Page 2
VASCO customers and has been provided to you and your organization for the sole purpose of helping you to use and evaluate VASCO Products. As such, it does not constitute a license to use VASCO Software or a contractual agreement to use VASCO Products.
About VASCO................................ 15 Contact Information.............................. 15 aXsGUARD Identifier............................. 16 Overview................................16 VASCO's Authentication Solution.......................... 1 6 What is the aXsGUARD Identifier? ........................17 What is the IDENTIKEY Server?..........................18 What is a DIGIPASS?............................. 18 Structure of the aXsGUARD Identifier........................1 9 2.6.1 Overview................................
Page 5
Change in IP Address............................6 7 Upgrade from a DEMO to Commercial License..................... 6 7 Replacement of aXsGUARD Identifier ........................68 Change of Customer Information.......................... 6 8 Restoring a backup from another aXsGUARD Identifier..................6 8 Updating............................... 69 Overview................................69 Updating Process..............................6 9 Updating Infrastructure............................
Page 6
14.9 Special Cases............................... 93 15 Replication..............................95 15.1 Overview................................95 15.2 Common Replications ............................95 15.2.1 First and Second aXsGUARD Identifiers......................9 5 15.2.2 First, Second and Disaster Recovery aXsGUARD Identifiers................96 15.3 Replication Wizard..............................96 15.4 Replication and Firewalls............................97 15.5 Replication Process..............................
Page 7
Table of Contents aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 15.5.3 Multiple Changes to a Single Data Record......................9 8 15.5.4 Connection Handling............................9 8 15.6 Replication Monitoring ............................98 15.6.1 Replication Auditing............................98 15.6.2 Replication Status............................9 9 ADMINISTRATION WEB INTERFACE SECTION....................100 16 DIGIPASS User Accounts..........................
Page 10
Image 26: Show CPU Usage for a Specific Service................................. 80 Image 27: CPU Time for Administration Web Interface..............................81 Image 28: Virtual DIGIPASS Process using aXsGUARD Identifier MDC Component (clockwise from the top)..............82 Image 29: Administration Web Interface > Users > User 'annelies'> User Attributes...................... 88 Image 30: LDAP Synchronization to create or update an User Account..........................
Page 11
Table of Contents aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Image 35: Replication between a First, Second, and Disaster Recovery aXsGUARD Identifier..................96 Image 36: 'System' Tab in the Administration Web Interface............................99 Image 37: Replication Status Screen in the Administration Web Interface........................99 Image 38: User Account Link......................................
Page 12
Table of Contents aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Index of Tables Table 1: Values for Local Authentication Setting............................32 Table 2: Values for Back-end Authentication Setting..........................44 Table 3: RADIUS User ID Formats for Back-end Authentication......................... 48 Table 4: Microsoft Active Directory User ID formats for Back-end Authentication..................50 Table 5: Novell e-Directory User ID Formats for Back-end Authentication....................
Audience and Purpose of this Document This aXsGUARD Identifier Product Guide is part of a set of guides on the aXsGUARD Identifier. It is intended for ® technical experts interested in learning about the aXsGUARD Identifier. It describes the structure of the product, the concepts underpinning authentication and how the aXsGUARD Identifier can support authentication within your IT infrastructure.
Identifier 3.0.2.0 Product Guide v1.5 About VASCO VASCO is a leading supplier of strong authentication and Electronic Signature solutions and services specializing in Internet Security applications and transactions. VASCO has positioned itself as global software company for Internet Security serving customers in more than 100 countries, including many international financial institutions.
The DIGIPASS client component uses a variety of cryptographic algorithms to calculate One Time Passwords, Host Codes and Electronic Signatures. Each DIGIPASS device is pre-programmed by VASCO with a unique secret value, which is used to generate One Time Passwords and Electronic Signatures, so that these are unique to each DIGIPASS.
The aXsGUARD Identifier is a simple and cost-effective solution, which can easily be integrated into existing IT infrastructures to support authentication in small to medium sized enterprises. The product integrates new usability...
It is the client component of VASCO’s authentication solution, issued by the Application Service Provider (ASP) to end users (the DIGIPASS holders), to support One Time Passwords and Host Codes with the aXsGUARD Identifier. A DIGIPASS can be provided by an organization to everyone authorized to log on to their system using a One Time Password (OTP).
Identifier aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 We have already described the aXsGUARD Identifier convenience layer and the IDENTIKEY in sections 2.3 and 2.4 respectively. The three user interfaces shown in Image 2 are the aXsGUARD Identifier: Configuration Tool for system administrators, for installation and maintenance.
2.7.3 DEMO Licensing With a DEMO license, the aXsGUARD Identifier also needs to be registered, but with a 'DEMO' license type, and with no license or serial number. Full functionality is available for a registered DEMO version of the aXsGUARD Identifier for 30 days. After thirty days, the aXsGUARD Identifier services are made unavailable, although the Configuration Tool and Administration Web Interfaces are accessible for configuration and management.
If you are unable to solve your problem with the Knowledge Base, please contact the company which sold you the VASCO product. If your supplier is unable to solve your query, they will automatically contact the appropriate VASCO expert. If necessary, VASCO experts can access your aXsGUARD Identifier remotely to solve any problems. Remote...
TCP 443 to sc.vasco.com. Your organization may prefer this port not to be permanently open for the automatic connection on boot-up of the aXsGUARD Identifier to the VASCO Service Center (see section 13). In this case, the port needs to be opened specially for connection, e.g.
Identifier 3.0.2.0 Product Guide v1.5 User Authentication Process Authentication Process Overview In this chapter we describe in detail the User authentication process. aXsGUARD Identifier authenticates logins in two basic ways: Local Authentication, using information from its data store Back-end Authentication, asking a RADIUS server or LDAP back-end system for verification of information The exact authentication process used by the aXsGUARD Identifier varies depending on settings in the applicable Policy, DIGIPASS User account and DIGIPASS records.
Identifier 3.0.2.0 Product Guide v1.5 Identifying the Component Record A record must exist in the database for any client application sending an authentication request to the aXsGUARD Identifier. This client component is identified using: Component Type – A fixed name such as RADIUS Client, Citrix Web Interface, Outlook Web Access or Administration Program Location –...
Page 27
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 In the aXsGUARD Identifier, DIGIPASS User accounts are identified using a User ID and a Domain. This process is shown in the image below and explained here, cross-referencing the numbers in the image: If entry fields for the User ID and Domain are separate, name resolution ends and authentication continues.
Identifier 3.0.2.0 Product Guide v1.5 3.4.3 DIGIPASS User Account Lookup The aXsGUARD Identifier checks that the User attempting to log in has a DIGIPASS User account in the aXsGUARD Identifier data store. The User ID and Domain Resolution described above determines the search criteria to look up the DIGIPASS User account.
Overview Local Authentication is a term used to describe the aXsGUARD Identifier authenticating a User based on information in its data store. Typically the DIGIPASS One Time Password (OTP) is required, but in other cases a static password may be sufficient.
DIGIPASS records and/or multiple applications enabled for a DIGIPASS may be identified. In this case, the aXsGUARD Identifier checks all available applications. Any one of them can validate the OTP. Validation only needs to be completed with one application, after which the aXsGUARD Identifier stops checking through the available applications.
Page 32
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Application Type - either Response Only, Challenge/Response or Multi-Mode. Only DIGIPASS with the Application Type are usable, except Multi-Mode which matches all application types. DIGIPASS Type - a list of models such as DP GO3, DP 260. Only DIGIPASS from the listed models are usable.
1-step login: this is useful for client applications which can only support a single login screen, e.g. RADIUS without support for Challenge/Response or Web HTTP Basic Authentication. The Challenge generated by the aXsGUARD Identifier is not specific to any DIGIPASS device, but is presented in the login window when the User attempts to access the client application.
Page 34
1-Step Login With 1-step Challenge/Response OTP Login (illustrated to the left in the image below): A random Challenge (of length configured for all users) generated by the aXsGUARD Identifier is presented in the client application login window. The User enters the Challenge into their DIGIPASS device.
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Image 9: 1-step (left) and 2-step (right) Challenge/Response Login 3.5.3.5 Virtual DIGIPASS Login We explain here the authentication process with a Virtual DIGIPASS. For more information on Virtual DIGIPASS, see also section 17.5.
Page 36
Method and Request Keyword settings explained in section 3.5.3.6). The aXsGUARD Identifier checks the User credentials, and if OK, generates an OTP, which is sent to the User's mobile phone using the Message Delivery Component (MDC, explained in section 12).
The methods of requesting these three login processes (2-step Challenge/Response, Primary and Backup Virtual OTP request) can be the same. When the aXsGUARD Identifier recognizes a request, it verifies whether there is a DIGIPASS capable of the login process: if not, it ignores the request.
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 3.5.4.1 Static Password Verification Static Password Verification calls on the Static Password defined in the DIGIPASS User Account record. This password is also used for other purposes (see section 16.5). Static Password authentication passes through the steps shown in the image below and described here, cross- referencing the numbers in the image: If a User account does not exist, the request is passed on to the Dynamic User Registration check in step 5.
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Image 11: Static Password Authentication Flow 3.5.4.2 Self-Assignment A User is able to assign a DIGIPASS device to their DIGIPASS User account using the Self-Assignment mechanism, if permitted by the Policy settings.
Back-end Authentication is a term used to describe the process of checking User credentials with another system. With aXsGUARD Identifier this could mean a RADIUS server or an LDAP-based back-end server. It is used for various purposes, including: Enabling automatic management features such as...
Stored Password Proxy When the Stored Password Proxy setting is enabled in the Policy, and the User authenticates using a DIGIPASS OTP only, the aXsGUARD Identifier retrieves the Stored Static Password from the DIGIPASS User account, which can then be used: for authentication towards a back-end server.
Password Autolearn is enabled, a User may directly log in with their new static password in front of their OTP. If it does not match the static password stored by the aXsGUARD Identifier, it can be verified with the back-end server.
Identifier. After successful authentication on the aXsGUARD Identifier, the stored static password is forwarded to the RADIUS back-end server, and the required RADIUS attributes are retrieved. These attributes are forwarded by the aXsGUARD Identifier to the RADIUS client, which completes the authentication request (see image below).
Back-end Server Records If a back-end server is to be used by the aXsGUARD Identifier for authentication, it must be registered in the aXsGUARD Identifier. It is possible to create more than one back-end server record, for fail-over purposes. You can also allocate different back-end servers for different user domains.
Back-end server records may be configured for use with a specific Domain. This may be useful when multiple back-end servers exist with different groups of User records on each. When the aXsGUARD Identifier needs to choose a back-end server, it searches for records in the domain identified by the User ID and Name Resolution process (see section 3.4.2).
Page 46
RADIUS Authentication is supported by the aXsGUARD Identifier (described above). RADIUS Accounting is is supported by the aXsGUARD Identifier. With a RADIUS back-end server, Accounting requests are forwarded to the back-end server and handled by proxy. Without back-end authentication, audit messages are generated.
Identifier for LDAP back-end authentication are: Microsoft Active Directory Novell e-Directory. These are explained in the following sections. For instructions on how to configure LDAP back-end authentication, please refer to the aXsGUARD Identifier Installation Guide. 3.6.6.1 Microsoft Active Directory Back-end Authentication User ID Formats User ID formats possible with Microsoft Active Directory back-end authentication are shown in the table below.
Page 48
Once the back-end server is identified, binding (i.e. back-end authentication), can be completed using the User ID and password provided with the authentication request: If the bind on the back-end server succeeds, the user authentication on the aXsGUARD Identifier is successful.
Windows 2003 or higher. Note: 1) The 'SAMAccountName' attribute is used by Microsoft Active Directory to identify the User ID. 2) aXsGUARD Identifier only supports SASL.Digest-MD5 binding as the client authentication mechanism for binding with the supported back-end authentication servers. 3.6.6.2...
Page 50
LDAP hierarchy. Only one set of principal name, password and base DN (for binding) can be added in the aXsGUARD Identifier Configuration Tool. This restricts authentication to a single back-end server for Relative Distinguished Names (RDN).
3.6.6.3 Policies Policies are included with aXsGUARD Identifier, which can be used to allow the use of Active Directory or Novell e- Directory. The policies can be selected from the Policies tab of the aXsGUARD Identifier Administration Web interface (see section on the administration interfaces).
For more information, please refer to relevant IIS module documentation. Individual User attributes may be set for a DIGIPASS User account. The aXsGUARD Identifier returns these attributes to the Web Application during authentication, if requested. User Attribute settings are listed in the table below.
User Authentication Process aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 3.8.2 Using a Host Code A DIGIPASS Host Code is computed as follows: The DIGIPASS device generates a One Time Password, and splits it into two parts. The first part is used for end user authentication.
Identifier 3.0.2.0 Product Guide v1.5 Administration Interfaces Overview In chapters 1 and 2 we introduced the VASCO authentication solution and the structure and functionality of the aXsGUARD Identifier. In chapter 3, we have explained the authentication process in depth.
VSC). Backup and Restore: the purpose and procedures for backup and restore functionality are explained in section Auditing and Logging: information generated from the aXsGUARD Identifier can be searched using live viewers (see sections and 9).
Identifier and is intended for use by help desks and system administrators. This interface allows management of: User accounts: each DIGIPASS holder is registered in the aXsGUARD Identifier database, with a DIGIPASS user account. Managing user accounts is explained in section 16.
Administrators to access a limited number of settings through a menu. Note that this is not a TCL (Tool Command Language) Command Line. A TCL Command Line does exist within the aXsGUARD Identifier, but is only accessible by VASCO experts.
First Time Set-up Installation of the aXsGUARD Identifier requires temporarily isolating a client workstation from the network and linking it to the aXsGUARD Identifier, in order to set the aXsGUARD Identifier IP address within the range of the network. This involves: Changing a client workstation IP address to within the specified IP address range for the aXsGUARD Identifier.
Identifier 3.0.2.0 Product Guide v1.5 Configuration Wizard The Configuration Wizard is launched when a new aXsGUARD Identifier Configuration Tool is accessed. The Configuration Wizard must be completed to allow full access to the Configuration Tool, for manual configurations (see below). The wizard guides the system administrator through a minimal number of settings:...
Registration Overview Registration is the process of identifying an issued aXsGUARD Identifier to the VASCO Service Center for the issue of a license key to make the appliance fully operational. After installation, and before registration, the Configuration Tool and Administration Web Interfaces are accessible for configuration and management, but no services, such as authentication, are available.
Identifier will be operational, not the temporary location. After registration, the IP address of the aXsGUARD Identifier can be modified back to the IP address where it will be operational, using manual configuration as explained in section 5.4.
Restoring a backup created by a different appliance requires re-registration. The backup must first be restored, and then re-registration completed. For practical guidance on restoring a backup, please refer to the aXsGUARD Identifier Installation Guide, 'Backup and Restore' section. For an explanation of the concepts of Backup and Restore, please refer to section in this manual.
VASCO Service Center. An available update can be downloaded during the Update Wizard. On completion of the Update Wizard for an on- or off-line update, the aXsGUARD Identifier automatically reboots. During reboot, services are temporarily unavailable. After reboot, the system administrator needs to log back into the Confguration Tool.
The file to be restored is first verified as a valid restore file. The aXsGUARD Identifier needs to be rebooted before the restore is completed. When the file has been restored, feedback on the backup restore is displayed on the Status screen in the Configuration tool.
Image 17: Data Transmission from the Syslog Utility to the Live Log Viewer and Remote Syslog Each component of the Convenience Layer on the aXsGUARD Identifier sends information to the syslog. ('Syslog' is a standard log message system on a Linux server and can forward log messages in an IP network.) The syslog utility handles the information, which can be stored locally or remotely.
Identifier 3.0.2.0 Product Guide v1.5 Local: Live Log Viewer A live log viewer in the aXsGUARD Identifier Configuration Tool allows monitoring of Convenience Layer events. Live log views can be customized to present 'filtered data' using log levels and/or words (see below).
Logging aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Table 8: Log Levels Type Description Critical A system-critical warning that services may not be running. Please follow the support procedure in section 2.8 ) Error Error condition: action required, although services may still be running.
Level at least Click on the drop down menu to select one of the levels, e.g. error or warning. Only logs referencing this level are displayed. For a list of the log levels, please refer to the aXsGUARD Identifier Administration Reference Guide.
10.1 Overview There are two separate sources of information generated on the aXsGUARD Identifier from the Convenience Layer and from the IDENTIKEY component. Information sourced from the Convenience layer supports logging (explained in section 9). Information sourced from the IDENTIKEY component supports reporting and auditing: Reporting provides standard and customized reports based on the data stored in the aXsGUARD Identifier configuration and audit databases.
Auditing aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Table 10: Audit Message Types Type Description Error The message contains details about a system, configuration, licensing or some internal error. Errors do not include normal processing events such as failed logins. Warning Warning messages contain details about potential problems within the system.
Enter an error code. Only records with a matching error code are displayed. For a list of possible error Code contains codes, please refer to the aXsGUARD Identifier Administration Reference Guide. Host contains Enter an IP address. Only records with a matching IP address are displayed.
Statistics aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 CPU time Image 24: CPU Statistics Interface Image 25: Interface Statistics 11.3 Statistics Filtering Filtering specific information from some of the statistics data is also possible. For example, the following two images demonstrate the CPU usage for the Administration Web Interface and a specific service.
The MDC interfaces with a gateway service to send a One Time Password to a User’s mobile phone. The MDC acts as a service, accepting messages from the aXsGUARD Identifier which are then forwarded to a text message gateway via the HTTP/HTTPS protocol. The diagram below illustrates this procedure.
After this time, the connection is automatically closed. This short-term connection offers a window of time during which the VASCO experts can keep the connection open. This means that even if the configuration tool is inaccessible, rebooting the appliance allows the VASCO experts to connect to the appliance for support purposes.
Tracing can be activated by system administrators or VASCO experts using the aXsGUARD Identifier Configuration Tool. If a VASCO expert cannot use the remote support function, the system administrator needs to activate the tracing option in the Configuration Tool, download the tracing information and forward it to the VASCO expert (see the aXsGUARD Identifier Installation Guide for more information).
Configuration Tool and supports automatic creation and LDAP User Synchronization updating of User Accounts on the aXsGUARD Identifier from records stored on an LDAP Server. (Other methods of User Account creation using the Administration Web Interface include creating User Accounts manually,...
Account settings are called source Attributes in the LDAP Server and destination Properties in the aXsGUARD Identifier.) For a full listing and explanations of the fields for LDAP Synchronization Profiles, please refer to the aXsGUARD Identifier Administration Reference Guide, 'Configuration Tool: Field Listings' section.
Synchronization Profile ID. In this case, no account is created and an error is logged (User Accounts must be unique within a domain in the aXsGUARD Identifier: see section 21). The User Account does not exist on the aXsGUARD Identifier. In this case the User Account is created and the Synchronization Profile ID added.
Identifier Property is not updated (i.e. the existing value remains). If a mapped Attribute is present on the LDAP Server with an empty value, the aXsGUARD Identifier Property is updated with the empty value, (i.e. any existing value is overwritten).
With Profile 2, the option to synchronize only User Accounts at one level below the Search Base is configured. Users 1 to 3 are synchronized to the single destination address in the aXsGUARD Identifier hierarchy. Users 4 to 9 are not synchronized and no sub organizational units are created below the Organizational Unit A1 at the destination.
(i.e. as in point 1 above). A User Account on the aXsGUARD Identifier should no longer be updated by a Synchronization Profile. In this case, the Synchronization Profile ID must be removed from the User Account. The ID can be deleted in the Administration Web Interface by navigating to User List, clicking on the User name, User Attributes tab, selecting the ID and clicking on the Delete button (see image below).
Page 89
LDAP User Synchronization aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 For troubleshooting, first consult the Logging, which records errors such as a failed server connection or erroneous Synchronization Profile settings (see section 9). Logs relevant to the synchronization process can be filtered using the name of the program which executes LDAP User Synchronization: 'ldap2ikeyd'.
15.2.1 First and Second aXsGUARD Identifiers The most common, and most basic, replication setup is used when a company has two aXsGUARD Identifiers, allowing a redundant setup in case of hardware failure. Following initial synchronization, all services are identical on both aXsGUARD Identifiers with modified data replicated in both directions.
Replication is configured using a wizard in the aXsGUARD Identifier Configuration Tool. IP addresses of the source and target aXsGUARD Identifiers need to be specified in both: all further configuration is automated with the target becoming a replication of the source aXsGUARD Identifier. Following synchronization, all services are identical on both aXsGUARD Identifiers with modified data replicated in both directions.
Identifier. 2) A third aXsGUARD Identifier cannot be configured as a source when added to a replication setup where two aXsGUARD Identifiers are already replicating. The wizard autodetects that an aXsGUARD Identifier is already replicating and defines this aXsGUARD Identifier as the source.
Replication forwarding is required and activated automatically where more than two aXsGUARD Identifiers are replicating. The ID of the source aXsGUARD Identifier and the target aXsGUARD Identifier(s) to which it is sending the information are added to the replication entry. This allows the receiving aXsGUARD Identifier to check which other aXsGUARD Identifiers have already been sent the replication entry.
The replication status (viewable under the 'System' tab in the Administration Web Interface: see first image below) shows the current status of replication for an aXsGUARD Identifier and the number of entries currently in the replication queue (see second image below).
Identifier 3.0.2.0 Product Guide v1.5 DIGIPASS User Accounts 16.1 Overview All Users requiring authentication with the aXsGUARD Identifier must have their records registered in the aXsGUARD Identifier for: DIGIPASS devices to be assigned to Users User-specific parameters to be stored Privileges to be assigned, and Policy settings to be overruled at a user level.
16.2.2 Importing User Records Multiple User Accounts can be imported into the aXsGUARD Identifier in a comma separated values (.csv) text file through the User/Import screen of the Administration Web Interface. Details for structuring the comma separated values within a text file are listed in the aXsGUARD Identifier Administration Reference Guide, 'Importing users using Comma Separated Value Files' section.
DIGIPASS User Accounts aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 DIGIPASS record Attached to main User account DIGIPASS User DIGIPASS User User Account Link account 1 account 2 User can log into either account using the same DIGIPASS Image 38: User Account Link 16.4...
Only DIGIPASS User Accounts with administrative permissions can use the Administration Web Interface to configure the aXsGUARD Identifier. Administrative privileges are assigned to DIGIPASS User Accounts and therefore a DIGIPASS User Account is needed for each administrator. The default administrative accounts are listed in section 4.2.
17.1 Overview All DIGIPASS instances need to be registered in the aXsGUARD Identifier with relevant data for the aXsGUARD Identifier to support authentication requests which use One Time Passwords generated from the DIGIPASS. Some DIGIPASS settings are pre-programmed into the DIGIPASS devices during manufacture, some are assigned to DIGIPASS through policies and others can be assigned specifically to a DIGIPASS using the DIGIPASS records.
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 PIN Change allows a User to change their PIN as desired. PIN Length can be set for a DIGIPASS device. DIGIPASS Lock sets the number of consecutive faulty PIN entries allowed before the DIGIPASS device is locked.
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 Table 12: Server Settings Regulating Server PINs Setting Explanation PIN Supported Factory default built-in technology to support use of a Server PIN (only active if PIN enabled). PIN Enabled Factory default setting forcing a Server PIN to be used for login (only possible if PIN Supported).
17.3.1 Importing DIGIPASS DIGIPASS records may be imported into the aXsGUARD Identifier via the aXsGUARD Identifier Administration Web interface. Records can either be imported one at a time or many can be imported at one time. The DIGIPASS records to be imported must be downloaded to a file in the .dpx format. The...
This would typically be for time-based Response Only DIGIPASS after a very long period of inactivity. The 'reset' widens the allowable time window for the next login, allowing the User to log in and the aXsGUARD Identifier to calculate the current time shift.
DIGIPASS device and the time recorded on the server, each time a User logs in. This ensures that if either clock drifts from the correct time, an allowance can be made by the aXsGUARD Identifier and the User can still log in.
DIGIPASS device is being used to log in to two separate systems The purpose of this setting is much the same as the Last Time Shift setting – it allows the aXsGUARD Identifier to track any shifts between the event count recorded by itself and the DIGIPASS device.
Account. The User must log in and include the serial number, static password and One Time Password. This informs the aXsGUARD Identifier of the assignment, and provided that the User enters the details correctly, a link is made between the DIGIPASS record and the User Account (see image below). A Grace Period is not used for this method (see section 17.2.3).
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 17.4.1.2 Self-Assignment Data Certain settings and data entry are required for Self-Assignment: The Assignment Mode Policy setting must be Self-Assignment. For Self-Assignment to succeed, the User needs to provide the following: A static password, validated by back-end authentication...
17.4.2 Auto-Assignment The aXsGUARD Identifier can automatically assign an available DIGIPASS record when a DIGIPASS User Account is created using Dynamic User Registration (DUR). The correct DIGIPASS device must then be delivered to the User. A Grace Period is typically set, which allows a number of days in which the User may still log in using only their static password.
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 17.4.3 Manual Assignment A selected DIGIPASS record is manually assigned to a specific DIGIPASS User Account. The DIGIPASS device must then be sent out to the User. A Grace Period is typically set, during which the User may still log in using only their static password.
Image 42: Reserving a DIGIPASS Record for a Specific User in the Administration Web Interface Note: For readers who are also familiar with the VASCO product aXsGUARD Gatekeeper (www.axsguard.com), please note that the DIGIPASS-User Account relationship varies between the two products. With the Gatekeeper product, a DIGIPASS record can be assigned to multiple User Accounts, although only one DIGIPASS record is possible per User Account.
Component: MDC) and an account with the gateway. The MDC will need configuration information for the gateway and the Username and password for the account. Your VASCO supplier can assist with this process. Further information regarding configuration of the MDC is available in section 12 .
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 17.5.4 Implementation Decision Several factors need careful consideration before implementing a Virtual DIGIPASS system: Cost: your company will probably need to pay an amount for each text message sent. In some countries, mobile phone owners may need to pay an amount for each text message received on their mobile phones.
Page 114
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 DIGIPASS device again, the administrator must reset the time period to allow re-use of the Backup Virtual DIGIPASS. Max. Uses/User: set a maximum number of times a User may request an OTP using the Backup Virtual DIGIPASS.
DIGIPASS aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 17.5.6 Backup Virtual DIGIPASS Guidelines for Use Some questions to guide implementation of Backup Virtual DIGIPASS are: Will any users have access to Backup Virtual DIGIPASS? If so, will all users have access to Backup Virtual DIGIPASS?
18.1 Overview Each application in the network which needs to access aXsGUARD Identifier services, must be registered on the aXsGUARD Identifier as a client component for access to be allowed. Client component registration also specifies the applicable policy for handling a request. More information regarding client component and policy verification during an authentication attempt is available in section 3.
Identifier 3.0.2.0 Product Guide v1.5 Caution Modifying the IP address of the aXsGUARD Identifier in the Configuration Tool, results in the creation of a new administration program client component record. The older records can be erased: however, do not erase the client component configured for the current IP address, because this prevents access to the Administration Web interface.
18.3.2 IIS Module A Component record is required for any IIS Modules used with aXsGUARD Identifier. The Component record is checked whenever the IIS Module sends an authentication request to the aXsGUARD Identifier. For an IIS Module Component the following component checks are made:...
19.1 Overview Each aXsGUARD Identifier in your setup needs to be licensed to be operational. To verify whether a valid license is present, a server component needs to be registered for the aXsGUARD Identifier to which its license can be assigned.
A server component holds the License Key for a specific aXsGUARD Identifier. This component record is checked for a valid license when the aXsGUARD Identifier is started. If the License Key is missing, invalid or expired, the Configuration Tool and Administration Web Interfaces are accessible for configuration and management, but no services, such as authentication, are available.
20.3 Policy Inheritance Many Policies are already provided in the aXsGUARD Identifier. Amongst these, the 'Base Policy' can be used as a starting template, from which to adapt certain settings for new policies. This concept is called Policy inheritance. Policies may be set up in a hierarchy, where one Policy inherits most of its attributes from a parent Policy, but with some modifications for a slightly different scenario.
21.1 Overview User Accounts and DIGIPASS records can be grouped in the aXsGUARD Identifier using two structures: domains and Organizational Units, which are managed using the aXsGUARD Identifier Administration Web interface. In this section, we first introduce aXsGUARD Identifier domains and Organizational Units, and their similarities and differences.
DIGIPASS User Accounts and DIGIPASS records are created in the Master Domain. The Master Domain serves three important purposes: for initial access and configuration of the aXsGUARD Identifier. Two system administrators exist on the Master Domain, one for system operation, which should never be removed, and one for the aXsGUARD Identifier system administrator (see section 4.4).
User ID = 'martin', the resulting user ID is 'martin' while the domain is 'Master', because the factory default aXsGUARD Identifier does not have a default domain configured in the policies. User ID = 'martin@mycompany.com': the resulting user ID is 'martin' while the domain is 'mycompany.com'.
Master Domain being used when a domain name cannot be found in the aXsGUARD Identifier. The default domain needs to be configured in the Base Policy of the aXsGUARD Identifier. All policies below the Base Policy automatically inherit this setting. (Changes to the default domain setting in any policy are inherited by child policies unless overruled;...
Location of DIGIPASS Records When searching for an available DIGIPASS record for a device to assign to a user, the aXsGUARD Identifier first searches in the same Organizational Unit as the User Account, if the User Account belongs to an Organizational Search Upwards in Organizational Unit hierarchy Unit.
Image 47: DIGIPASS Record Location – Domain Root In the diagram above, the aXsGUARD Identifier searches upwards through the Organizational Unit structure for an available DIGIPASS record to assign to a DIGIPASS user in the Organizational Unit B1. Because no available DIGIPASS records are found in B1, it searches in B, then in the Domain Root.
Page 130
Organizational Units. Image 48: DIGIPASS Record Location – Parent Organizational Unit In the diagram above, the aXsGUARD Identifier can search in the parent Organizational Unit for available DIGIPASS records. The administrator account manually assigning the DIGIPASS records must belong to the parent Organizational Unit.
Page 131
DIGIPASS records are found in the Organizational Unit, and the Search Upwards in Organization Unit hierarchy option is enabled, the aXsGUARD Identifier will search upwards to the Domain Root and search in the DIGIPASS Pool for an available, unassigned DIGIPASS record.
22.1 Overview There are two separate sources of information generated on the aXsGUARD Identifier from the Convenience Layer and from the IDENTIKEY component. Information sourced from the Convenience layer supports logging (explained in section 9). Information sourced from the IDENTIKEY component supports auditing and reporting: Auditing can be managed through the aXsGUARD Identifier Configuration Tool (see section Administration Interfaces) using the live audit viewer.
Reports can be generated to count the number of authentication requests per user or organizational unit. Standard reports are provided in the aXsGUARD Identifier for the most common adminstration tasks. For a list of the standard reports available please refer to the the aXsGUARD Identifier Administration Reference Guide.
Year 22.3.3 Data Source Reports are generated from data available on the aXsGUARD Identifier: audit data, the Data Store, or both. Data Source possibilities are as follows: Users: this generates a report based on the User information from the aXsGUARD Identifier Data Store.
Two or more values after the operator are interpreted as if the word 'and' was between them. For more information on the data fields and operators available for building queries, please refer to the aXsGUARD Identifier Administration Reference Guide.
Reporting aXsGUARD Identifier 3.0.2.0 Product Guide v1.5 22.3.7 Formatting Templates Report data is always generated into XML, then an XSLT transformation is applied to give the output. The XSLT transformation requires a formatting template. Each report definition requires at least one template so that it can be produced in the format required.
This requires configuration specific to the operating system of the workstation or laptop computer. For instructions on how to connect to the Rescue Tool, please refer to the aXsGUARD Identifier Installation Guide. 23.3...
Need help?
Do you have a question about the aXsGUARD and is the answer not in the manual?
Questions and answers