05 PAS Install Authentication Methods
05 PAS Install Authentication Methods
AUTHENTICATION METHODS
CyberArk Training
1
OBJECTIVES
By the end of this session you will be able to:
• Describe the different authentication methods supported by CyberArk
• Describe how two factor authentication can implemented in CyberArk
• Configure and combine different authentication methods
2
OVERVIEW
3 3
SUPPORTED AUTHENTICATION METHODS
4 4
SUPPORTED AUTHENTICATION METHODS
5
PVWA AUTHENTICATION
6
AUTHENTICATION CLASSIFICATION
CyberArk Authentication • The PVWA sends details to the Vault, which performs the authentication.
Vault Integrated • The PVWA sends the credentials to the Vault, which in turn authenticates
External Authentication the user against the external authentication servers.
• The PVWA sends the credentials to the server’s IIS service. IIS Authenticates
IIS Integrated
the user with the external server, and confirms authentication to the PVWA
External Authentication web application, which confirms authentication to the vault.
7
CYBERARK AUTHENTICATION FLOW
1 4
PVWA
2 App 3
End User
PVWA IIS Vault
Browser
Server
4. The Vault verifies the user’s identity and grants the user access
to the system
8 8
VAULT INTEGRATED AUTHENTICATION FLOW
3 6
1 5
PVWA
2 App 4
End User External
PVWA IIS Vault Authentication
Browser
Server Server
9
IIS INTEGRATED AUTHENTICATION FLOW
6
1 7 5
PVWA
App
3 External
End User 2 PVWA IIS Vault Authentication
Browser
Server Server
10
PVWA AUTHENTICATION: INTERMEDIATE SUMMARY
CyberArk X
LDAP X
RADIUS X
Windows X
RSA X
PKI X
OracleSSO X
SAML X
11
CYBERARK AUTHENTICATION
12
CYBERARK AUTHENTICATION
13
CONFIGURATION (1)
14
CONFIGURATION (2)
15
CONFIGURATION (3)
3. Enable “CyberArk”
authentication in the
PVWA
16
LDAP AUTHENTICATION
17
LDAP AUTHENTICATION
18
CONFIGURATION (1)
19
CONFIGURATION (2)
20
CONFIGURATION (3)
3. Enable “LDAP”
Authentication in the
PVWA
21
RADIUS AUTHENTICATION
22
RADIUS AUTHENTICATION
• Remote Authentication
Dial-In User Service
(RADIUS) is a networking
protocol that provides
centralized authentication
management for users
who connect and use a
network service.
• The Vault allows users to
log on through RADIUS
authentication using logon
credentials that are stored
in the RADIUS server. The
Vault also supports
RADIUS challenge-
response authentication.
23
CONFIGURATION (1)
24
CONFIGURATION (2)
25
CONFIGURATION (3)
26
CONFIGURATION (4)
27
WINDOWS AUTHENTICATION
28
WINDOWS AUTHENTICATION
• Windows authentication
(formerly named NTLM) is
a secure form of
authentication in a
Windows environment. In
Windows authentication,
the client browser sends a
strongly hashed version of
the password in a
cryptographic exchange to
the web server.
• In CyberArk, Windows
Authentication allows a
Single Sign On solution for
PVWA by authenticating to
the vault via the user’s
Windows credentials.
29
CONFIGURATION (1)
1. Enable Windows
authentication and
Forms authentication for
IIS (\<server
name>Sites\Default Web
Site\PasswordVault\auth\
windows)
30
CONFIGURATION (2)
1. Enable Windows
authentication and
Forms authentication for
IIS (\<server
name>Sites\Default Web
Site\PasswordVault\auth\
windows)
2. Enable “Windows”
authentication in the
PVWA
31
CONFIGURATION (3)
1. Enable Windows
authentication and Forms
authentication for IIS
(\<server
name>Sites\Default Web
Site\PasswordVault\auth\
windows)
2. Enable “Windows”
authentication in the
PVWA
3. For Single Sign-On (SSO)
add the PVWA URL to the
trusted sites and enable
‘Automatic logon with
current username and
password” in the browser
security settings.
32
PKI AUTHENTICATION
33
PKI
34
CONFIGURATION (1)
35
CONFIGURATION (2)
36
RSA SECUREID
ORACLESSO
SAML
37
RSA SECUREID
Prerequisites:
• Install and configure RSA Web Agent on
PVWA server.
• Enable RSA authentication in PVWA
38
ORACLESSO
Prerequisites:
• Install and Configure OracleSSO on the PVWA
Server.
• Enable OracleSSO Authentication in PVWA
39
SAML
Prerequisites:
• Configure SAML authentication in IIS.
• Enable SAML authentication in PVWA.
40
TWO FACTOR AUTHENTICATION
(2FA)
41
TWO FACTOR AUTHENTICATION
• Two-factor authentication (also known as 2FA) is a method of confirming a user's claimed identity
by utilizing a combination of two different components (something a user knows; and something a
user has).
• Using two-factor authentication enables you to mitigate common credential theft techniques, such as
basic key loggers or more advanced attack tools that are capable of harvesting plaintext passwords.
• CyberArk recommends that customers deploy two-factor authentication to the CyberArk Digital Vault,
preferably over RADIUS protocol.
42
USING 2FA IN CYBERARK
• In the PVWA you can combine ONE PVWA method with ONE Vault Method to create a multi-factor
authentication, as shown in the table on the right.
IIS Vault
PKI (certificate) LDAP (password)
Windows (password) RADIUS (token)
RSA (token) CyberArk (password)
• RADIUS and RSA secureID can provide native 2FA without having to combine two authentication
methods
43
EXAMPLE: PKI + LDAP (1)
Configure PKI as primary authentication method and LDAP as secondary authentication method
44
EXAMPLE: PKI + LDAP (2)
45
EXAMPLE: PKI + LDAP (3)
46
EXAMPLE: PKI + LDAP (4)
47
SUMMARY
48
SUMMARY
49
THANK YOU
50