Requesting additional authentication from remote user

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

I'm new at implementing RAS and wanted to know is the following possible.
Our layout will consist of a user dialing up to a Cisco AS5300 which forwards
the user's request to an IAS proxy server which forwards to a Windows2000
Active Directory to authenticate the user. The user entered their username
and password prior to double-clicking their little dial-up icon on their
desktop. Is there an additional authentication mechanism that you can
configure on the Windows2000 Domain controller to request an additional piece
of information from the user (for example like a pin number) just to verify
the user is who they are?

Thanks in advance.
 
I'm new at implementing RAS and wanted to know is the following
possible. Our layout will consist of a user dialing up to a Cisco
AS5300 which forwards the user's request to an IAS proxy server which
forwards to a Windows2000 Active Directory to authenticate the user.
The user entered their username and password prior to double-clicking
their little dial-up icon on their desktop. Is there an additional
authentication mechanism that you can configure on the Windows2000
Domain controller to request an additional piece of information from
the user (for example like a pin number) just to verify the user is
who they are?

Thanks in advance.

If you are going to use IAS as a proxy server, you must configure another
server as an IAS server. For example, on your DC you can install and
configure IAS. (Running IAS on a DC is a recommended configuration, but it
is not required that you install IAS on the DC, you can run IAS on a
different computer.)

The IAS proxy forwards the connection request to the remote RADIUS server
group in which the IAS server is a member. The IAS server then processes
the connection request, performing authentication against your AD user
accounts database and performing authorization with the dial-in properties
of user accounts in AD as well as remote access policies that you have
configured on the IAS server.

Please keep in mind that Windows 2000 IAS cannot be configured as an IAS
proxy. Windows Server 2003, however, can be configured as an IAS proxy. If
you only have one network access server, you don't even need a proxy,
though.

The type of credentials that are required to authenticate users is a
feature of the authentication method you choose to deploy. For example, MS-
CHAP v2 is a password-based authentication method, while EAP-TLS is a
certificate-based authentication method with which you can use smart cards,
which require that the user has a smart card reader and enters a PIN when
they connect. Typically, certificate-based authentication methods are more
complex to deploy than password-based authentication methods, though they
do provide better security.

Offhand I don't know of an authentication method that requires both
password-based credentials and a smart card. You might look into RSA
SecurID (which works with IAS), as that is an interesting alternative. The
whitepaper on how to deploy RSA SecurID with IAS is located at
http://www.microsoft.com/windowsserver2003/technologies/ias/default.mspx
and is called "Enterprise Deployment of Wireless & Remote Access with RSA
SecureID and Microsoft Internet Authentication Service."



--
James McIllece, Microsoft

Please do not send email directly to this alias. This is my online account
name for newsgroup participation only.

This posting is provided "AS IS" with no warranties, and confers no rights.
 
Thanks for the help!! Have a good one.

James McIllece said:
If you are going to use IAS as a proxy server, you must configure another
server as an IAS server. For example, on your DC you can install and
configure IAS. (Running IAS on a DC is a recommended configuration, but it
is not required that you install IAS on the DC, you can run IAS on a
different computer.)

The IAS proxy forwards the connection request to the remote RADIUS server
group in which the IAS server is a member. The IAS server then processes
the connection request, performing authentication against your AD user
accounts database and performing authorization with the dial-in properties
of user accounts in AD as well as remote access policies that you have
configured on the IAS server.

Please keep in mind that Windows 2000 IAS cannot be configured as an IAS
proxy. Windows Server 2003, however, can be configured as an IAS proxy. If
you only have one network access server, you don't even need a proxy,
though.

The type of credentials that are required to authenticate users is a
feature of the authentication method you choose to deploy. For example, MS-
CHAP v2 is a password-based authentication method, while EAP-TLS is a
certificate-based authentication method with which you can use smart cards,
which require that the user has a smart card reader and enters a PIN when
they connect. Typically, certificate-based authentication methods are more
complex to deploy than password-based authentication methods, though they
do provide better security.

Offhand I don't know of an authentication method that requires both
password-based credentials and a smart card. You might look into RSA
SecurID (which works with IAS), as that is an interesting alternative. The
whitepaper on how to deploy RSA SecurID with IAS is located at
http://www.microsoft.com/windowsserver2003/technologies/ias/default.mspx
and is called "Enterprise Deployment of Wireless & Remote Access with RSA
SecureID and Microsoft Internet Authentication Service."



--
James McIllece, Microsoft

Please do not send email directly to this alias. This is my online account
name for newsgroup participation only.

This posting is provided "AS IS" with no warranties, and confers no rights.
 
Mark said:
[...]Is there an additional
authentication mechanism that you can configure on the Windows2000
Domain controller to request an additional piece of information from
the user (for example like a pin number) just to verify the user is
who they are?

Along with a lot of useful IAS information, the reply from Microsoft's
James McIllece said:
Offhand I don't know of an authentication method that requires both
password-based credentials and a smart card. You might look into RSA
SecurID (which works with IAS), as that is an interesting alternative. The
whitepaper on how to deploy RSA SecurID with IAS is located at
http://www.microsoft.com/windowsserver2003/technologies/ias/default.mspx
and is called "Enterprise Deployment of Wireless & Remote Access with RSA
SecureID and Microsoft Internet Authentication Service."

The latest version of RSA SecurID for Windows, developed in close
collaboration with Microsoft, installs an RSA Authentication Agent --
which demands two factor authentication (a memorized PIN and a SecurID
60-second token-code), and reports to a central audit log -- to
restrict access to a Windows network domain.

Corporate insiders, who otherwise roam the enterprise network freely,
will still have to present their credentials for access to the DC.

What RSA calls SecurID for Windows (SID4Win) actually pushes strong,
auditable, two-factor authentication out in both directions from the
network perimeter that has been its traditional focus.

SID4Win replaces the Windows logon screen with a SecurID logon screen,
doing away with the irritating two-layer authentication process.
Rather ingeniously, it does this while leaving the Windows security
model intact and unchanged. The Windows password, as long and complex
as necessary, is now submitted to the OS by the RSA Authentication
Manager after the SecurID authentication is validated. (The user is
even prompted to change his Windows password, if that is required by
the corporate security policy. Draconian password policies become
painless.)

RSA, for which I have been a consultant for many years, now provides
RSA Authentication Agents for corporate XP desktops on the enterprise
network, and for mobile XP laptops as well. Even when these PCs are
temporarily off the Net, their users will still be required to present
a valid username, a memorized PIN, and their SecurID token-code to
logon to these machines.

See RSA's data sheet, white paper, and webcast on SID4Win at:
<http://www.rsasecurity.com/node.asp?id=1173>.

(OT -- but how, you ask? The RSA Authentication Manager now loads
these protected PCs with a secure cache of future SecurID token-codes
-- for some variable number of days, pre-set for groups or an
individual by the network admin -- so the user can use his SecurID to
access his company laptop at 35,000 feet, on a cross-country Red Eye,
or whenever his PC is temporarily disconnected from the Net.

(When the user next connects to the Net, the RSA Authentication Agent
uploads an audit record of what has happened in the interim, and
downloads a new secure cache of SecurID token-codes for future offline
use.)

Market demand for strong authentication, and a secure audit trail, to
protect access to network domains -- and PC-based repositories of
proprietary and confidential corporate data, as well -- seems to
reflect, at least in the US, the additional security required for
compliance with the various new external regulatory regimes: Basel II,
Sarbanes-Oxley, HIPAA, GLBA, etc.

Mark is not alone among the savvy administrators (and auditors) who
have wanted these additional controls for a long time, but I suspect
that it is was only the external pressures that made these joint
product enhancements feasible, even inevitable.

(RSA, btw, is now providing this SID4Win functionality without charge
to its existing customers that are running the most recent version of
the RSA ACE/Server. That's probably most of their 15,000+ enterprise
customers.)

Suerte,
_Vin
 
Back
Top