RapidIdentity Product Guides - 2019 Rolling Release

Policies

Policies allow administrators to create and manage existing authentication policies. There are three Policies configurations content areas.

  1. General

  2. Criteria

  3. Authentication Methods

Newly created and existing policies can be configured to specific user groups or roles, each with their own specific criteria and or authentication methods. The value is that administrators have expansive degrees of freedom to manage how users authenticate to RapidIdentity.

Policies General

Administrators can create new policies by clicking the green plus icon and remove existing policies by clicking the red minus icon.

The policy name and description are both required. To enable the policy, check the Enabled box. Clicking Save assigns the policy a fixed, unique ID.

Administrators can configure whether QR Codes generated are tied to a user's password – secure or insecure QR Code. When this check box is selected, users matching this policy can enter a QR code instead of their username. However, it is advisable to configure an insecure QR Code policy to include at least one additional authentication method or criteria. RapidIdentity Portal users able to generate QR Codes can determine whether the printed QR Code is secure or insecure.

If there are no authentication policies defined, all users are required to authenticate with their username and password to access RapidIdentity.

Multi-Factor Authentication policies existing prior to RapidIdentity 3.5 are imported automatically, and these policies will have the "[Migrated]" label appended to the policy name.

Policies | Criteria

The Criteria subtab allows administrators to determine when the policy should be active. There are seven criteria.

  1. LDAP filter

  2. Day of Week

  3. Time of Day

  4. Source Network

  5. Kerberos

  6. QR Code

  7. FIDO

Legacy_Policies_Criteria_1.png
Legacy_Policies_Criteria_2.png
Legacy_Policies_Criteria_3.png
Legacy_Policies_Criteria_4.png
Legacy_Policies_Criteria_5.png
Legacy_Policies_Criteria_6.png
Legacy_Policies_Criteria_7.png
Table 199. Policies Criteria

Criteria

Description

LDAP Filter

Administrators can click the magnifying glass to use the LDAP criteria builder, or enter the appropriate LDAP filter in the space provided. Once the Enabled box is checked and the criteria are saved, users matching the LDAP filter will match the authentication policy criteria.

If the Match the Built-in Admin Account checkbox is selected, the idauto::admin account will match this policy and be required to adhere to any additional Criteria and Methods with this policy. Thus, the idauto::admin account authentication is not limited to only username and password, and this account can match organization multi-factor authentication requirements.

Day of Week

Administrators can choose any or all weekdays, and choose the appropriate time zone.

Time of Day

Administrators can choose any time of day range, and choose the appropriate time zone.

Source Network

Administrators can assign specific networks or subnets to an authentication policy and can either Whitelist or Blacklist as the Match Type. Whitelist will allows sessions from networks in the list and Blacklist allows sessions from networks not in the list.

Checking the Enable HTTP Header Processing box will match the X-Forwarded For HTTP header used by proxies and load balancers.

Clicking Save allows clients whose IP addresses match the criteria.

Kerberos

Administrators can allow users to authenticate with a Kerberos-enabled browser.

Users that do not have a Kerberos-enabled browser could be required to match other criteria or methods (e.g. password then TOTP). To include all users in this use case, the Kerberos policy must be ranked higher than the password then TOTP policy.

QR Code

Users can authenticate with their QR Code. Administrators can allow users to print their own QR Code, or allow other users to print user QR Codes, through the RapidIdentity Portal Profiles module. The option to allow QR Code printing is configured in the RapidIdentity Portal Configuration module, in the Profiles Delegation Definition Manager Action tab. The default QR Code width and height are 2.3125 and 3.5 inches, respectively.

A new, Secure QR code must be printed every time a user's password changes since the Secure QR Code is related to the user's password.

Administrators must install and ensure the RapidIdentity Connect password filter and ensure that both RapidIdentity Portal and RapidIdentity Federation are configured to be able to pull passwords from the directory service.

FIDO

When enabled, FIDO U2F applies to users with at least one registered FIDO device.

Inverse Match applies to users who do not have a registered FIDO device and requires administrators to select both Enabled and Inverse Match.



Policies | Authentication Methods

Administrators can click the green up or down arrows to prioritize authentication methods.

The ten authentication methods are:

  1. Password

  2. TOTP

  3. RapidIdentity Portal Challenge (Questions)

  4. SMS

  5. Kerberos

  6. Social

  7. QR Code

  8. Pictograph

  9. PingMe

  10. FIDO

Each of the hyperlinked methods in the table below direct to a RapidIdentity Appliance page describing configuration details.

Table 200. Authentication Methods

Authentication Method

Description

Password

Users authenticate with their password.

TOTP

Users have a finite time window to enter a third-party (e.g. Google Authenticator) generated code to authenticate.

Window Size: vgoverns the number of valid codes. A value of 1 indicates only the current code is valid. A value of 3 indicates the current, the two previous, and two future codes are all valid.

Issuer: the name displayed alongside the token in the user's device. If blank, the default Issuer will be used.

Allow Challenge Deferral: When checked, users can defer challenges for 30 days.

Setup Instructions: Necessary instructions for users to view when setting up their device.

Portal Challenge (Questions)

Users authenticate with their RapidIdentity Portal Challenge Questions.

SMS

Users authenticate with a code sent to their mobile device through SMS.

Kerberos

Users authenticate with browser-provided Kerberos tickets automatically.

Social

Social authentication allows users to authenticate to RapidIdentity through their Facebook, Google+, LinkedIn, or Twitter account. Authenticating against any of the enabled social networks is sufficient.

Social authentication is enabled by clicking the Enabled box, selecting the desired social network, and completing the ID and Secret fields. The ID and Secret field values are both obtained through each of the social network's developers pages.

To learn how to obtain the ID and Secret field values, navigate to Social.

QR Code

When enabled, the QR code is a required authentication method.

Pictograph

Users can authenticate against the default image pool of 36 images or a custom image pool. Administrators can configure the number of images to choose and the number of images to challenge the user.

When configuring the custom image pool, click Manage Images. The total image pool resides on the left pane, and the user challenge images reside on the right pane. Administrators can select an image and use the arrows to move images. The Pictograph Image Manager supports drag-and-drop.

PingMe

Users authenticate using the RapidIdentity mobile client application. Once the user verifies their pin on the mobile application the user is automatically directed to the configured RapidIdentity landing module. It is necessary to be licensed for the PingMe authentication method to use this authentication method and necessary to configure users on the RapidIdentity Server.

Server Hostname: The RapidIdentity Server hostname.

Server Port: The server port. The default value is 443 if left blank.

API Key: The RapidIdentity Server API key.

Username attribute: The LDAP attribute that contains the user's RapidIdentity Server username(s).

Domain: Optional. If left blank, the default value is the RapidIdentity Server authentication domain if the username attribute value does not contain one.

Service Description: Optional. A friendly description that will display on the user's authentication device with the authentication request. If left blank, the default description is 'RapidIdentity Federation'.

FIDO

When enabled, users authenticate with a FIDO U2F security key. Currently, FIDO is supported with the Google Chrome and Opera browsers only. Administrators can allow users to defer the FIDO challenge for 30 days.



Integrating with Google 2-Step Verification

If the environment federates with Google through SAML SSO and Google's 2-Step Verification is configured, users will not be prompted to enter the corresponding Google TOTP code when logging in through the RapidIdentity Federation login page. If a user attempts to access Google first (e.g. desktop browser or mobile device), they will be redirected to the RapidIdentity Federation login page and be required to authenticate based on the enabled authentication policies.

Google Super Administrators are required to enter the Google TOTP code if the authentication attempt begins with Google. Google Super Administrators are not required to enter the Google 2-Step TOTP code if the authentication attempt begins with the environment RapidIdentity Federation login page. To learn more, visit the G Suite Administrator 2-Step Help article.

Unsupported Authentication Method

RapidIdentity 4.3 deprecates the LaunchKey authentication method. Existing authentication policies incorporating the LaunchKey authentication method can render the authentication policy ineffective, therefore users or groups matching this policy cannot authenticate to RapidIdentity.

Current policies incorporating a deprecated or unsupported authentication method display a message to users after the authentication attempt informing them that need to contact their support team.

Policies_Auth_Methods_1.png

Users in the System Admin role receive user interface notification stating that an authentication method is not supported and that the authentication policy should be disabled and reconfigured. 

Policies_Auth_Methods_2.png