Citrix Blogs

Citrix NetScaler Two Factor Integration

Overview

Two-factor authentication is standard in most infrastructures where users are prompted for something they have and something they know. Generally, two factor authentication on the Netscaler is integrated with Radius where the Radius server is LDAP integrated however we have seen some scenarios where the Active Directory and RSA infrastructures are not integrated so the usernames are different for both authentication methods.

This case study details a recent engagement with this particular requirement. The access scenario below details the use-case and the use of responder policies along with AAA to satisfy the requirements for this customer.

Access Scenario

Fig 1: User Flow

Note: Due to the Responder redirect policies actually redirecting the endpoint device both StoreFront Load Balancer 2 and the AAA VServer must be accessible by the endpoint in addition to the initial NetScaler Gateway VIP. Depending on the deployment these can be secured with policies crafted to drop traffic that does not meet conditions established using Regular Expressions.

Policies and Actions

The following CLI entry was used to create the NetScaler Gateway VServer

The Responder policy checks for a user that is a member of the “AD-2Factor-Auth” Active Directory group. If a user authenticating through the NetScaler Gateway is a member then the Responder action bound to the policy triggers. In this case the Responder action is a redirect to another URL before the session policies are applied.

The following CLI entries were used to create and bind the Responder policies and actions that redirect two-factor users after they have authenticated with LDAP at the NetScaler Gateway VServer

The Load Balancing VServer works in conjunction with the Authentication VServer to provide the second factor of authentication (RADIUS in this case). Authentication is enabled on the Load Balancing VServer and directs the user to the tmindex.html where they perform authentication with the configured service. If successful the user is forwarded through to the back-end servers behind the Load Balancing VServer using the configured LB and persistence methods.

The Load Balancing VServer was configured from the following CLI commands

The Authentication VServer was creating using the following CLI commands

When the user that was a member of the AD-2Factor-Auth group selects “Logoff” from the StoreFront interface a series of Rewrite policies trigger their associated actions. These actions edit the AAA cookies on the users endpoint to set the expiry date into the past. This immediately makes the cookies invalid so that the user must perform the AAA and StoreFront authentication again.

The following CLI entries were used to create and bind the Rewrite policies and actions that expire the AAA cookies on the user endpoint when “Log Off” is selected at StoreFront. They are modified versions of the OWA Logout policies and actions found in the Citrix Blog http://blogs.citrix.com/2011/11/11/ensuring-secure-logout-for-your-application/ by Abhilash Verma.

Exit mobile version