Integration Guide
Contents
Related Downloads
This agent is required if you are installing SecurAccess and it is required to directly authenticate upon a Windows PC or a Windows server. This agent is also required if you are using SecurPassword and requires a Self-Service Password Reset (SSPR) solution directly from a Windows PC or a Windows server. A setup and MSI file are included to cater for standalone and Group Policy installation.
This agent utilizes the HTTP(S) protocol to communicate from the SecurEnvoy Windows logon agent SecurEnvoy SecurAccess server.
SecurEnvoy Windows Login Agent
Note For SecurAccess ONLY operation with the Windows Logon Agent (WLA), existing v6 WLA clients are supported, but this will not support the new VOICE token. Note this agent is only required for SecurAccess and SecurPassword. For SecurPassword via the WLA, this MUST be upgraded at the same time as the SecurEnvoy Security Server is upgraded to v7.Supported Microsoft Versions: –
Supported Token Types
Prior to installing the SecurEnvoy Windows Login Agent, it is essential that there is a network connection via https (or http if the network is trusted) between the Windows Login Agent and the security server.
Confirm this is true by browsing to the following:
https://[my Security Server]/secserver
example https://www.abc.com/secserver
You should get the following returned: “ERR, Unknown Flag”
Agent Functionality
All existing Microsoft logon capabilities are preserved; the SecurEnvoy agent provides a second factor of authentication via HTTP(S) using a 6-digit passcode sent to the end user.
The SecurEnvoy Windows login Agent has the following functionality:
Installing and Configuring the SecurEnvoy Windows Login Agent (Standalone installation)
Pre-requests:
Http(s) connectivity must exist from each PC or server and the each SecurEnvoy Security server.
To install the SecurEnvoy Windows Login Agent run
“SecurEnvoy Windows Login Agent\setup.exe” Click “Next” to continue.
The following page is displayed.
The configuration utility will run automatically. Populate details for:
Security server address and whether HTTPS is required. Select options for configuration
These are:
Authentication group:
Select group for which users should provide a 2FA to logon. Debug, provides debug output to c:\debug\
Emergency Access: set an account that can be used for when Server client communication has failed. Strings: This allows configuration and customization of all user prompts.
Connections: By default, the Windows Login agent protects both Console and the default RDP port. If you would like only external users to be authenticated with 2FA, a custom port can be specified.
Click the “Add” button within the connections dialog.
Enter a port number that external users will be forced to use and click “Answer”
If you would like only external users to have 2FA, Uncheck Console and 3389(default). This ensures only external users will be 2FA
NoteConfigure your firewall to use Network-Address-Translation (NAT) regarding all RDP requests on port 3390 from the external network. NAT should be configured to transfer all RDP requests from port 3389 to port 3390. This means that all external RDP requests will connect to the target machine using the new custom RDP Listener.To check that all parameters are correct, click the “Test” button for each configured SecurEnvoy server, the following screen will be shown.
Enter the UserID and passcode and click “login”.
Click “Exit” when finished testing
Click “Finish”
Click “Yes” to reboot
Installing and Configuring the SecurEnvoy Windows Login Agent (Group Policy Install)
This is a Microsoft configuration of Active Directory; please see the following web link for full information. http://support.microsoft.com/kb/816102
Prior to completing the Group Policy install, it is required that a standalone installation is completed; this will allow all configurations settings to be exported and saved to the MSI package.
On the test installation PC, install the SecurEnvoy Windows login Agent as described on Page 5, once completed the configuration settings can be exported. Run Regedit and Navigate to: HKLM\software\SecurEnvoy Right mouse click and select export, save the file as config.reg.
Copy this file to the MSI package and replace the config.reg file that exists under:
MSI Package\Program Files\SecurEnvoy\Windows Login Agent
The MSI Package is now ready for a Group Policy Install.
NoteIt is recommended that the SecurEnvoy Windows login Agent should be applied on a computer basis.Windows 2008 R2, 2012 R2 & 2016 Server Create a Distribution Point
To publish or assign a computer program, you must create a distribution point on the publishing server: Log on to the server computer as an administrator.
Create a Group Policy Object
To create a Group Policy object (GPO) to use to distribute the software package:
User invokes CTRL ALT DEL to initiate the logon sequence
Windows Credential provider
User enters UserID, domain password
User can access the SecurEnvoy Windows login Agent from the “Start All programs menu” or using Windows search:
The following programs can be searched/selected; this requires Administrative permissions to achieve these tasks.
Config This executes the Config utility program, all settings can be configured, these are described on Page 5.
Disable This will disable the SecurEnvoy Windows Login Agent, a reboot is required to confirm change, user will now authenticate with a Microsoft login.
Enable This will enable the SecurEnvoy Windows Login Agent, a reboot is required to confirm change, user will now authenticate with a SecurEnvoy 2FA login.
SecurEnvoy Windows Login Agent has the ability to allow an “Emergency Access account” which will allow logon with a UserID and password. This account must be either a Domain or local account upon the machine. This can be used when client/server communication has failed due to network, interface card or server issue.
The following screen shot will be displayed to indicate a timeout issue.
Access can then be gained by logging in with the emergency access account that was previously setup in section 1.4.
SecurPassword allows a user to reset their Microsoft Domain password using Two Factor Authentication. In addition to the passcode, up to three attributes of data can be used to help validate the authentication request for a password reset. Also, the user can use security questions that were answered within the enrolment process. Any data that is held within the Directory Server can provide further checks to the user’s credentials. Attributes like employee number, department etc can provide additional authentications parameters.
To enable SecurPassword it must be first enabled upon the SecurEnvoy Security server, as such a valid license must be installed. Enable the Allow SecurPassword checkbox must be ticked. The only decision is to either use existing attributes to check for authentication, or use the security questions a user has enrolled with
User can be automatically sent a “Password expiry warning” via SMS, this feature will send out a SMS warning message at x days before their user password expires. (Default is 7 days). These settings are configured upon the SecurEnvoy Security server(s).
To enable the SecurEnvoy Windows Login Agent to support SecurPassword, run the configuration utility and tick the SecurPassword checkbox. Click OK when complete.
For standalone installations this will have to be completed for all machines that have the SecurEnvoy Windows Login Agent that require SecurPassword.
To enable the SecurEnvoy Windows Login Agent to support SecurPassword via a Group Policy install.
A new config.reg file must be created, once completed the package can be redeployed with the updated config.reg file.
Domain password reset, using existing AD information. The system can be setup so that existing AD information can be used to reset the domain password. Within the SecurEnvoy Admin GUI select “config” and then go to the SecurPassword settings.
When “secret questions” is un-ticked it will prompt for exiting AD attributes and a prompt to be assigned. In addition, the user can be reminded by a SMS alert that their password is about to expire, the default alert time is 7 days.
Note Up to three questions can be set up, although only two are shown in the admin GUI, the third question can be set up directly within the server.ini file.The Windows password can be reset by the user selecting the “Reset” link on either the GINA or the Credential provider login.
When the user selects the reset password link they will then be prompted to reply with answers as shown below:
If a Domain password policy is in force, the Gina or credential provider will display what components are required to make a good password.
When a user responds with the relevant component i.e. Upper-case letter or numeric, the requirements that have been met will then be grayed out.
Note The Password complexity prompt within the GINA or credential provider requires that the LDAP base is set. This can be configured directly within the server.ini file.Domain password reset, using SecurEnvoy secret questions. The system can be setup so that the user enrols at https://securenvoy-server/secenrol and selects two security questions existing and provides relevant answers.
Within the SecurEnvoy Admin GUI select “config” and then go to the SecurPassword settings box.
When “secret questions” is ticked the user will respond with a security questions answer. Only one security question is used and these questions are then cycled each time one it used.
In addition, the user can be reminded by a SMS alert that their password is about to expire, the default alert time is 7 days.
The Windows password can be reset by the user selecting the “Reset” link on either the GINA or the Credential provider login.
When the user selects the reset password link they will then be prompted to reply with answers as shown below:
If a Domain password policy is in force the Gina or credential provider will display what components are required to make a good password.
When a user responds with the relevant component i.e. Upper-case letter or numeric, the requirements that have been met will then be grayed out.
Note The Password complexity prompt within the GINA or credential provider requires that the LDAP base is set. This can be configured directly within the server.ini file.To support users who are required to work in an offline state, the following are required:
Setup the SecurEnvoy server to support offline passcodes for a Soft Token.
Launch the Admin GUI, Config then select Admin GUI options.
Select the domain you wish to work with and finally select the checkbox “Display Off-line Laptops”.
Once complete then select the user(s) that require this setup, within the user profile.
Select the checkbox “Off-line Laptop” Click update when complete
This MUST be competed for all users who require Off-Line passcodes support for a Soft Token.
Users have exactly the same experience as if they were logging on in a connected state. The local machine will validate the passcode.
If there is any clock drift, the user is presented with a “Next Token Code” prompt.
The user is simply presented to enter in the next token passcode displayed upon their device.
Windows Credential provider
User enters UserID, domain password.
If the user is configured for 2FA the following screen prompt is shown, otherwise the user is granted access to the domain.