Two-factor Authentication


Published on

PortalGuard’s Flexible Two-factor Authentication options are designed as strong authentication methods for securing web applications. PortalGuard leverages a one-time password (OTP) as a factor to further prove a user's identity. The OTP can be delivered via SMS, email, printer, and transparent token. Configurable by user, group or application this is a cost effective approach to stronger authentication security.


Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Two-factor Authentication

  1. 1. Understanding PortalGuard’s Two-factor Authentication: A Tokenless ApproachHighlighting the Multi-factor Authentication Layer of the PortalGuard Platform
  2. 2. By the end of this tutorial you will be able to… • Define PortalGuard • Understand the need for two-factor authentication • Learn about PortalGuard’s Two-factor Authentication Options • See the step-by-step Authentication Process • Know the technical requirements
  3. 3. The PortalGuard software is a Contextual Authentication platform which is focused on enhancing usability, while maintaining a balance between security, auditing and compliance for your web, desktop and mobile applications. Usability Security • Single Sign-on • Knowledge-based • Password Management • Two-factor Authentication • Password Synchronization • Contextual Authentication • Self-service Password Reset • Real-time Reports/Alerts
  4. 4. Before going into the details…• Configurable by user, group or application• Configure One-time Password (OTP) length, expiration and format• Send OTP via SMS, email, transparent token and printer• Enforced for direct access to applications, VPN using RADIUS and during a self-service password reset, recovery, or account unlock• No SMS gateway required• Cost effective and competitively priced• Tailored Authentication for an exact fit
  5. 5. A P P L I C AT I O N S
  6. 6. Two-factor Authentication is… Used to increase security by requiring:“Something you know” AND “Something you have”
  7. 7. Aren’t all Two-factor Authentication Solutions the Same?They will increase your security however… • Inflexible • Low usability • High total cost of ownership • Tokens are expensive, forgotten and need replacement/repair
  8. 8. ONE-TIME PASSWORD (OTP)• Web/cloud application directly• VPN connection using RADIUS• Self-service password reset, recovery, or account unlock Transparent Tokens
  9. 9. How do I choose? • Attack Prevention – both passive and activeSMS • Total Cost of Ownership • Support/Maintenance Requirements • Client-side Software • Ease of Use • Portability
  10. 10. • Increased security - add an extra layer of authentication to application access, VPN access, or during a self-service password reset• Reduce Risk - prevent attacks by leveraging credentials which expire after one use• Usability - leverage hardware a user already has for increased user adoption• Eliminate forgotten passwords - leverage a username and OTP only as credentials• Configurable - to the user, group or application levels• Flexible - multiple OTP delivery methods available
  11. 11. HOW IT WORKS
  12. 12. PortalGuard provides flexibility…Allows you to configure whether the enrollment will be forced or able tobe postponed “x” number of times by the user.
  13. 13. Step 1: 7: 6: 5: 4: 3: 2:PortalGuard’s loginin thetosends the OTP tocontinue. expired web-application. The user entersaccessaOTP they received and and data. On”. that was This PortalGuard screen user attempting toauseclicks “Log OTP The user enterstheir username and clicks the user’s mobile phone is angains server isthe web-application an example of presented when user visits the The user is prompted for a password and OTP. never 5-10 Once the expired OTP an SMS. withinused. seconds, in the form ofis entered, the user is denied access and prompted to cancel the process or request a valid OTP.
  14. 14. Step 1:PortalGuard’s login screen is presented when a user visits the web-application.
  15. 15. Step 2:The user enters their username and clicks continue.
  16. 16. Step 3:The PortalGuard server sends the OTP to the user’s mobile phonewithin 5-10 seconds, in the form of an SMS.
  17. 17. Step 4:The user is prompted for a password and OTP.
  18. 18. Step 5:The user enters in the OTP they received and clicks “Log On”.
  19. 19. Step 6:The user gains access to the web-application and data.
  20. 20. Step 6:This is an example of a user attempting to use an expired OTP that wasnever used. Once the expired OTP is entered, the user is denied accessand prompted to cancel the process or request a valid OTP.
  21. 21. RADIUS Support:An internet standard that was designed primarily to authenticateremote users • Cisco • Citrix • Juniper • Checkpoint Network Access Server (NAS) = “RADIUS Client” PortalGuard = “RADIUS Server”• User accounts defined locally• LDAP Authentication• X.509 certificates• RADIUS
  22. 22. Step 1:The user attempts to connect to the NAS/firewall using either abrowser or VPN client software and is prompted for username andpassword.
  23. 23. Step 2:The NAS communicates the credentials to the PortalGuard serverusing the RADIUS protocol.Step 3:The PortalGuard server validates the user’s credentials against itsconfigured user repository (e.g. Active Directory).
  24. 24. Step 4:The user attempts to connect to the NAS/firewall using either abrowser or VPN client software and is prompted for username andpassword. Step 5:PortalGuard replies to the RADIUS request with an Access-Challengeresponse that includes a custom message that should be displayed tothe user and a random identifier (the “state”) that the NAS will sendback to PortalGuard to identify the same user session.
  25. 25. Step 6:The NAS displays the custom message requesting the user to enterthe OTP that was sent to their mobile device.
  26. 26. Step 7:The user enters the OTP from their mobile device and submitsit to the NAS.
  27. 27. Step 8: The NAS communicates the credentials to the PortalGuard server using the RADIUS protocol. Step 9:The PortalGuard server replies to the RADIUS 2nd request with anAccess-Accept response.
  28. 28. Step 10:The NAS accepts the user’s authentication and the VPNtunnel/session is established. The user is then able to accessinternal resources (e.g. “”).
  29. 29. Configurable through the PortalGuard Configuration Utility:• Delivery format, including From, Subject and Body fields• Expiration, aka “time-to- live” (TTL)• Length• Format • Numeric characters only • Upper/lowercase characters • Upper/lowercase & numeric characters • Upper/lowercase, numeric and symbol characters
  31. 31. A MSI is used to install PortalGuard on IIS 6 or 7.x. This version of PortalGuard supports direct access and authentication to cloud/browser-based applications, only.• .NET 2.0 framework or later must be installed• (64-bit OS only) Microsoft Visual C++ 2005 SP1 Redistributable Package (x64)• IBM WebSphere/WebSphere Portal v5.1 or higher• Microsoft IIS 6.0 or higher• Microsoft Windows SharePoint Services 3.0 or higher• Microsoft Office SharePoint Server 2007 or later• Microsoft Windows Server 2000• Microsoft Windows Server 2003 (32 or 64-bit)• Microsoft Windows Server 2008 (32 or 64-bit)• Microsoft Windows Server 2008 R2• The network appliance must support RADIUS as an authentication option• The network appliance must support the Access-Challenge response type as well as the State and Reply-Message attributes• PortalGuard must be licensed for RADIUS support• End-user enrollment of mobile devices or challenge answers must be performed external to the RADIUS protocol
  32. 32. THANK YOUFor more information visit or Contact Us