2.1 Adding the User Repository ....................................................................................................................... 6
2.2 Assigning the Repository to a User Type ................................................................................................. 10
2.3 Assigning the Repository to an Administration Group ............................................................................. 13
2.4 Assigning a Static Password for a User ................................................................................................... 16
2.5 Activating a Soft Token ............................................................................................................................ 19
3.0 Configuring Microsoft Forefront TMG ............................................................................................................. 25
3.1 Configuring TMG to Allow RADIUS Communication ............................................................................... 25
4.0 Configuring Microsoft Forefront UAG ............................................................................................................. 33
The Microsoft® Forefront™ Unified Access Gateway 2010 enables a secure remote access service for both
managed and unmanaged computers as well as mobile devices. The gateway may be used to enable corporate
network access over a virtual private network (VPN) and publish files and/or applications for remote users.
ActivIdentity® solutions may be integrated with Microsoft Forefront Unified Access Gateway 2010 to provide a
strong authentication method that is flexible, scalable, and simple to manage. ActivIdentity offers the following
solution:
ActivIdentity® 4TRESS™ Authentication Appliance—Offers easy implementation and support for
multiple authentication methods that are useful for diverse audiences over the RADIUS channel,
including user name and password, mobile and PC soft tokens, one-time passwords, and transparent
Web soft tokens.
This document explains how to set up ActivIdentity 4TRESS Authentication Appliance, version FT2011 SP1 with
Microsoft Forefront Unified Access Gateway (UAG). Use this handbook to enable authentication to Microsoft
Forefront UAG over the RADIUS protocol using the RADIUS Front End feature of ActivIdentity 4TRESS.
1.1 Scope of Document
The scope of this document is limited to setting up the integration between Microsoft Forefront UAG and
ActivIdentity 4TRESS for authentication and does not include instructions on publishing applications on a
Forefront UAG trunk.
1.2 Prerequisites
The following pre-requisites should be met:
ActivIdentity 4TRESS Authentication Appliance has been set up according to ActivIdentity 4TRESS
Authentication Appliance Setup Guide
The RADIUS Front End feature of 4TRESS has been configured according to ActivIdentity 4TRESS
Authentication Appliance RADIUS Front End Solution Guide
The Soft Token Activation Portal feature of 4TRESS has been set up according to ActivIdentity
This section describes the configuration steps required to be made to the 4TRESS server component. These
changes are performed using the 4TRESS Management Console web interface.
2.1 Adding the User Repository
For this environment, the Microsoft Active Directory hosted on the domain controller will be used as the user
repository. This LDAP server must be added and configured within 4TRESS.
1. Log on to the 4TRESS Management Console and select Configuration > User Repositories and click
Add
2. Specify a name for the directory and select the Adapter for Microsoft Active Directory. Optionally, modify
the Code. When done, click Next
Page 7
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
The user repository added in section 2.1 Adding the User Repository must be associated with a User Type in
4TRESS, or the users will not be included when performing a user lookup. This section describes the steps
required to successfully assign the repository to a given User Type.
1. Log on to the 4TRESS Management Console and select Access Administration > User Types. Then,
click one of the pre-configured User Types. For this example, we will use Employees User Type
Page 11
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
2. Expand the section User Repositories and then expand the section Available. Next, click the repository
created in section 2.1 Adding the User Repository
3. Press Add to set up a Root Node in the pop-up window that appears
Page 12
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
2.3 Assigning the Repository to an Administration Group
The user repository added in section 2.1 Adding the User Repository must also be associated with an
Administration Group. This section lists the operations required to perform this action.
1. Log on to the 4TRESS Management Console and select Access Administration > Administration
Groups. Then, click one of the pre-configured Administration Groups. For this example, we will use Full
Time Employees Administration Group
Page 14
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
2. Expand the section User Repositories and then expand the section Available. Next, click the repository
created in section 2.1 Adding the User Repository
3. Press Add to set up a Root Node in the pop-up window that appears
Page 15
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
The Microsoft Forefront TMG firewall disables all network traffic that is not explicitly allowed. Therefore, an
exception rule needs to be configured and activated in the TMG Firewall to allow the UAG server to forward the
authentication request to the 4TRESS server. This section describes the process of enabling communication to
take place between the UAG server and 4TRESS over the RADIUS protocol.
3.1 Configuring TMG to Allow RADIUS Communication
Administration of the TMG Firewall is performed by using the Microsoft TMG Management Console, which is
installed as part of the Microsoft Forefront UAG software.
1. Launch the Microsoft TMG Management Console and right-click Firewall Policy. Then Select New and
Access Rule…
Page 26
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
15. Wait for the configuration to save
successfully and click OK
Important: Make sure the Access Rule created is not intercepted by another rule that
denies the communication to take place. Using the ActivIdentity RADIUS Ping Tool is a
convenient way of testing the connectivity.
Communication should now be allowed to and from the 4TRESS server over the RADIUS protocol.
Page 33
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
This section provides instructions on how to configure the Microsoft
Forefront UAG application to communicate with 4TRESS and how to
create a basic Portal Trunk to test the authentication.
Portal Trunk
The Portal Trunk of Microsoft Forefront UAG is
the website the End Users will access to
provide their credentials. Once authenticated
at the Portal Trunk, the End User is granted
access to the applications that are published.
1. Select Configure Network Settings in the Wizard that
appears.
2. Click Next to continue the wizard
3. Set up the Internal and External network adapters
and click Next
4.0 Configuring Microsoft Forefront UAG
4.1 Initial Configuration
Launching the Forefront UAG Management Console for the first time will take a moment to initialize. When the
initialization is completed, a wizard will be displayed.
Page 34
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
A Portal Trunk needs to be configured in Microsoft Forefront UAG. This is done from the UAG Management
Console. Before starting the trunk configuration, make sure that the server has been outfitted with a proper web
server certificate where the FQDN of the server is specified both in the Subject name field and as a DNS name in
the SubjectAlternativeName field.
1. Launch the Microsoft UAG Management Console and select HTTPS Connections. Next, click on the link
Click here to create an HTTPS trunk
Page 40
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
Note: After installing the components, the browser may have to be restarted.
5.0 Testing the Installation
When all of the above sections have been completed, the installation can be tested. To do this, an attempt to
authenticate the test user previously used will be made to the UAG portal. Make sure the certificate of the UAG
server is trusted.
1. From the machine where the PC Soft Token was installed, launch a web browser and go to the UAG URL
defined in step 4 of section 4.3 above, e.g. https://uagsrv.uagtest.local:443
3. Next, the UAG portal will attempt to install some software. Press Install to go ahead with the installation
as these components are needed for full site operability
Page 47
ActivIdentity 4TRESS and Microsoft Unified Access Gateway | Integration Handbook
Americas +1 510.574.0100
US Federal +1 571.522.1000
Europe +33 (0) 1.42.04.84.00
Asia Pacific +61 (0) 2.6208.4888
Email info@actividentity.com
Web www.actividentity.com
Legal Disclaimer
ActivIdentity, the ActivIdentity (logo), and/or other ActivIdentity products or marks referenced
herein are either registered trademarks or trademarks of HID Global Corporation in the United
States and/or other countries. The absence of a mark, product, service name or logo from this
list does not constitute a waiver of the trademark or other intellectual property rights concerning
that name or logo. The names of other third-party companies, trademarks, trade names, service
marks, images and/or products that happen to be mentioned herein are trademarks of their
respective owners. Any rights not expressly granted herein are reserved.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.