PhenixID

Step by Step – Juniper Networks SA SSL-VPN

Summary

This document will guide you through the steps to secure the authentication of your Juniper SA SSL-VPN solution with PhenixID Server, delivering two-factor authentication via SMS. You will be able to test the product, with your current Juniper SA SSL-VPN solution and LDAP user database, without making any changes that affect existing users.

System Requirements

  • PhenixID Server installed.
  • Information about the userstore, such as ip address/server name, port and userid/password for the connection.
  • A userid and password for the PhenixID Message Gateway. Please contact PhenixID Support, support@phenixid.se, to set up the account.

Instruction

Overview

This scenario will:

  • Configure PhenixID server as a RADIUS server
  • Create a connection to your user store (LDAP)
  • Enable two-factor authentication, the one-time password will be delivered via SMS using PhenixID Message Gateway

Configure PhenixID Server to support Juniper Networks for 2fa

We will use one of the scenarios included in the administration portal.
Open a browser and go to https://PhenixidServerIP:8443/config/.
Use the default administrator user called phenixid with the default password password to login.

In this example we will login with username, password and SMS.

Click Scenarios tab and then click Username, Password & OTP delivered by SMS

Configuration_Manager1

Press Start to begin the configuration

Configuration_Manager2

Set a Name and Description for the Scenario

Configuration_Manager3

If no user store has been configured, choose Create new, and if you already have on configured, choose it.

Configuration_Manager4

In this example we will create a connection to an LDAP user store

Configuration_Manager5

Set a Name and Description for the Connection

Configuration_Manager6

Configure the Host address and Port number of your LDAP user store

Configuration_Manager7

Set the username (Bind DN) and Password used for the connection

Configuration_Manager8

Enable SSL if the LDAP server is configured to use it, and set trust all to accept the certificate

Configuration_Manager9

Test the connection to make sure that everything is configured correctly

Configuration_Manager10

Set the Search filter and Search base according to your user store

Configuration_Manager11

If no RADIUS Server has been configured, choose Create new, and if you already have on configured, choose it

Configuration_Manager12

Set the address that you want for the RADIUS server (listener), or choose the default value to listen to all addresses
Also set the RADIUS port corresponding to the configuration on Juniper

Configuration_Manager13

Set the RADIUS Client address to the ip of the Juniper machine, multiple ip’s can be added (seperated by comma)
Then set the secret corresponding to the configuration on Juniper
Attribute selector will be used if Juniper is configured to allow the users to choose
different authentication methods
For instance, SMS or OATH
This value can be either exact match, 44=SMS
Or a regular expression, 44=^.*Token.*$, any string containing the word Token
For Juniper the RADIUS attribute should be 44, and the value must be a regular expression, containing the name of the Juniper realm

Configuration_Manager14

Normally no additional attributes needs to be returned to the RADIUS client after successful authentication, so leave these fields empty

Configuration_Manager15

Set the PhenixID Message Gateway username and password, and test the connection

Configuration_Manager16

Specify the length of the OTP and the attribute containing the number where the SMS should be sent

Configuration_Manager17

If PIN code should be used, please configure it with the desired parameters

Configuration_Manager18

Verify the configuration on the Summary screen, and then press create

Configuration_Manager19

Configure Juniper Networks to use PhenixID Server for 2fa

1 – Start by logging in to the Juniper Central Manager (Admin Console).

2 – We will start by adding a Authentication Server, so go to Authentication -> Auth. Servers.
As mentioned earlier RADIUS will be used for this scenario.
So please choose Radius Server in the drop-down list and click New Server…

Configure as below (click for larger image):

Step_by_Step_Juniper_-_Google_Docs

 

2.1 – Specify a Name to identify the server instance.

2.2 – In the NAS-Identifier field, enter the name that identifies the SA Series Network Access Server (NAS) client that communicates with the RADIUS server.

2.3 – In the RADIUS Server field, specify the name or IP address of the PhenixID RADIUS server.

2.4 – Enter the Authentication Port value of the PhenixID RADIUS server. Typically this port is 1812, but some legacy servers might use 1645.

2.5 – Enter a string for the Shared Secret, this must be the same as configured in the PhenixID Server configuration made earlier.

2.6 – Enter the NAS-IP-Address. This allows you to control the NAS IP address value passed to RADIUS requests.

If you have a secondary PhenixID RADIUS backup Server, please enter values for that server in “Backup Server”.

2. 7 – When done, press Save Changes.

 

3 – The next step is to set two Radius Rules to add a custom challenge that determines the action to take for an incoming packet.

3.1 – First rule should look like this:

Step_by_Step_Juniper_-_Google_Docs

If username/password is successful, this rule will present the One Time Password field to the user.

3.2 – Second rule:

Step_by_Step_Juniper_-_Google_Docs

 

3.3 – If username/password is unsuccessful, this rule will redirect back to the login page, showing the reject message.
When done the rules should look like this:

Step_by_Step_Juniper_-_Google_Docs

 

4 – Now we need to create a sign-in page.
A sign-in page defines the customized properties in the end-user’s welcome page such as the welcome text, help text, logo, header, and footer.

4.1 – Go to Authentication -> Signing In ->Sign-in Pages:

Step_by_Step_Juniper_-_Google_Docs

 

4.2 – Give it a Name, add a Welcome Message, and then save the changes:

Step_by_Step_Juniper_-_Google_Docs

 

4.3 – A User Role is needed to assign access features for the users.
Create a User Role by going to Users -> User Roles ->New Role

Step_by_Step_Juniper_-_Google_Docs

 

Set a Name and allow at least one Access feature.

In the example below, Web is enabled.

Step_by_Step_Juniper_-_Google_Docs

 

5 – We will now create a User Authentication realm that uses the Authentication Server created earlier.

5.1 – User Authentication realms specify what server to use for authentication, how policies are assigned to users, and restrictions on who can attempt to sign-in.
Go to Users -> User Realms ->New…

Step_by_Step_Juniper_-_Google_Docs

 

5.2 – Set a Name and choose the Authentication server that we created earlier.

Like in the example below.

Step_by_Step_Juniper_-_Google_Docs

 

6.- Now we create a role mapping for the realm.
The role mapping specifies how to assign roles to users when they sign in. Users that are not assigned a role will not be able to sign in.
In your newly created realm click Role Mapping and New Rule.
Rule should be based on username.
Set a Name and set the rule according to below.
Then add your role to Selected Roles:.

Step_by_Step_Juniper_-_Google_Docs

 

When done, it should look like this:

Step_by_Step_Juniper_-_Google_Docs

 

7 – Last step is to create a Sign In Policy that uses the Sign-in Page created earlier as well as the User Authentication realm.
Go to Authentication -> Signing In/Sign-in Policies and click New URL….

7.1 – Set a Sign-in URL, choose your Sign-in page and add your realm to Selected realms
The setting for the realms should be set to Users picks from a list..
If only one realm is added, users will not have to choose. But if more than one realm is added to  “Selected realms”, users will have the choice available on the login page, /MyURL/ in the example below.

Step_by_Step_Juniper_-_Google_Docs

 

8 – Now when users go to IP-address/ServerName of Juniper/MyURL and login, they should be presented with a One-Time Password field after successful authentication using username and password.


DISCLAIMER
Information provided in this document is for your information only. PhenixID makes no explicit or implied claims to the validity of this information. Any trademarks referenced in this document are the property of their respective owners.

The origin of this information may be internal or external to PhenixID. PhenixID makes all reasonable efforts to verify this information.

PhenixID - support.phenixid.se