Product manual
Contents
..................................................4
Overview
1.
..................................................4
Requirements
2.
........................................................................4
Supported Operating Systems
2.1
........................................................................5
Supported Web Applications
2.2
........................................................................5
Supported Mobile Phone Operating Systems
2.3
........................................................................5
Installation Requirements
2.4
........................................................................7
Supported Active Directory Environments
2.5
..................................................8
Installation
3.
........................................................................9
Installation of the Core components
3.1
........................................................................11
Installation of the Web App plugin
3.2
........................................................................12
Installation of the Remote Desktop plugin
3.3
........................................................................13
Basic Configuration
3.4
..................................................14
User Management
4.
..................................................15
VPN Protection
5.
........................................................................15
Configuration
5.1
........................................................................16
Usage
5.2
..................................................16
Web Application Protection
6.
........................................................................17
Configuration
6.1
.....................................................................................17Allowing Non-2FA Users6.1.1
........................................................................17
Usage
6.2
..................................................18
Remote Desktop Protection
7.
........................................................................18
Configuration
7.1
.....................................................................................18Allowing Non-2FA Users7.1.1
........................................................................19
Usage
7.2
..................................................19
Hard Tokens
8.
........................................................................20
Hard Token Management
8.1
.....................................................................................20Enable8.1.1
.....................................................................................20Import8.1.2
.....................................................................................22Delete8.1.3
.....................................................................................22Resy nchronize8.1.4
........................................................................23
Hard Token User Management
8.2
.....................................................................................23Enable and Assign8.2.1
.....................................................................................25Rev oke8.2.2
..................................................25
API
9.
........................................................................26
Integration Overview
9.1
........................................................................26
Configuration
9.2
........................................................................26
Replacing the SSL Certificate
9.3
.....................................................................................26Prerequisites9.3.1
.....................................................................................27Importing the New Certif icate9.3.2
.....................................................................................27Replacing the ESA Certif icate9.3.3
..................................................28
Advanced User Management
10.
........................................................................29
User States
10.1
........................................................................38
Provisioning Multiple Phones
10.2
........................................................................40
Override Mobile Number Field
10.3
........................................................................40
Groups Based User Management
10.4
..................................................41
Advanced VPN Topics
11.
........................................................................41
VPN Authentication Options
11.1
.....................................................................................41SMS-based OTPs11.1.1
.....................................................................................42On-demand SMS-based OTPs11.1.2
.....................................................................................42Mobile Application11.1.3
.....................................................................................42Hard Tokens11.1.4
.....................................................................................42Migration f rom SMS-Based OTPs to Mobile Application11.1.5
.....................................................................................42Non-2FA Pass-through11.1.6
.....................................................................................43Access Control Using Group Membership11.1.7
.....................................................................................43Hard Tokens11.1.8
........................................................................43
OTPs and Whitespace
11.2
........................................................................43
ESA Authentication Methods and PPP Compatibility
11.3
..................................................43
Auditing and Licensing
12.
........................................................................43
Auditing
12.1
........................................................................44
Licensing
12.2
.....................................................................................44Overv iew12.2.1
.....................................................................................44Warnings12.2.2
.....................................................................................44License States12.2.3
.....................................................................................45License Enf orcement12.2.4
..................................................45
High Availability View
13.