Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This article describes how to enable Nexus OTP in Nexus Hybrid Access Gateway as two-factor authentication method for SafeInspect, to replace static passwords.

Nexus OTP can be either Nexus TruID Synchronized or Nexus Personal Mobile OTP, or any other OATH-based mobile OTP application, such as Google Authenticator or Microsoft Authenticator. 

With the setup described in this article, Nexus Hybrid Access Gateway functions as a RADIUS server and SafeInspect as a RADIUS client. Nexus TruID is used as an example below and is available for iOS, Android, and Windows.


Expand
titleNetwork schematic for Nexus OTP authentication

Image Removed

Network schematic with Nexus TruID Synchronized as an example.

  1. The end user starts the TruID client and enters the PIN in TruID to generate an OTP.
  2. Cyberoam request the end user to enter username, password and OTP.
  3. The end user enters username, domain password and OTP.
  4. The domain credentials are validated by the Active Directory.
  5. The OTP authentication request is relayed to Hybrid Access Gateway Authentication Server via RADIUS.
  6. The authentication server validates the OTP with the associated TruID token and PIN from the user database.
  7. Upon successful validation, the authentication server responds with successful authentication to Cyberoam.

Cyberoam provides access to the end user.

Prerequisites

Expand
titlePrerequisites

Make settings in Hybrid Access Gateway

Expand
titleLog in to Hybrid Access Gateway administration interface
  1. Log in to the Hybrid Access Gateway administration interface with your admin user.


Expand
titleAdd SafeInspect as a RADIUS client


Note
In step 3, enter the IP Address of the RADIUS Client (SafeInspect) and the Shared Secret Key.

Insert excerpt
Set up RADIUS client
Set up RADIUS client
nopaneltrue


true, see Set up Personal authentication.


Expand
titleEnable authentication method

Nexus TruID Synchronized Personal Mobile is used as an example. Other Nexus OTP authentication methods are enabled in a similar way.

Note
  • In step 3, select Nexus Synchronized as method.
  • When the default RADIUS replies are shown, click Next. You can also add your custom RADIUS replies or modify the default replies if required.

Insert excerpt
Set up authentication methodSet up authentication methodnopanel

Make settings in SafeInspect

Expand
titleAdd Hybrid Access Gateway as RADIUS Server
  1. Log in to the SafeInspect administrative interface.
  2. Navigate to Identity > External Authentication > RADIUS Servers.

  3. Click Add RADIUS server and go to the Settings tab.

  4. Enter the following information:

    ParameterDescription
    AddressEnter the IP address of the Hybrid Access Gateway Authentication server
    Port

    Select the port of the Hybrid Access Gateway Authentication server for the particular authentication method

    Shared secretEnter the RADIUS shared secret key
    Shared secret confirmationConfirm the RADIUS shared secret key


  5. Go to the Policy tab.

  6. Add an authentication rule with the following settings:

    ParameterDescription
    Client-to-Hound authenticationSelect: Authenticate against a RADIUS server
    RADIUS server

    Select the IP address and port of the Hybrid Access Gateway Authentication server

    Hound-to-target authentication

    Select: Mapped user credentials


Example: Log in to SafeInspect

The following example shows how an end user logs in, using Nexus Personal Mobile. Other Nexus OTP methods can be used in a similar way. 

Expand
titleUse Nexus TruID Personal Mobile as 2FA to log in to CyberoamSafeInspect
  1. Start Nexus

    TruID

    Personal Mobile that is installed on your laptop or smartphone - Enter your PIN to generate an OTP.

    Image RemovedImage Removed

    Enter Key-In domain login id and password along with Nexus TruID OTP.
    Image RemovedImage AddedImage AddedImage AddedImage Added