Rsa Securid Access Cloud Authentication Service Quick Setup Guide Radius Clients
Rsa Securid Access Cloud Authentication Service Quick Setup Guide Radius Clients
Clients
This guide helps you quickly set up your production deployment for the Cloud Authentication Service and add
authentication for a RADIUS client.
Use this guide in conjunction with the Planning Guide. If you have completed a deployment with another Quick
Setup Guide and want to set up the deployment described in this guide, skip the steps that you have already
completed.
Step 1: Plan
There are a few things you need to plan to deploy your system.
l Virtual CPUs: 4
l Network interface:
l VMware: Two E1000
virtual network adapters
or
l Microsoft Hyper-V: Two
synthetic network
adapters
Software requirements:
l VMware or
l VMware Platform:
VMware ESXi 5.5 or later
(currently 6.x series)
l VMware vSphere Client:
Any version that works
with the supported ESXi
deployments
l Hyper-V 2012 R2
Amazon Virtual Server Instance
hardware requirements:
2
Item Description
Create a group of a limited number of
users (for example, RSA SecurID
Microsoft Active Directory 2008 or 2012 or LDAPv3 directory server
Access Test Group) to synch and test
with.
Used for an encrypted connection
(LDAPS) to your directory server.
l The Cloud Authentication Service is a cloud service that provides an easy-to-use Cloud
Administration Console and powerful identity assurance engine.
l The identity router is a virtual appliance that securely connects your on-premises resources, such as
Active Directory, and the Cloud Authentication Service. You can deploy the identity router in your on-
premises VMware or Hyper-V environment, or in the Amazon Web Services (AWS) cloud.
In AWS deployments, the identity router has one network interface to which you assign public and
private IP addresses and connect other network resources from the internet or your private network.
In VMware and Hyper-V deployments that deploy the SSO Agent, the identity router has two network
interfaces. Place one interface in a public-facing network and the other in a private network where it can
reach your LDAP directory.
In all other VMware and Hyper-V deployments, the identity router has one network interface. Place this
interface in a private network where it can reach your LDAP directory. For more information about
configuring your system to use these interfaces, see https://community.rsa.com/docs/DOC-54091.
Note: After an identity router is registered in a deployment, it cannot be reused in another deployment.
For example, suppose you registered an identity router with Company A for a trial deployment, and you
want to use the same identity router with Company A in a production deployment. You must add a new
identity router (virtual machine) to the production deployment.
Add your values to the following worksheet. You will use this information in the next section and during setup.
3
Item Your Values
l EMEA region: <authentication_service_
___domain>, access-eu.securid.com
(104.40.223.169, 40.127.204.94)
l ANZ region:<authentication_service_domain>,
access-anz.securid.com (20.36.34.174,
20.36.64.73)
l IP address
l FQDN
l Base DN of users (the root where users will be
synchronized from, for example,
DC=company, DC=com)
l Administrator account credentials that RSA
SecurID Access can use to connect to the
directory server
DNS servers IP addresses
l IP address
l Netmask
4
Item Your Values
l Gateway
l Short hostname
l FQDN
Identity router proxy interface (public, required for
SSO Agent deployments with on-premises identity
router)
l IP address
l Netmask
l Gateway
l Short hostname
l FQDN
Required only for Amazon Web Services identity router deployments:
Identity router
l Private IP Address
(Used for communication with internal
resources in the same VPC, another VPC, or
your on-premises network.)
l Public Elastic IP Address
(Used for communication with public
resources over the internet if the identity
router is in a public subnet. Not required if a
NAT/load balancer with a public IP address
manages traffic to the identity router.)
l Short hostname
l FQDN
l VPC
l Private subnet
l Public subnet
l DHCP options set
l Route tables
l Security groups
l Network ACLs
Connectivity Requirements
Replace the values in the table below with your values from the table above. This table identifies the connectivity
requirements that you might need to provide to your IT group to update firewall rules for your network. If you
deploy the identity router in the Amazon cloud, the route tables, security groups, and network ACLs in your AWS
environment must also allow these connections. Update your connectivity settings before continuing with the
next step.
5
Protocol
Source Destination Purpose
and Port
0.0.0.0/0 Both Cloud Authentication Service External user access to Cloud
TCP 443
environments Authentication Service
On-
premises
For on-premises identity routers: (two
network
interfaces):
< Your <Your identity router management
administrators> interface IP address> TCP 443 Identity Router Setup Console
TCP 9786
For on-premises
identity routers
(two network
interfaces):
<Your identity
router proxy
interface IP Cloud Administration Console and both
address> Cloud Authentication Service
environments
For on-premises
identity routers Note: If your company uses URL
(one network filtering, be sure that
interface): *.access.securid.com,
TCP 443 Identity router registration
*.auth.securid.com, and the Cloud
<Your identity Authentication Service IP addresses for
router your region are whitelisted. Also,
management confirm that you can access both
interface IP environments. For instructions, see
https://community.rsa.com/docs/DOC-
address>
79579.
For identity
routers in the
Amazon cloud:
<Your identity
router private IP
address>
For on-premises
identity routers:
<Your identity
router
<Your LDAP directory server IP LDAP directory user authentication and
management TCP 636
address> authorization
interface IP
address>
For identity
routers in the
6
Protocol
Source Destination Purpose
and Port
Amazon cloud:
<Your identity
router private IP
address>
For on-premises
identity routers:
<Your identity
router proxy
interface IP
address or
identity router
management <Your DNS server IP address>
interface IP UDP 53 DNS
address>
For identity
routers in the
Amazon cloud:
<Your identity
router private IP
address>
For on-premises identity routers:
<Your RADIUS
client IP <Your identity router management
<Your identity
router proxy
interface IP
address or
identity router
management
interface IP <Your NTP server IP address> UDP 123 Network time server synchronization
address>
For identity
routers in the
Amazon cloud:
<Your identity
router private IP
address>
7
Protocol
Source Destination Purpose
and Port
For identity routers in the Amazon cloud:
3. On the Identity Routers page, click Add an Identity Router, and follow the instructions.
Under Registration Details, copy the Registration Code and Authentication Service Domain to a
___location where you can access them later on.
4. Click Close.
Or you can use Hyper-V Manager or Amazon Web Services EC2 to create a virtual machine for the identity
router.
Procedure
1. In the Cloud Administration Console, click Platform > Identity Routers.
2. Click Download Identity Router Image and do one of the following:
l For VMware, click Download OVA Image for VMware, and save the image to a ___location
accessible by VMware.
l For Hyper-V, click Download VHD Image for Hyper-V, and save the image to a ___location
accessible by Hyper-V.
l For Amazon Web Services:
a. Click Access AMI Image for Amazon.
b. Enter your AWS Account ID.
c. Click Update AMI Access.
d. Note the values in the Identity Router AMI Name and AWS Regions with AMI
8
Access fields. You can search the AWS private images catalog using these value to
quickly locate the AMI.
a. Follow the VMware client documentation to install the virtual appliance from the image.
When prompted, enter the following data:
l To use Hyper-V Manager, sign into Hyper-V Manager, and do the following:
b. Follow the wizard. In each dialog box, provide the following information.
c. To configure the second network, select the new virtual machine, right-click, and select
Settings .
d. On the Add Hardware page, select Network Adapter and click Add.
e. Select the network for your proxy interface, then click Apply and OK.
f. Select the new virtual machine from the list of virtual machines. Right-click and select
Start.
g. With the virtual machine selected, right-click again and select Connect.
l To use Amazon Web Services, sign into Amazon EC2 and follow the documentation provided by
Amazon to do the following:
a. Make sure your AWS environment includes a VPC which meets the following
requirements:
l Private and public subnets are configured according to your deployment
9
requirements.
l Route tables, security groups, and network ACLs are configured to allow
necessary traffic to and from the other network resources in your deployment,
such as users and identity sources.
l All DNS servers required for your deployment are specified in the DHCP options
set.
Note: This procedure is not required for identity routers in the Amazon Web Services cloud.
10
Procedure
1. Connect to the identity router using your VMware or Hyper-V management client.
2. Sign into the Identity Router VM Console:
Username: idradmin
Password: s1mp13
You are prompted to change these credentials the first time you sign in.
3. Refer to the planning worksheet for the values to complete the Management, Proxy, and DNS
sections.
Use the Up and Down arrows to navigate the main menu. Press Enter to select a menu option or
configure its settings. Use Tab and Shift + Tab to navigate between settings and back to the main menu.
When the cursor is in the settings panel, press F10 to save or Esc to revert. Press F10 after you
complete each section to save your values.
4. Select Commit in the left-hand frame to save the network configuration settings.
Username: idradmin
Password: s1mp13
You are prompted to change these credentials the first time you sign in.
3. Add any DNS servers that you did not add in the Identity Router VM Console.
Note: These DNS server settings do not apply for identity routers in the Amazon cloud. Edit the DHCP
option set in your Amazon Web Services environment if you need to add DNS servers for an Amazon
cloud-based identity router.
11
8. Click Submit.
A confirmation message appears when the identity router is connected to the Cloud Administration
Console. Also, note that the Identity Router Setup Console contains other pages that provide network
diagnostics and detailed logs for the identity router.
9. Sign into the Cloud Administration Console to check the status of the identity router (Platform >
Identity Routers).
When the identity router is connected to the Cloud Administration Console, the status reads Active. This
process usually takes up to five minutes.
10. In the Cloud Administration Console, click Publish Changes to apply the configuration settings for the
new identity router.
Procedure
1. In the Cloud Administration Console, click Platform > Clusters.
2. Select Edit from the drop-down menu next to the cluster.
3. Select the Enable the RADIUS service on all identity routers in the cluster checkbox.
4. Click Save and Finish.
5. Click Publish Changes.
5. In the Directory Servers section, add each directory server in the identity source, and test the
connection.
6. Click Next Step.
7. On the User Attributes page, click Refresh Attributes, and verify that a valid list of attributes appears.
8. Select Use selected policy attributes with the Cloud Authentication Service.
12
9. In the Policies column, select sAMAccountName, virtualGroups, and memberOf or other attributes
that you might use to identify users.
11. In the User Search Filter field, specify your test group using a filter. The following is an Active
Directory example:
(&(objectCategory=Person)(sAMAccountName=*)(objectClass=user)(mail=*)
(memberOf=<yourgroup_distinguishedName>))
During synchronization, users are added and attribute values that you selected in the previous step are copied
to the Cloud Authentication Service. User passwords are not synchronized.
Procedure
1. In the Cloud Administration Console, click Users > Identity Sources.
2. Next to your identity source, select Synchronization from the drop-down menu.
Depending on the number of users you are synching, this process can take a number of minutes.
Create an access policy that you will assign to RSA SecurID Access My Page (a web portal used for device
registration) when you configure it. For simplicity, this access policy will not require additional authentication of
users. You can change this policy in the future.
13
3. Click Add a Policy.
4. Enter the name (for example, No Additional Authentication), and select the identity source.
RSA SecurID Access My Page is a web portal that helps provide a secure way for users to complete RSA SecurID
Authenticate device registration, using multifactor authentication and QR or numeric registration codes.
2. Enable My Page.
4. In the Primary Authentication Method drop-down list, select the authentication method to use.
14
5. In the Access Policy for Additional Authentication drop-down list, select the No Additional
Authentication policy that you created earlier.
6. Click Save.
Configure a RADIUS client to be protected by RSA SecurID Access. In the wizard, select the preconfigured policy
All Users Low Assurance Level as the access policy.
For example, for instructions for configuring Cisco Adaptive Security Appliance, see this. For instructions for all
supported RADIUS clients, see the RSA SecurID Access category on RSA Ready.
Step 8: Test
c. Enter your RSA SecurID passcode or password, depending on what you configured.
2. On another device ( iOS, Android, or Windows 10 ), download the RSA SecurID Authenticate app:
c. Allow or deny Google Analytics data collection. You can select either option to use the
Authenticate app.
15
h. Tap OK after setup is complete.
j. The app home screen appears, and the app is ready for use.
8. The My Page home screen displays. You have successfully registered and tested your device.
16
Support and Service
You can access community and support information on RSA Link at https://community.rsa.com. RSA Link
contains a knowledgebase that answers common questions and provides solutions to known problems, product
documentation, community discussions, and case management.
RSA provides you with a unique identifier, called the Customer Support ID, which is required when you register
with RSA Customer Support. To see your Customer Support ID, sign in to the Cloud Administration Console and
click My Account > Company Settings.
Trademarks
RSA, the RSA Logo, SecurID, and EMC are either registered trademarks or trademarks of Dell Inc throughout the
world. All other trademarks used herein are the property of their respective owners. For a list of RSA
trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
17