Report errors or omissions

Technical Integration Guides for Identity as a Service and RADIUS applications

You can integrate RADIUS applications with Identity as a Service to provide strong, second-factor authentication for your application solution using Identity as a Service.

Attention: Entrust tests and validates RADIUS integrations with Identity as a Service. The integration guides provide instructions for configuring RADIUS authentication with the RADIUS version tested by Entrust. Some configuration steps may differ from the documentation provided or the steps in the integration guides may not be effective (due to Entrust not having tested and validated with the version you are using). For different versions, the integration guides may still offer a standard base to help fast-track RADIUS authentication setup for your application, but in the event there are issues, contact support@entrust.com for assistance.

How it worksHow it works

Identity as a Service can be configured to handle both first-factor authentication and second-factor authentication. In this environment, the RADIUS proxy agent within the Enterprise Gateway connected to Identity as a Service intercepts messages between the VPN server and Identity as a Service.

The authentication flow between the VPN server and Identity as a Service supports the PAP authentication protocol.

VPN authentication with Identity as a Service using MSCHAPv2 follows these steps:

A user enters their user ID and token response.

A request is sent to the Enterprise Service Gateway, which communicates with Identity as a Service to validate the credentials.

The  Enterprise Service Gateway returns a RADIUS ACCEPT or REJECT message to the VPN server.

PrerequisitesPrerequisites

Complete the following steps before integrating your authentication system with Identity as a Service:

Install and configure your first-factor authentication resource using the documentation provided by the vendor. The first-factor authentication resource can be a RADIUS server or an external authentication resource (a Local DB, LDAP-compliant directory or Windows domain controller through Kerberos).

Install and configure the RADIUS appliance using the documentation provided by the vendor. The device must be able to route traffic before you integrating with Identity as a Service.

Install and configure Identity as a Service and an Identity as a Service gateway (containing a RADIUS proxy agent). Take note of the shared secrets, IP addresses, and ports you use. You need this information to configure the RADIUS appliance and first-factor authentication resource.

If you want to configure your RADIUS appliance and first-factor authentication resource to recognize Identity as a Service user groups, you must define the Identity as a Service user groups first.

Supported authenticatorsSupported authenticators

Standard RADIUS supports the following protocols:

PAP

CHAP

MSCHAPv1

MSCHAPv2

EAP – Extended Authentication Protocol supports the following protocols:

EAP-GTC

EAP-MSCHAPv2

In the RADIUS scenario, there are the following variations:

First-factor only (either just password or just token)

First-factor and second-factor (password plus any of the second-factor authenticators supported by Identity as a Service)

External first-factor and second-factor (which also supports any second-factor authenticators supported by Identity as a Service). This may or may not be supported by all VPN vendors.

With an Enterprise Service Gateway or 5.8 or later, RADIUS EAP supports PASSWORD and EXTERNAL for first-factor authentication. If PASSWORD is configured, the user is prompted for password and then the second-factor during VPN server authentication. With earlier versions of the Gateway, VPN authentication will fail when password is configured as first-factor.

Note: Entrust recommends that when you configure multiple RADIUS applications that you give each RADIUS application is given a unique shared secret.

Note: Entrust recommends that when you configure multiple RADIUS applications that you give each RADIUS application is given a unique shared secret.

Topics in this section:

Integrate Barracuda Web Application Firewall

Integrate Check Point Security Gateway

Integrate Cisco ASAv Series Adaptive Security Appliance

Integrate Cisco Identity Services Engine

Integrate Citrix Netscaler

Integrate F5 BIG-IP Access Policy Manager (APM)

Integrate Fortinet-FortiGate

Integrate NetMotion Mobility XE VPN

Integrate OpenVPN

Integrate Palo Alto Virtual Appliance

Integrate PAM RADIUS Plug-in

Integrate Pulse Secure

Integrate SonicWall

Integrate Sophos XG Virtual Appliance

Integrate VMware Horizon View