External Authentication Server Definition

To add an external Active Directory, LDAP, Cerb, or Radius authentication server, proceed as follows.

  1. Select Settings > Authentication.

  2. Choose External authentication tab.

  3. Click Add external authentication.

  4. Provide a name for this specific configuration.

  5. Select the bind address - IP address used for sending requests to given host.

Note

In case of cluster configuration, select a labeled IP address from the Bind address drop-down list and make sure that other nodes have IP addresses assigned to this label. For more information refer to the Labeled IP Addresses topic.

  1. In the General section, select authentication service type: Active Directory, LDAP, CERB, or Radius.

../../_images/5-5-external-auth.png
  1. Provide configuration parameters depending on selected external authentication system type. Configuration details are described in the sections below.

  2. Click Save.


Field Descriptions and Configuration Based on Chosen Method

Active Directory

Parameter

Description

Active Directory domain

Domain which will be used for authenticating users in Active Directory.

TLS enabled

This option is required to be checked for the domain users who change their passwords in the Access Gateway.

CA Certificate

Available when TLS enabled option is activated.

Privileged user login

The privileged account’s login name to modify a user password on the Active Directory server.

Secret

Secret used to establish server connection to modify a user password on the Active Directory server.

Add second factor

Additional verification step with authentication methods OATH, SMS or DUO. Check Second Authentication Factor section.

Note

  • The Active Directory external authentication method uses the Kerberos protocol as the first step.

  • This functionality is enabled by default.

  • Please refer to Kerberos Authentication Settings section to learn how to disable it.

  • If Active Directory authentication is successfully completed using Kerberos, the configured certificate will not be applied, as it is only utilized when a fallback to LDAP is required.

../../_images/5-6-auth-ad.png

LDAP

Parameter

Description

Host

Server’s IP address.

Port

Port used to establish connections with given server.

Bind DN

Template containing a path which will be used to create queries to LDAP server (for example: dc=example,dc=com, cn=username,dc=example,dc=com, or, when using variable substitution: cn=##username##,dc=example,dc=com).

TLS enabled

This option is required to be checked for the domain users who change their passwords in the Access Gateway.

Server certificate / CA Certificate

LDAP server certificate or CA certificate. Available when TLS enabled option is activated.

Add second factor

Additional verification step with authentication methods OATH, SMS or DUO. Check Second Authentication Factor section.

../../_images/ldap_structure.png

Note

The value of Bind DN field may include variable substitution, allowing the DN to be dynamically generated based on the username of the user logging in to the system, for example: cn=##username##,dc=example,dc=com In that case, when configuring a user, leave the LDAP Base field empty in Management > Users > User Data tab.

The following description assumes that user’s authentication data is stored on LDAP server accessible through 10.0.0.2 IP address and default LDAP service port number - 389. User definition is stored under dc=example,dc=com.

../../_images/5-6-auth-ldap.png

Cerb

Parameter

Description

Host

Server’s IP address.

Port

Port used to establish connections with given server.

Service (NAS ID)

CERB service used for authenticating Fudo Enterprise users.

Secret

Secret used to establish server connection.

Add second factor

Additional verification step with authentication methods OATH, SMS or DUO. Check Second Authentication Factor section.

../../_images/5-6-auth-cerb.png

Note

The AD domain field from the user configuration is included in the initial Access-Request packet used to authenticate the user against the RADIUS/Cerb server.

  • If the AD domain is populated:

    • For RADIUS, the AD domain value is appended to the username in the User-Name field, formatted as: {name}@{ad_domain}.

    • For Cerb, the MS-CHAP-Domain field is set to the value from the AD domain, and the User-Name field contains only {name}.

  • If the AD domain is not populated, the User-Name field in the Access-Request packet for both methods contains only the username: {name}.

Radius

Parameter

Description

Host

Server’s IP address.

Port

Port used to establish connections with given server.

NAS ID

RADIUS server NAS-Identifier parameter.

Secret

Secret used to establish server connection.

Authentication method

Select authentication method PAP, CHAP, MS-CHAPv2

Add second factor

Additional verification step with authentication methods OATH, SMS or DUO. Check Second Authentication Factor section.

../../_images/5-6-auth-radius.png

Note

  • Please note that when configuring Radius authentication within Fudo Enterprise, only the Password Authentication Protocol (PAP) is supported.

  • Make sure to read the note for the Cerb method as well.

Assigning an External Authentication Method to a User

  1. Select Management > Users.

  2. Find and click the user definition for which you want to assign an external authentication method (e.g. admin).

  3. Go to the User Data tab, in the LDAP Base field specify the location of this user object in the directory structure (e.g. cn=admin,dc=example,dc=com).

Note

Leave the LDAP Base field empty if you specified where users are stored in the LDAP server configuration (cn=##username##,dc=example,dc=com).

  1. To add authentication method, go back to the Settings tab and select External authentication from the Add authentication method drop-down list.

  2. Choose method and click Save.

  3. Click Save and Close to save user definition.

Second Authentication Factor

If an additional verification step (the Add second factor option) is configured in the external authentication server definition using the OATH, SMS, or DUO authentication methods, the method selected as the second factor must be chosen as the authentication method in the user configuration. Then, in its configuration window, External Authentication must be selected as the first authentication factor.


  1. Select Management > Users.

  2. Find and click the user definition for which you want to assign an external authentication method (e.g. admin).

  3. Go to the User Data tab, in the LDAP Base field specify the location of this user object in the directory structure (e.g. cn=admin,dc=example,dc=com).

Note

Leave the LDAP Base field empty if you specified where users are stored in the LDAP server configuration (cn=##username##,dc=example,dc=com).

  1. To add external authentication method with second factor, go back to the Settings tab and select the name of the method used in the configuration (e.g. SMS) from the Add authentication method drop-down list.

  2. In the modal window, select External Authentication as the first authentication factor.

  3. From the Choose method list, select the external authentication method configured with a second authentication factor, according to the scenario described above.

  4. Configure parameters of the second factor.

../../_images/5-6-auth-second-factor-modal.png
  1. Click Save.

  2. Click Save and Close to save user definition.

../../_images/5-6-auth-second-factor.png

Related topics: