SSO fails when nfactor is used ADC
book
Article ID: CTX219481
calendar_today
Updated On:
Description
We have implemented nfactor authentication on the ADC (LDAP as the First Factor and then Radius as the Second Factor) and we are running into issues with Single Sign On.
We can see that when the ADC tries to accomplish the SSO, it provides the passcode instead of the LDAP password causing the SSO to fail.
Resolution
There are 2 ways of making sure that the ADC uses LDAP credentials to accomplish the SSO:
1. Single Sign On through
"Enable Single Sign On Credentials" option
- Navigate to the Login Schema to which the LDAP authentication policy is bound.
- Edit the Login Schema Profile bound to this Login Schema.
- Scroll to the bottom to enable the "Enable Single Sign On Credentials" option.
Note: This option is available from ADC version 11.0.49.x+.
2. Single Sign On through Traffic Policy/ Profile
- By using the traffic policy/ action, we can configure the username/ password Expression to be used for SSO.
- When we set the -usercredentialIndex and -passwordCredentialIndex in a login schema, we store the username/ password from that authentication factor at the specified index in the session, which can then be used later for SSO using the expression http.req.user.attribute()
- So, on the First factor where the LDAP authentication policy is bound, we need to set the value for userCredentialIndex and passwordCredentialIndex under Configure Authentication Login Schema.
- Now, the value set for userCredentialIndex and passwordCredentialIndex needs to be defined in the traffic Profile to achieve the SSO. Make sure to bind the Traffic policy to the LB/ NG virtual server.
For example:
> add loginSchema login2 -authenticationSchema LoginSchema/SingleAuth.xml -userCredentialIndex 15 -passwdExpression 16> add tm trafficaction act1 -sso on -userExpression http.req.user.attribute(15) -passwdExpression http.req.user.attribute(16)> add tm trafficpolicy pol1 <rule> act1Note: The value userCredentialIndex and passwordCredentialIndex can be set to any value. In this case, we are using the value as 15 and 16 respectively.


Problem Cause
The ADC would by default send the credentials out of the last Login Schema. In this case, since the Radius is the second factor authentication, so the credentials posted by the ADC to achieve the Single Sign On (SSO) would be through the Login Schema to which the Radius Authentication Policy is bound.
Issue/Introduction
We have implemented nfactor authentication on the ADC (LDAP as the First Factor and then Radius as the Second Factor) and we are running into issues with Single Sign On.
Was this article helpful?
thumb_up
Yes
thumb_down
No