nFactor for gateway authentication 编辑

nFactor for gateway authentication

nFactor authentication enables a whole new set of possibilities regarding authentication. Administrators using nFactor enjoy authentication, authorization, and auditing flexibility when configuring authentication factors for virtual servers.

Two policy banks or two factors no longer restrict an administrator. The number of policy banks can be extended to suit different needs. Based on previous factors, nFactor determines a method of authentication. Dynamic login forms and on-failure actions are possible by using nFactor.

Important

  • Starting from release 13.0 build 67.x, nFactor authentication is supported with Standard license only for Gateway/VPN virtual server. In Standard license, the nFactor visualizer GUI cannot be used to create the EPA in the nFactor flow. Also, you cannot edit the login schema, but must use the out-of-the-box login schema as-is.
  • For Citrix ADC to support nFactor authentication, an Advanced license or a Premium license is required. For more information about nFactor authentication with Citrix ADC, see nFactor authentication.

Authentication, authorization, and auditing feature licensing requirements

The following table lists the licensing requirements for the available authentication, authorization, and auditing features.

 Standard LicenseAdvanced LicensePremium License
LOCAL authenticationYesYesYes
LDAP authenticationYesYesYes
RADIUS authenticationYesYesYes
TACACS authenticationYesYesYes
Web authenticationYesYesYes
Client cert authenticationYesYesYes
Negotiate authenticationYesYesYes
SAML authenticationYesYesYes
OAuth authenticationNoYesYes
Native OTPNoYesYes
Email OTPNoYesYes
Push notification for OTPNoNoYes
Knowledge based question and answer (KBA authentication)NoYesYes
Self service password reset (SSPR)NoYesYes
nFactor VisualizerYesYesYes

Note

  • For steps to configure nFactor for the Citrix ADC Standard License, see the section Create a Gateway virtual server for nFactor authentication in Citrix ADC Standard license.
  • Only a non-addressable authentication, authorization, and auditing virtual server can be bound to a Gateway/VPN virtual server in Citrix ADC Standard license.
  • Customization of LoginSchema is not allowed in the Citrix ADC Standard license. The nFactor support is basic with only default and already added login schemas that come with the appliance. The administrator can use them in their configurations, but they cannot add a login schema. Hence the GUI option is disabled.

Use cases

nFactor authentication enables dynamic authentication flows based on the user profile. Sometimes, the flows can be simple and intuitive to the user. In other cases, they can be coupled with securing active directory or other authentication servers. The following are some requirements specific to Gateway:

  1. Dynamic user name and password selection. Traditionally, the Citrix clients (including Browsers and Receivers) use the active directory (AD) password as the first password field. The second password is reserved for the One-Time-Password (OTP). However, to secure AD servers, OTP is required to be validated first. nFactor can do this without requiring client modifications.

  2. Multi-Tenant Authentication End-point. Some organizations use different Gateway servers for Certificate and non-certificate users. With users using their own devices to log in, user’s access levels vary on the Citrix ADC appliance based on the device being used. Gateway can cater to different authentication needs.

  3. Authentication based on group membership. Some organizations obtain user properties from AD servers to determine authentication requirements. Authentication requirements can be varied for individual users.

  4. Authentication co-factors. Sometimes, different pairs of authentication policies are used to authenticate different sets of users. Providing pair policies increases effective authentication. Dependent policies can be made from one flow. In this manner, independent sets of policies become flows of their own that increase efficiency and reduce complexity.

Authentication response handling

The Citrix Gateway callback registers handle authentication responses. AAAD (authentication daemon) responses and success/failure/error/dialogue codes are feed to the callback handle. The success/failure/error/dialogue codes direct Gateway to take the appropriate action.

Client support

The following table details configuration details.

ClientnFactor SupportAuthentication Policy Bind PointEPA
BrowsersYesAuthenticationYes
Citrix Workspace appYesVPNYes
Gateway Plug-inYesVPNYes

Note:

  • Citrix Workspace app supports nFactor authentication for the supported operating systems from the following listed versions.
    • Windows 4.12
    • Linux 13.10
    • Mac 1808
    • iOS 2007
    • Android 1808
    • HTML5: Supported through Store Web
    • Chrome: Supported through Store Web

Command line configuration

The Gateway virtual server needs an authentication virtual server named as an attribute. Virtual server name as an attribute is the only configuration required for this model.

add authnProfile <name-of-profile> -authnVsName <name-of-auth-vserver>
<!--NeedCopy-->

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:7 次

字数:8554

最后编辑:7 年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文