Configuring Double-Source Authentication

You can prevent the storage of one-time passwords in cache, which forces the user to enter their cre- dentials again.

To prevent caching of one-time passwords

1In the Administration Tool, click the Authentication tab.

2Open the authentication realm that uses the one-time password.

3 Select Use the password one time and click Submit.

Configuring Double-Source Authentication

The Firebox SSL VPN Gateway supports double-source authentication. On the Authentication tab, you can configure two types of authentication, such as LDAP and RSA SecurID for one realm. When users log on to the Firebox SSL VPN Gateway using a Web browser, and double-source authentication is config- ured, they are redirected automatically to a logon Web portal page. There, they type in their user name and passwords for each type of authentication. If they are using the Secure Access Client to log on, the Secure Access dialog box appears requesting the same information as the Web page.

There can be a mix of double-source authentication realms. For example, you can have one or more realms for single authentication and then have one or more realms configured for double-source authentication. In a mixed authentication environment, when users log on using either the Web browser or Secure Access Client, they will see two password fields. If they are logging on using only one authentication method, the second password field is left blank.

For more information about logging on using the Web-based portal page, see “Double-source Authen- tication Portal Page” on page 43.

To create and configure a double-source authentication realm

1On the Authentication tab, click Authentication.

2 In Realm Name, type a name.

3 Select Two Source and then click Add.

4In the Select Authentication Type dialog box, select the authentication types in Primary Authentication Type and Secondary Authentication Type.

5Click Add.

6On the Primary Authentication tab, configure the settings for the first authentication type and click Submit.

7On the Secondary Authentication tab, configure the settings for the second authentication type and click Submit.

8On the Authorization tab, in Authorization Type, select the authorization type you want to use, configure the settings, and click Submit.

Double-source authentication works in reverse of how it is configured on the Firebox SSL VPN Gateway. For example, if you configured RSA SecurID on the Secondary Authentication tab and LDAP on the Primary Authentication tab, when users log on, they type their LDAP password in the first password field and the RSA SecurID personal identification number (PIN) and passcode in the second password field. When users click Connect, the Firebox SSL VPN Gateway authenticates using the RSA SecureID PIN

Administration Guide

85

Page 95
Image 95
WatchGuard Technologies SSL VPN manual Configuring Double-Source Authentication, To prevent caching of one-time passwords

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.