This article describes an open source dual factor authentication implementation of Access Gateway Enterprise Edition appliance by using OpenOTP. OpenOTP has free license for 25 users.
OpenOTP Virtual Machine
VMware or Virtualbox
Android, iPhone, or Blackberry with Google Authenticator Soft token
Domain Administrator account to extend the Active Directory Schema and match tokens with usernames
To implement OpenOTP dual factor authentication server for Access Gateway Enterprise Edition appliance, complete the following procedure:
Download the .OVF appliance and install guide from http://rcdevs.com/downloads/index.php
Extract and deploy the .OVF file.
Note: The memory can be lowered to 512 MB or 256 MB and one CPU is sufficient.
Start the virtual machine.
After initial boot process, on the console enter the Fully Qualified Domain Name (FQDN) of the appliance and company name. It gets an IP address from DHCP and displays the SSH account and URL of the administrator portal.
The /opt/webadm/conf/servers.xml file to provide Active Directory LDAP Server address:
<LdapServer name="LDAP Server" host="192.168.1.10" port="636" encryption="SSL" cert_file="" key_file="" /> <MailServer name="SMTP Server" host="192.168.1.11" port="25" user="" password="" encryption="NONE" />
Edit the /opt/webadm/webadm.conf file to configure LDAP access:
proxy_user "CN=Administrator,CN=Users,DC=ardadom4,DC=net" proxy_password "password" super_admins "cn=Administrator,cn=Users,dc=ardadom4,dc=net"
With Active Directory installed on Servers earlier than Windows 2008, add user to the webadm_account_oclasses.
webadm_account_oclasses "webadmAccount","user"
Use the docs/timezones.txt file for the list of time zones.
time_zone "America/New_York"
Edit the /opt/radiusd/conf/clients.conf file and create an object for the NetScaler IP address:
client 192.168.1.20 {
secret = testing123
shortname = any
}
Run the following command to restart the webadm service:
/etc/init.d/webadm restart
Open a Web browser and open https://serverip. Log on with the proxy account.
Follow the initial setup Wizard to extend the Active Directory schema. After you get logged out and log in again with the regular Active Directory administrator account.
Click Applications > OTP Authentication Server > CONFIGURE.
In the Authentication Settings section, select Login Mode as OTP.
Select OTP Type as TOKEN.
Click Apply at the bottom of the page.
Install the Google Authenticator App on the mobile device.
Select a username on the OTP server Graphical User Interface (GUI).
Click the OTP Authentication Server(X Actions) link, as shown in the following screen shot:
Select Register > Unregister Token.
Select Google Authenticator > Time Based. A QR code appears.
Open the Google application and take a screen shot of the QR.
The application imports the private key and displays your one time password.
You can now log on to Access Gateway Enterprise Edition appliance and configure a Radius server profile using the OpenOTP server IP address, port 1812 and the secret testing123.