use IDENTIKEY for authentication, the user must be added on the IDENTIKEY Authentication Server.

  1. Select Users > Create.

  1. In the User ID text box, type a user name to add.

  1. In the Enter static password and Confirm static password text boxes, type the static password for this user.
    The user can use the static password to authenticate if there is no DIGIPASS assigned to the user. If a DIGIPASS is assigned to the user, the user’s password is a combination of the static password and the One-Time Password generated on the assigned DIGIPASS.

Assign a DIGIPASS to Users

The purpose an IDENTIKEY Authentication Server is to enable users to log in with a One-Time Password (OTP). The DIGIPASS is a device that generates OTPs for the user.

To enable a user to use an OTP as part of the password, you must assign a DIGIPASS to the user.

  1. Click a user name to edit the user.
  2. Select the Assigned DIGIPASS tab.

  1. Click Assign.
  2. Select the DIGIPASS that was imported before from the DPX file given by VASCO.
    The selected DIGIPASS is assigned to the user.

Firebox Configuration

This configuration procedure uses Fireware Web UI. You can also use Policy Manager to complete these steps.

Configure the RADIUS Server on your Firebox

To authenticate with IDENTIKEY Authentication Server, you must enable the RADIUS server and configure the settings on the Firebox.

  1. Log in to Fireware Web UI at https://<IP address of Firebox>:8080.
  2. Select Authentication > Servers > RADIUS.
  3. Select the Enable RADIUS Server check box.

  1. In the IP Address text box, type the IP address of the IDENTIKEY Authentication Server.
  2. In the Port text box, type the port used in IDENTIKEY Authentication Server for RADIUS authentication. The default port is 1812.
  3. In the Passphrase and Confirm text boxes, type the shared secret you configured for the RADIUS client on the IDENTIKEY Authentication Server.
  4. Click Save.

Add Users

On the Firebox, add a new user to log in to the RADIUS server.

  1. Select Authentication > Users and Groups.
  2. Click Add.

  1. For Type, select User.
  2. In the Name text box, type the same user name you created on the IDENTIKEY Authentication Server.
  3. From the Authentication Server drop-down list, select RADIUS.
  4. Click OK.
    The user is added to the Users and Groups list on the Firebox.

  1. Click Save.

Configure RADIUS Authentication for Mobile VPN with SSL

To use RADIUS authentication for user connections with the Mobile VPN with SSL client, enable Mobile VPN with SSL and configure it to use RADIUS for authentication.

  1. Select VPN > Mobile VPN with SSL.
  2. Select the Activate Mobile VPN with SSL check box.

  1. In the Primary text box, type the IP address that the Mobile VPN with SSL clients will connect to.
    This is an IP address of the Firebox.
  2. Select the Authentication tab.
  3. Select the check box next to RADIUS (Default) to use the RADIUS authentication server.

Test the Integration

To test the integration, we use Mobile VPN with SSL to test user authentication.

Mobile VPN with SSL client software download from Firebox

  1. In a web browser, go to the SSL VPN web portal. The IP address is: https://<IP of Firebox>:4100/sslvpn.html.

  1. In the Username text box, type the user name of a user defined on the IDENTIKEY Authentication Server.
  2. In the Password text box, type the static password for the user and the OTP shown on the screen of the DIGIPASS assigned to the user (do not add a space in between the password and the OTP). For example, if the static password is “password” and the OTP at the time is “123456”, the user must type password123456.
  3. If necessary, from the Domain drop-down list, select RADIUS.
  4. Click Login.
    After successful authentication, the download page appears.

  1. Download and install the VPN client for your operating system.

Mobile VPN with SSL Client Authentication

After the user downloads and installs the VPN client, they use the same user name and password combination as described above for the WatchGuard Mobile VPN with SSL client.

  1. Launch the Mobile VPN with SSL client.

  1. In the Server text box, type the Firebox IP address configured in the Mobile VPN settings on the Firebox.
  2. In the User name text box, type the user name configured on the IDENTIKEY Authentication server.
  3. In the Password text box, type the password. Remember to append the OTP shown on the screen of the DIGIPASS to the end of static password. Do not add a space between the static password and the OTP.
  4. Click Connect.
    The Mobile VPN with SSL client shows the status Connected.

Give Us Feedback  ●   Get Support  ●   All Product Documentation  ●   Technical Search