ON THIS PAGE
Configuring CTPView User Authentication with Steel-Belted RADIUS
Starting with CTPView Release 4.1, you can provide RADIUS authentication to both HTTPS and SSH users. Earlier releases of CTPView supported RADIUS authentication only for HTTPS users. Enabling RADIUS authentication for SSH users ensures that both HTTPS and SSH users have a common authentication method without requiring separate user-specific configuration.
Starting with CTPView Release 4.1, users do not require a local user account on the CTPView server. For CTPView 4.0 and earlier, a user must have an account on the CTPView server. You can add a user or verify whether a user account exists from the CTPView CLI menu. The username for the CTPView account must match the username that is configured on the RADIUS server.
You can enable or disable RADIUS authentication for both SSH and HTTPS users. You can block a specific user by disbaling that user from the RADIUS server.
To provide RADIUS authentication, use an independent Steel-Belted RADIUS (SBR) server or an RSA SecurID appliance with your CTPView server running FC9 or Centos OS and CTPView 3.4R1 or later. The RSA SecurID appliance incorporates an SBR server, making the configuration very similar to that of an independent SBR server.
Users are authenticated in the following order:
By the SBR server.
By the local CTPView application.
You can configure the SBR server to use native user authentication or pass-through authentication with RSA SecurID.
Native user authentication references user accounts stored on the SBR server. When trying the native user method, the SBR software searches its database for an entry whose User-Type is Native User and whose username matches the User-Name in the Access-Request.
Pass-through authentication (two-factor authentication) enables the SBR server to pass authentication requests through to RSA Authentication Manager (RSA SecurID). RSA SecurID is then responsible for validating the username and password found in the Access-Request.
The order of authentication between these two categories of users is set on the SBR server. You can add the same user (that is, the same user ID) to both the SBR server and the local CTPView application.
Configuring RADIUS Settings on the CTPView Server
Before you begin, log in to the CTPView server and access the CTPView Configuration Menu. See Accessing the CTPView Server Configuration Menu (CTPView Server Menu).
To configure RADIUS settings on the CTPView server:
Configuring the SBR Server’s Dictionary Files
To configure the SBR server’s dictionary files:
Configuring the SBR Server’s Active Authentication Method
To configure the SBR server’s active authentication method:
Adding the CTPView Server as a RADIUS Client on an SBR Server
To add the CTPView server as a RADIUS client on an SBR server:
- Launch the Steel-Belted RADIUS Administrator application from your web browser by entering the address http://SBR-server-IP-address:1812.
- Click Launch.
- Select Steel-Belted RADIUS > RADIUS Clients.
- Add your CTPView server as a client. In the Make or model field, select Juniper CTP Series.
Adding CTPView Users to an SBR Server
To add CTPView users to an SBR server:
Assigning SecurID Tokens to CTPView Users
SecurID authentication requires that you issue a SecurID token to each user and assign it to them on the RSA SecurID appliance. The first time a new user logs in to the CTPView software, the token code displayed on the SecurID token is the password. The user is then prompted to create a PIN. On subsequent logins, the user’s PIN followed immediately by the token code displayed on the SecurID token is the password.
To assign SecurID tokens: