IDENTIKEY Appliance Product Guide
IDENTIKEY Appliance Product Guide
Product Guide
3.18
Disclaimer of Warranties and Limitations of Liabilities
Legal Notices
Copyright © 2008–2019 OneSpan North America, Inc. All rights reserved.
Trademarks
OneSpan™, DIGIPASS ® and CRONTO® are registered or unregistered trademarks of OneSpan North America Inc.,
OneSpan NV and/or OneSpan International GmbH (collectively "OneSpan") in the U.S. and other countries.
OneSpan reserves all rights to the trademarks, service marks and logos of OneSpan and its subsidiaries.
All other trademarks or trade names are the property of their respective owners.
Intellectual Property
OneSpan Software, documents and related materials (“Materials”) contain proprietary and confidential information.
All title, rights and interest in OneSpan Software and Materials, updates and upgrades thereof, including software
rights, copyrights, patent rights, industrial design rights, trade secret rights, sui generis database rights, and all other
intellectual and industrial property rights, vest exclusively in OneSpan or its licensors. No OneSpan Software or Mater-
ials may be downloaded, copied, transferred, disclosed, reproduced, redistributed, or transmitted in any form or by
any means, electronic, mechanical or otherwise, for any commercial or production purpose, except as otherwise
marked or when expressly permitted by OneSpan in writing.
Disclaimer
OneSpan accepts no liability for the accuracy, completeness, or timeliness of content, or for the reliability of links to
and content of external or third party websites.
OneSpan shall have no liability under any circumstances for any loss, damage, or expense incurred by you, your com-
pany, or any third party arising from the use or inability to use OneSpan Software or Materials, or any third party mater-
ial made available or downloadable. OneSpan will not be liable in relation to any loss/damage caused by
modification of these Legal Notices or content.
Reservation
OneSpan reserves the right to modify these Notices and the content at any time. OneSpan likewise reserves the right
to withdraw or revoke consent or otherwise prohibit use of the OneSpan Software or Materials if such use does not
conform to the terms of any written agreement between OneSpan and you, or other applicable terms that OneSpan
publishes from time to time.
Contact us
Visit our website: https://www.onespan.com
Resource center: https://www.onespan.com/resource-center
Technical support and knowledge base: https://www.onespan.com/support
If there is no solution in the knowledge base, contact the company that supplied you with the OneSpan product.
Table of Contents
1. Introduction 15
2.6. Server-Side 30
2.11. EMV-CAP 42
4. Signature Validation 82
7. EMV-CAP 120
9. Administration 126
10.6. Migration to IDENTIKEY Appliance / IDENTIKEY Virtual Appliance from IDENTIKEY Authentication Server 132
Illustration Index
Image 24: RADIUS Server as Back-End Server (Users Log In with OTP Only) 37
Image 25: RADIUS Server as Back-End Server (Users Log In with Both Password and OTP) 38
Image 28: Connection Between the IDENTIKEY Appliance and VASCO Customer Portal 45
Image 44: DIGIPASS Authentication for Windows Logon Online Authentication 114
Image 45: DIGIPASS Authentication for Windows Logon Offline Authentication 115
Image 47: SafeNet Cryptographic Keys Allocated by Token Name and Slot ID 125
Image 49: Data Transmission from the Syslog Utitilty to the Live Log Viewer and Remote Syslog 158
Image 52: Virtual Mobile Authenticator Process Using IDENTIKEY Appliance MDC 169
Image 54: LDAP Synchronization to Create or Update an IDENTIKEY Appliance User Account 174
Image 57: Replication Between Primary and Backup IDENTIKEY Appliance 180
Image 58: Replication Between Primary, Backup, and Disaster Recovery IDENTIKEY Appliance 181
Image 62: Replication Status Screen in the Administration Web Interface 186
Image 73: Possibilities for Moving User Accounts and DIGIPASS (OU = Organizational Unit) 240
Table Index
Table 3: OTP Authentication for Scenarios Involving Multiple and Single DIGIPASS Applications 69
Table 16: Backup Virtual Mobile Authenticator Policy/ DIGIPASS Settings 205
1. Introduction
IDENTIKEY Appliance Product Guide is part of the documentation set about IDENTIKEY Appliance. It is intended for
technical experts interested in learning about the IDENTIKEY Appliance. It describes the structure of the product,
the concepts underpinning authentication and how IDENTIKEY Appliance can support authentication within your IT
infrastructure.
If not stated otherwise, the information in this guide also applies to IDENTIKEY Virtual Appliance.
Warning
Components or features described in this document may need to be configured to meet the standards of the Gen-
eral Data Protection Regulation (GDPR). If your organization is collecting or in any capacity processing data on cit-
izens of a European Union country, your organization is subject to the GDPR. For more information on this subject
matter, refer to the IDENTIKEY Appliance General Data Protection Regulation Compliance Guide.
n IDENTIKEY Appliance Administrator Guide. Explains the steps needed for administration tasks, including
monitoring and troubleshooting.
n IDENTIKEY Appliance Administrator Reference. Provides field explanations and other organized reference
material for technical experts using IDENTIKEY Appliance intended for reference only.
n IDENTIKEY Appliance Installation and Maintenance Guide. Explains the steps required to connect the
IDENTIKEY Appliance to your network, first-time configuration and maintenance procedures, such as
updating and re-licensing.
n IDENTIKEY Appliance Product Guide. Describes the structure of the product, the concepts underpinning
authentication and how IDENTIKEY Appliance can support authentication within an existing infrastructure.
n IDENTIKEY Appliance General Data Protection Regulation Compliance Guide: provides general information
about the EU General Data Protection Regulation (GDPR), its implications on IDENTIKEY Appliance and
provides instructions to achieve GDPR compliance where additional adaptations or procedures are
required.
n IDENTIKEY Authentication Server SDK Programmer Guide. Provides in-depth information required for devel-
opment work using the SDK. This document is relevant to SOAP Authentication, electronic signatures and
provisioning using the IDENTIKEY Appliance.
n Documents about DIGIPASS Authentication for Windows Logon. Provide information about the concepts,
installation and configuration, setup, and procedures to test DIGIPASS Authentication for Windows Logon.
n Two Password Synchronization Manager guides for installation and usage information.
n Filter guides for each available filter for installation and usage information.
Access to the IDENTIKEY Appliance documentation is provided via the IDENTIKEY Appliance Configuration Tool.
Manuals for IDENTIKEY Appliance add-ons are provided on the CD-ROM delivered with the appliance.
DIGIPASS devices provide the client component of the OneSpan authentication solution, issued by the application
service provider (ASP) to end users (the DIGIPASS holders), to support:
n One-time password (OTP), to authenticate end users to the ASP, to protect access to services and
resources
n Host codes, to authenticate the ASP to end users
n Electronic signatures, to protect the integrity and authenticity of financial transactions or other security-crit-
ical communications (not currently available with the IDENTIKEY Appliance)
The DIGIPASS client component uses a variety of cryptographic algorithms to calculate one-time passwords, host
codes and electronic signatures. DIGIPASS devices generate one-time passwords and electronic signatures using a
unique 'secret value'. Most DIGIPASS devices are pre-programmed with this unique secret value (making each
OTP/signature unique to each DIGIPASS devices), while other DIGIPASS devices – specifically, smart card readers –
use a secret value from another valid source, i.e. a smart card.
VACMAN Controller is the server-side component of the OneSpan authentication solution, installed on the com-
puter or back-end system of the ASP. This VACMAN Controller software can be installed as an appliance, a server
component, a middleware component, or an application programming interface (API). Electronic signatures and
one-time passwords generated by the DIGIPASS client devices are verified by the VACMAN Controller software.
Application service providers assign DIGIPASS client devices to holders, based on the serial number of the DIGIPASS
and the holder’s ID. Each DIGIPASS device is delivered in a controlled way to the holder, together with a manual
and (optionally) the PIN. To use the DIGIPASS, the holder needs to be in possession of the DIGIPASS, to know the
PIN to access applications run by the , and to have a connection to the VACMAN Controller software.
The VACMAN Controller software knows which secret is loaded in each DIGIPASS. These secrets are transported ini-
tially in an encrypted way to the ASP and then stored in a database run together with the VACMAN Controller soft-
ware. In this process the DIGIPASS serial number is used as reference for the secrets.
IDENTIKEY Appliance can be integrated within an organization's existing security infrastructure (see Image 2:
OneSpan Global Integrated Solution). The services supported by the IDENTIKEY Appliance are explained below.
SDK-based web applications supported by the IDENTIKEY Appliance using the SOAP protocol include:
For more information about client components, see 30. Client Components.
Password Synchronization Manager (PSM) synchronizes password changes from Windows user accounts to the
IDENTIKEY Appliance (see 2.12. Static Password Management).
LDAP user synchronization supports automatic creation and updating of user accounts on the IDENTIKEY Appliance
from records stored on an LDAP servers such as NetIQ eDirectory and Microsoft Active Directory (see 25.
LDAP User Synchronization).
back-end authentication is supported by the IDENTIKEY Appliance for RADIUS servers and LDAP servers, e.g. NetIQ
eDirectory, Microsoft Active Directory, IBM Security Directory Server Access Manager (see 3.7. Back-End Authentic-
ation.
The Message Delivery Component is necessary to support Virtual Mobile Authenticator authentication (see 23.
Message Delivery Component).
The VASCO Customer Portal handles licensing, updating and remote support for the IDENTIKEY Appliance (see
2.14. VASCO Customer Portal).
Note
Data Migration Tool is available for converting records from other OneSpan products to the IDENTIKEY Appliance.
For more information contact your IDENTIKEY Appliance supplier (see 37. Support Procedure).
A DIGIPASS authenticator is a device for providing one-time passwords (OTPs) and Electronic Signatures to a user.
An organization can provide its users with DIGIPASS authenticators to ensure that the users log in to secure sys-
tems via strong authentication. The DIGIPASS authenticator provides the OTPs and the DIGIPASS users can use
these OTPs instead of or in addition to a static password for the login. With devices that support this functionality,
authentication transactions can be performed via the Secure Channel feature of IDENTIKEY Authentication Server
and DIGIPASS authenticators. For more information about Secure Channel, see 2.5.5. Secure Channel Feature.
In addition, a DIGIPASS authenticator can also be used to sign transaction data. Here, the user manually enters key
details of the transaction into the DIGIPASS authenticator . The user then enters that signature into a transaction
confirmation page to confirm that the transaction is authorized.
Virtual Mobile Authenticator is a mechanism where an OTP is generated by the server and sent to the user's mobile
phone or email account. In this case, a physical DIGIPASS device is not needed.
A software DIGIPASS authenticator may be installed as a DIGIPASS Application onto an existing non-OneSpan plat-
form (such as a computer, smartphone, or other mobile device). It can be used to generate an OTP or a signature
in the same way as a physical DIGIPASS authenticator.
Each DIGIPASS authenticator is programmed with at least one DIGIPASS Application and a unique secret . The
DIGIPASS Application uses this unique secret when generating a one-time password (OTP) or an Electronic Sig-
nature.
Each type of DIGIPASS Application generates OTPs or signatures from different data, and in slightly different ways:
Response-Only
Creates an OTP based on the current date and time or on the number of uses (i.e. events).
Challenge/Response
Creates an OTP (also referred to as a response) based on a numerical challenge given on a login page. This
challenge may be either of two things:
Signature
Electronic Signature DIGIPASS Applications are typically used in online banking. The DIGIPASS authenticator
creates a unique code – i.e. an Electronic Signature – based on a number of transaction data fields entered
plus (optionally) the date and time or events.
Multi-Mode
A Multi-Mode DIGIPASS authenticator can be used on all of the above modes. This setting is used mainly for
DIGIPASS for Web (see 2.4.2.1. Software DIGIPASS Types).
A hardware DIGIPASS authenticator is a device specifically designed to create OTPs and digital signatures. Each
hardware DIGIPASS authenticator can be used for the following and digital signature methods:
n Response-Only
n Challenge/Response
n Signature
DIGIPASS 760 protects online banking services by allowing the bank to establish a secure optical communication
channel with the client. The device uses a unique visual challenge contained in a graphical cryptogram, a color QR
code, consisting of a matrix of colored dots. The user scans the color QR code with the device's built-in camera to
generate the signatures for activations and transactions.
DIGIPASS GO 215 and DIGIPASS 785 protect online banking services by allowing the bank to establish a secure com-
munication channel with the client using Bluetooth low energy (BLE).
IDENTIKEY Appliance supports EMV-CAP compliant smart cards and card readers (see 7. EMV-CAP).
Software DIGIPASS authenticators are software versions of DIGIPASS that provide authentication and signature func-
tions for mobile devices and web browsers. They generate a one-time password or Electronic Signature for you in
the same way as a hardware DIGIPASS.
A software DIGIPASS authenticator may be installed as a DIGIPASS Application onto an existing non-OneSpan plat-
form (such as a computer, smartphone, or other mobile device). This effectively makes the device emulate a hard-
ware DIGIPASS. The user then accesses the installed DIGIPASS Application to obtain a one-time password (OTP) or
Electronic Signature. For more information about hardware DIGIPASS, refer to 2.4.1. Hardware
DIGIPASS authenticator. To be ready for use, each software DIGIPASS requires:
Once installed on a host device, software DIGIPASS will need to be activated via an activation code. Once activ-
ated, the device can then be used to generate one-time passwords and Electronic Signatures. Software delivery
and activation of the software DIGIPASS authenticator takes place in the course of the provisioning process - refer
to Chapter 5. Software DIGIPASS Provisioning for more information on this.
A software DIGIPASS authenticator typically supports the following DIGIPASS Application types:
n Response-Only
n Challenge/Response
n Signature
The distribution of a software DIGIPASS authenticator is controlled by IDENTIKEY Appliance using provisioning scen-
arios (see 5. Software DIGIPASS Provisioning).
DIGIPASS App
DIGIPASS App is a two-factor authenticator for OTP generation. The OTP the DIGIPASS App displays can be
used as back-up authentication mode when the push–notifcation-based authentication does not succeed.
The DIGIPASS App is activated with a color QR code, and can be protected either with fingerprint recognition or
a PIN code, depending on the available mobile device functionalities. DIGIPASS App can contain multiple
DIGIPASS instances and can be installed on several mobile devices, allowing the use of multiple devices for
the login process. For more detailed information, refer to the DIGIPASS App Getting Started Guide.
The DIGIPASS App is used for push–notification-based authentication. For more information on this, refer to
2.5.6. Push Notification via the DIGIPASS App and 3.6.2.6. Push–Notification-Based Authentication Process.
For detailed information on the Push Notification feature, required components, and the setup with IDENTIKEY
Authentication Server and its components , refer to the Push Notification Getting Started Guide.
The distribution of the Java applet used with DIGIPASS 110 is handled by IDENTIKEY Appliance using provisioning
scenarios similar to software DIGIPASS authenticators (see 5. Software DIGIPASS Provisioning).
Using Virtual Mobile Authenticator means that a user may receive a one-time password (OTP) via:
n Email
n SMS (over a mobile phone)
n Voice message (over a landline or mobile phone)
n Primary Virtual Mobile Authenticator. Treated by IDENTIKEY Appliance almost identically to hardware and
software DIGIPASS authenticator – a record of each Primary Virtual Mobile Authenticator must be imported
into the data store, and may then be assigned to a user automatically or manually. Users will typically log
in with their user ID and static password, have an OTP sent to their phone or email account, and then enter
the received OTP in the second stage of their login.
n Backup Virtual Mobile Authenticator. This feature allows users to request an OTP sent to their phone or
email account if they do not have their usual DIGIPASS authenticator at hand. It may be limited by number
of uses or days of use, e.g. users may be limited to 2 days usage, after which they will again need to use
their usual DIGIPASS authenticator to log in.
The standard licensing model applies to models of the DIGIPASS authenticator that are pre-provisioned ex factory,
and software DIGIPASS using standard one-step activation.
The standard activation process involves generating an activation code and sending it to a software DIGIPASS sep-
arately or as part of the full activation data.
As of version 3.7, IDENTIKEY Authentication Server supports a new model for licensing and activating a
DIGIPASS authenticator: Multi-Device Licensing and Multi-Device Activation.
This new licensing and activation model applies to the following models of the DIGIPASS authenticator:
Note
The new functionalities introduced in the context of Multi-Device Licensing, Multi-Device Activation, and the
Secure Channel feature are aimed at the banking security market only. This implies that certain of these func-
tionalities will not be available for typical enterprise security deployments.
Warning
The Multi-Device Licensing and Multi-Device Activation functionality using the Secure Channel feature requires a
SOAP provisioning and / or SOAP signature license!
With the Multi-Device Licensing model and its one-to-one relationship between a user account and a DIGIPASS
serial number license, a user account can optionally be bound to several DIGIPASS instances. Multi-Device Activ-
ation, which is an activation process in two steps, guarantees that only the intended end user can perform the
device activation.
With the Multi-Device Licensing model, each DIGIPASS serial number corresponds to a unique DIGIPASS license;
consequently, for each DIGIPASS device compliant with the Multi-Device Licensing model, the corresponding .dpx
file contains one DIGIPASS master activation application for each DIGIPASS license. These DIGIPASS instances are
represented in IDENTIKEY Authentication Server as DIGIPASS with a single DIGIPASS master activation application.
One DIGIPASS license allows to instantiate several DIGIPASS instances bound to the same DIGIPASS license.
DIGIPASS instances are not different from DIGIPASS activated in the standard process with regard to the rep-
resentation of DIGIPASS applications. IDENTIKEY Authentication Server creates the DIGIPASS instance(s) for a par-
ticular license during the Multi-Device Activation process.
The number of instances that can be activated for each DIGIPASS license is limited to a predefined threshold which
is configured by OneSpan at the time of order. A maximum number of 99 instances can be configured, and each
DIGIPASS instance can have from 1 to 8 DIGIPASS authentication or e-signature application(s). These DIGIPASS
instances are represented in IDENTIKEY Authentication Server as DIGIPASS with the same base serial number as
the bound DIGIPASS license, appended with the instance sequence number.
In the Multi-Device Activation process, two separate activation messages are used for activating the device(s). This
serves to guarantee that only the intended end user, and not an adversary who has intercepted one of the mes-
sages, can perform the activation. Multi-Device Activation is a different process from the standard software
DIGIPASS activation and requires DIGIPASS devices and .dpx files compliant with the Multi-Device Licensing model.
When a compliant DIGIPASS device is activated, settings and secrets are written into the device.
Note
Both activation messages should be delivered to the end user via authentic channels. For instance, Activation
Message 1 should be delivered via a secure letter or e-mail and Activation Message 2 should be delivered via the
online banking application.
Activation Message 1 may be used several times to allow activation of multiple DIGIPASS instances (of one
DIGIPASS license) on multiple DIGIPASS devices, if necessary. The validity period for Activation Message 1 is con-
figurable in your IDENTIKEY Authentication Server policy. On the other hand, Activation Message 2 can be used for
effective activation for one DIGIPASS instance only.
Note
Each DIGIPASS license will be used several times for activation of several DIGIPASS instances (in several DIGIPASS
devices) for one user account; however, only one license will be consumed for the activation of the different
DIGIPASS instances for one user account.
Secure Channel is an optional feature applicable to DIGIPASS devices compliant with the Multi-Device Activation
process (in the context of Multi-Device Licensing). The optional use of the secure channel feature after activation
of a DIGIPASS instance allows protecting the messages that are exchanged between the server- and the client-
side.
Note
The secure channel will be usable only if the Secure Channel feature has been ordered from and configured by
OneSpan at the time of order.
The Secure Channel feature applies a new protocol that uses payload keys to protect the confidentiality and
authenticity of the message's payload. A single master payload key is shared among all DIGIPASS instances linked
to a certain DIGIPASS license, enabling the end user to transparently use multiple DIGIPASS devices to answer the
transaction request message.
The Secure Channel feature requires the mandatory provisioning of a payload key represented on the server-side
by a payload key BLOB. In this case, first a payload key will have to be generated once for each DIGIPASS license.
The different DIGIPASS instances activated from one DIGIPASS license must share the same payload key. After the
activation, the payload key will protect the request and deactivation messages for exchange between the server
and the client devices that have been activated using a particular DIGIPASS license (for a particular user account).
The parameters used to generate the request body for Secure Channel messages can be configured via the Secure
Channel tab in the policy properties page of the Administration Web Interface.
If the Secure Channel feature has not been ordered, IDENTIKEY Authentication Server will not generate and pro-
vision any payload key.
IDENTIKEY Authentication Server supports authentications via Push Notification - this authentication method uses a
push mode to enable the DIGIPASS App on a mobile device to authenticate the user. Refer to 3.6.2.6. Push–Noti-
fication-Based Authentication Process for an overview of the push–notification-based authentication process. For
detailed information on the DIGIPASS App, refer to the DIGIPASS App and DIGIPASS for Mobile product documents;
for detailed information on the Push Notification feature and required components, refer to the Push Notification
Getting Started Guide , which is part of the IDENTIKEY Authentication Server documentation suite. For detailed
information how to activate the DIGIPASS App and the required steps to upgrade the DIGIPASS App to enable Push
Notification, refer to the OneSpan User Websites Administrator Guide.
2.6. Server-Side
IDENTIKEY Authentication Server supports the deployment, use and administration of OneSpan DIGIPASS tech-
nology. It is designed to be easily usable with online applications and has a web-based Administration interface.
IDENTIKEY Appliance secures internal and remote access to network applications, and remote access to applic-
ations offered online. It is a stand-alone appliance providing an authentication solution based on IDENTIKEY
Authentication Server. Together with DIGIPASS technology providing the client-side component, the solution deliv-
ers strong two-factor authentication.
IDENTIKEY Appliance is a simple and cost-effective solution, which can easily be integrated into existing IT infra-
structures to support authentication in small to medium sized enterprises. The product integrates new usability fea-
tures described as a Configuration Tool together with the IDENTIKEY Authentication Server software, including:
n simple licensing
n backup and restore functionality
n real time feedback on system status with statistics
n IDENTIKEY Appliance Administration Web Interface, for system administrators to manage the daily
use of the system
n IDENTIKEY Appliance Rescue Tool, intended for administrators to manage some limited settings
Additionally the IDENTIKEY Appliance can call on back-end authentication with RADIUS or LDAP (for example
Microsoft Active Directory or NetIQ eDirectory).
n RADIUS
n SOAP
n SEAL
RADIUS
The RADIUS protocol can support three services (RADIUS AAA):
n RADIUS Authentication is supported by IDENTIKEY Appliance (see 3.10. Supported RADIUS Protocols.
n RADIUS Accounting is supported by the IDENTIKEY Appliance. With a RADIUS back-end server, Accounting
requests are forwarded to the back-end server and handled by proxy. Without back-end authentication,
audit messages are generated.
n RADIUS Authorization handles requests for an authentication client to use a particular service. In the
RADIUS protocol, 'attributes' are used for authorization and configuration of the remote access session in
many cases. IDENTIKEY Appliance can return authorization attributes from the DIGIPASS user account, or
these attributes may be retrieved from a separate RADIUS server (i.e. a RADIUS back-end server).
An existing RADIUS server may be used as a Back-End System to allow dynamic creation of DIGIPASS user
accounts and verification of static passwords, or to retrieve RADIUS attributes for a user (see 3.8. User
Attributes).
SOAP
SOAP over HTTPS versions 1.1 and 1.2 are supported. Document Literal binding is used. A variety of SOAP cli-
ent SDKs have been tested.
SEAL
The SEAL protocol is a proprietary OneSpan protocol used by IIS module.
IDENTIKEY Virtual Appliance is a virtualized version of the physical IDENTIKEY Appliance supporting the most pop-
ular hypervisor products. It delivers the same security features and functionality as the standalone hardware
IDENTIKEY Appliance offering the benefits of virtualization, e.g. cost savings and rapid development and pro-
visioning.
IDENTIKEY Appliance can be used in a RADIUS environment in a number of ways, depending on your company's
requirements.
In the RADIUS protocol, attributes are used for authorization and configuration of the remote access session in
many cases. IDENTIKEY Appliance can return authorization attributes from the DIGIPASS user account; altern-
atively, a separate RADIUS server can provide these attributes instead.
In many cases, a RADIUS Client may be a dial-up Network Access Server (NAS), firewall/VPN appliance, Wireless
Access Point, or another device that uses the RADIUS protocol for user authentication. Some software applications
can also use RADIUS for authentication, and can therefore also act as RADIUS Clients.
n PAP
n CHAP
n MSCHAP
n MSCHAP2
Warning
When integrating IDENTIKEY Appliance into a RADIUS environment to provide authentication services, DIGIPASS
deployment should be done in accordance with only the following described scenarios. Deviating from these
advised scenarios may result in security vulnerabilities (e.g. brute force attacks).
In this scenario, IDENTIKEY Appliance retrieves RADIUS attributes from the DIGIPASS user account and returns them
with an Accept message to the RADIUS client.
This scenario can be implemented with the following supported password protocols:
n PAP
n CHAP
n MSCHAP
n MSCHAP2
This scenario is identical to 2.7.1. Stand-Alone: RADIUS Attributes from DIGIPASS User Account, except that it does
not use RADIUS attributes to authenticate users.
Using this method, the user only enters their OTP (and PIN, when required). IDENTIKEY Appliance has to learn the
static password for the user; as such, when the user gives the correct OTP, IDENTIKEY Appliance can send the
static password to the RADIUS server.
The Wireless RADIUS method can be used if one of the supported protocols is used. For a list of supported
RADIUS protocols, refer to 3.10. Supported RADIUS Protocols.
In this scenario, a RADIUS server acts as a proxy for authentication, effectively delegating the authentication pro-
cess to IDENTIKEY Appliance. The RADIUS server provides the authorization attributes after IDENTIKEY Appliance
has accepted the user credentials.
n The RADIUS server supports the proxying of authentication while returning attributes itself
n The RADIUS server can forward authentication request using one of the supported password protocols (as
listed in Supported password protocols).
n The RADIUS server supports an access-challenge response from IDENTIKEY Appliance, if required. The
access-challenge mechanism is used for challenge/response and Virtual Mobile Authenticator, although it
is still possible to use Virtual Mobile Authenticator without that mechanism.
If the RADIUS server is capable, this scenario allows IDENTIKEY Appliance to operate in an environment that uses
certificate-based EAP protocols such as PEAP and EAP-TTLS. To make this work, the RADIUS server decrypts the
user credentials into a simpler protocol before forwarding the request to IDENTIKEY Appliance.
After validating the one-time password, IDENTIKEY Appliance forwards requests to a RADIUS server in order to
retrieve authorization attributes. It is necessary to provide a static password to the RADIUS server to achieve this.
There are two methods of implementing this scenario:
Image 24: RADIUS Server as Back-End Server (Users Log In with OTP Only)
n One of the supported password protocols is used (as listed in Supported password protocols).
n The static passwords can be 'learnt' by IDENTIKEY Appliance.
If the password protocol PAP is used, IDENTIKEY Appliance has the ability to learn the static passwords auto-
matically. The user then has to perform at least one login with their static password; if the RADIUS server
accepts the password, IDENTIKEY Appliance can learn it.
However, if one of the other password protocols is used, this process is not possible. In that case, there are a
few other ways in which the passwords can be learnt, through administrative data entry or using the OneSpan
User Websites.
Image 25: RADIUS Server as Back-End Server (Users Log In with Both Password and OTP)
This method can be used if the PAP password protocol is used. This is because IDENTIKEY Appliance uses
both CHAP and MSCHAP to hash the password and OTP together inseparably.
SOAP and SEAL can be used in a web environment. SOAP is available with IDENTIKEY Appliance,the SDK and the
DIGIPASS Authentication Modules such as DIGIPASS Authentication for Citrix StoreFront or DIGIPASS Authentication
for IIS Basic. SEAL supports the Citrix Web Interface.
IDENTIKEY Appliance has a SOAP module that can be used to integrate IDENTIKEY Appliance with web applications.
The IDENTIKEY Appliance SOAP Interface allows the following IDENTIKEY Appliance functions to be integrated into
web applications:
n User Authentication
n Signature Validation
n Software DIGIPASS Provisioning
n Administration
n Reporting
DIGIPASS Authentication for IIS Basic is an add-on designed for use with Microsoft Internet Information Services
(IIS). It can be configured to intercept authentication requests and redirect them to IDENTIKEY Appliance. DIGIPASS
Authentication for IIS Basic verifies the credentials with IDENTIKEY Appliance first.
Normally, this means verifying the one-time password. If the OTP is valid, then IDENTIKEY Appliance passes the
static password back to IIS as if the user had entered it, and the normal website authentication process completes
the login.
To enable verification via IDENTIKEY Appliance, it is necessary to provide a static password (typically the Windows
password) to IIS. There are two methods of implementing this:
IDENTIKEY Appliance can automatically learn the static Windows passwords. The user has to perform at least
one login with their static password – if this password is validated by Windows, IDENTIKEY Appliance can
learn it.
The same process can also be used if the static passwords are held in a RADIUS server. However, the
IDENTIKEY Appliance license must have RADIUS support activated for this to be enabled.
This process is not possible if the static passwords are not Windows or RADIUS passwords. Such passwords
will need to be manually entered.
This method may be necessary when the static passwords are not Windows passwords, e.g. NetIQ eDirectory
passwords. It also may be suitable if you do not want IDENTIKEY Appliance to store your users' Windows pass-
words.
Note
IDENTIKEY Appliance strongly encrypts Windows passwords whenever it is configured to store them.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that to be GDPR-
compliant, the respective DIGIPASS Authentication Modules must have use SSL enabled in the DIGIPASS
Authentication Configuration Center.
If tracing or diagnostic log files are used, ensure to configure log file rotation.
DIGIPASS Authentication for Windows Logon provides strong authentication when logging on to Windows client
computers.
IDENTIKEY Appliance supports authentication over a wireless connection, using the RADIUS protocol (see Chapter
34. Wireless RADIUS).
2.11. EMV-CAP
IDENTIKEY Appliance supports three EMV-CAP compliant DIGIPASS applications, or modes (see Chapter 7. EMV-
CAP).
n If you are using LDAP-based Microsoft Active Directory back-end authentication and want to prevent the
use of static passwords entirely, the password randomization feature can be used (see Section 6.5. Pass-
word Randomization). Password randomization replaces the user's static password with a randomized
password, unknown to the user. This forces use of the DIGIPASS OTP for future authentication.
n If you have certain applications that do not allow integrating one-time password authentication, so that
password randomization is not possible (as users would no longer know their static passwords),
IDENTIKEY Appliance needs to learn and update the static password.
n Manually by setting up LDAP back-end authentication, users can enter their static password and
DIGIPASS OTP on first logon, and whenever the static password is changed. From the length of
the entry for logon, IDENTIKEY Appliance recognizes when a password needs to be stored or
updated.
n Automatically using Password Synchronization Manager.
Password Synchronization Manager (PSM) synchronizes password changes from Windows user accounts to the
IDENTIKEY Appliance. Password Synchronization Manager is installed on the domain controller and allows changes
to the Windows password to be automatically updated on the IDENTIKEY Appliance. The new Windows password
is reflected as the static password on the IDENTIKEY Appliance. When the Windows password is changed, it is
updated on the domain controller. Password Synchronization Manager checks if the IDENTIKEY Appliance is avail-
able before sending the new password so that the database can be updated.
For more information refer to the Password Synchronization Manager guides (see Section 1.1. IDENTIKEY Appli-
ance Documentation Set).
A license is necessary to enable the IDENTIKEY Appliance server module and certain client-side components.
n Evaluation license, which lasts for a finite length of time and allows you to evaluate the product.
n Commercial license, which is the full operating license.
IDENTIKEY Appliance requires a license key for each component. The license key comes as part of the license, and
is stored in the record in the data store. It is tied to the location (IP address) where the is installed—IDENTIKEY
Appliance listens on this IP address for requests, e.g. authentication requests.
IDENTIKEY Appliance will not authenticate a user without a valid license key, except to permit administration and
reporting.
The following items need to be enabled in the license key for the service to be available:
n RADIUS
n SOAP
n Authentication Scenario
n Electronic Signature Validation Scenario
n DIGIPASS Authentication for Windows Logon
n EMV-CAP
n HSM
Note
The license can be viewed in the Administration Web Interface, in the server component record (see 31. Server
Components).
SEAL service does not require a server license and is activated by default.
Some client components—such as the DIGIPASS Authentication Modules or DIGIPASS Authentication for Windows
Logon—require a license key to be loaded into their client component record. IDENTIKEY Appliance, to which they
connect, will otherwise reject all authentication requests from them.
n DIGIPASS Authentication for Windows Logon is a pre-defined SOAP-based client component used for
DIGIPASS Authentication for Windows Logon 2.x. Client component records of this type require a valid cli-
ent component license.
A client component record of this type with location default is automatically created during installation. If
the client component used to serve an authentication request by a DIGIPASS Authentication for Windows
Logon client does not have a client component license, IDENTIKEY Appliance falls back on the client com-
ponent record with the default location. If the default client component record has no valid license loaded
either, the authentication request is rejected.
n Identikey Windows Logon Client is a pre- defined SEAL- based client component used for DIGIPASS
Authentication for Windows Logon 1.x. Client component records of this type do not require a client com-
ponent license. However, the SEAL and Windows Logon options must be enabled in the IDENTIKEY Appli-
ance license.
DIGIPASS Gateway
DIGIPASS Gateway is a pre-defined SOAP-based client component used for DIGIPASS Gateway clients in the
context of Push Notification. Unlike other SOAP clients it does require a valid license key in the client com-
ponent record. However, it does not require SOAP authentication to be enabled in the IDENTIKEY Appliance
license.
For more information about client component licensing, see 30. Client Components.
With the purchase of a commercial license, the licensing process requires the maintenance reference, serial num-
ber, IP address and other appliance-specific data to be registered on the VASCO Customer Portal. This information
identifies the appliance to OneSpan for the issue of a license file, which can be uploaded to make the fully oper-
ational. licensing is supported through the Licensing wizard (see Chapter 11. Licensing).
With an evaluation license, the licensing process does not require a maintenance reference or serial number. The
IP address and other information need to be registered on the VASCO Customer Portal. A license file is issued,
which can be uploaded to make the IDENTIKEY Appliance fully operational. Licensing is supported through the
Licensing Wizard (see Chapter 11. Licensing).
Full functionality is available with an evaluation license for 45 days. After 45 days, the IDENTIKEY Appliance ser-
vices are made unavailable, although the Configuration Tool and the Administration Web Interface are accessible
for configuration and management.
Image 28: Connection Between the IDENTIKEY Appliance and VASCO Customer Portal
n Licensing. This does not require direct connection to the IDENTIKEY Appliance. Licensing is supported
through the Licensing Wizard (see Chapter 11. Licensing).
n Updating. This can be online, i.e. with a direct connection to the VASCO Customer Portal, or offline, i.e.
without a connection (see Chapter 16. Updating).
n Remote support. This requires a direct connection or use of a proxy server (see Section 24.2. Remote Sup-
port).
For a direct connection between the IDENTIKEY Appliance and the VASCO Customer Portal, settings on your organ-
ization's firewall needs to be adjusted (see Image 28: Connection Between the IDENTIKEY Appliance and
VASCO Customer Portal). For more information about the firewall ports used by IDENTIKEY Appliance refer to the
IDENTIKEY Appliance Administrator Reference.
The IDENTIKEY Appliance must be able to resolve the VASCO Customer Portal address (https://cp.onespan.com/) to
an IP address, i.e. the DNS server settings must be properly configured (see Chapter 10. Installation Con-
figuration).
IDENTIKEY Appliance contains features which support the following PCI-DSS compliance requirements:
n Local authentication: IDENTIKEY Appliance uses information from its own data store
n Back-end authentication: IDENTIKEY Appliance consults a back-end system to verify login information
The exact authentication process used by IDENTIKEY Appliance will vary depending on the applicable policy and
the DIGIPASS user account.
The following process overview describes how IDENTIKEY Appliance authenticates DIGIPASS users:
1. Verify that a client component record for the client application sending the authentication request exists in
the data store (see 3.3. Identifying the Component Record).
2. Determine which policy applies for the client component record (see 3.4. Identifying a Policy).
3. Perform several user checks (see 3.5. Looking Up and Checking the DIGIPASS User Account):
n Windows username/domain resolution (if used)
n Existence of a DIGIPASS user account
n Status of DIGIPASS user account (disabled, locked, expired, possible unlock)
4. Local authentication: If local authentication is used, authentication can occur in two ways (see 3.6. Local
Authentication):
n With a DIGIPASS authenticator: Verify a one-time password (OTP), Challenge/Response, or Virtual
Mobile Authenticator login.
n Without a DIGIPASS authenticator: Verify a static password.
5. back-end authentication: Check the provided password with another back-end system (see 3.7. Back-
End Authentication).
6. (OPTIONAL) If a Challenge/Response or Virtual Mobile Authenticator login is needed, provide a challenge or
OTP.
7. Audit and return the authentication result.
During the last step of the authentication process, IDENTIKEY Appliance may perform relevant database updates,
e.g. DIGIPASS user account lock.
The following table illustrates the typical login process for the three basic login methods supported by IDENTIKEY
Appliance.
Component Type
A name provided by the SOAP application, or a fixed name such as RADIUS Client, Citrix Web Interface ,
Outlook Web Access or Administration Program.
Location
The source IP address of the request.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
The processes for looking up and verifying a component varies according to the type of component, as outlined in
3.3.1. RADIUS Client Component Check and 3.3.2. DIGIPASS Authentication Module Component Check.
Any RADIUS client which does not have an explicit component record will be handled using the default RADIUS cli-
ent component if it exists.
For a DIGIPASS Authentication Module component, IDENTIKEY Appliance checks whether a component record
for the DIGIPASS Authentication Module exists; if not, the request is discarded without responding:
For more information about client components, see 30. Client Components
Policies specify various settings that affect all request handling processes. Each request is handled according to a
policy, which is identified by the applicable client record. For more information, see 32. Policies.
Note
Policies can also be assigned to server components. However, this feature is not relevant for the authentication
process.
For a full listing of possible policy settings and the preloaded policies available with the IDENTIKEY Appliance, refer
to the IDENTIKEY Appliance Administrator Reference.
In the IDENTIKEY Appliance, DIGIPASS user accounts are identified using a user ID and a domain.
1. If entry fields for the user ID and domain are separate, name resolution ends and authentication con-
tinues. Otherwise simple name resolution continues in step 2.
2. If login uses a similar format to UPN: user@domain, simple name resolution continues to step 3. Other-
wise, default domain processing proceeds in step 5.
3. The IDENTIKEY Appliance searches for a domain record with the name given after the @ sign. If the domain
record is found, name resolution continues to step 4. Otherwise, default domain processing proceeds in
step 5.
4. The user ID and domain parts are separated out, name resolution ends and authentication continues.
5. If the Default Domain field has been configured for the policy, name resolution continues in step 6. Other-
wise, domain processing continues in step 7.
6. The user ID is used as entered, with the default domain from the policy. Domain resolution ends and
authentication continues.
7. The Master Domain is used, domain resolution ends and authentication continues. For more information
about the Master Domain, refer to Section 35.2. Master Domain and Practical Uses.
IDENTIKEY Appliance can use specific Windows Groups for authentication when all users are Windows accounts.
This Windows Group Check feature is optional, and might be useful in the following scenarios:
n DIGIPASS is deployed in stages. Users are not required to log in using a DIGIPASS until they are put into a
Windows group. Users can be placed into the group in manageable stages.
n Two-factor authentication is needed only for access to sensitive data, and access is granted to a specific
group of users (eg. administrators). This group of users will require DIGIPASS, and will be authenticated by
IDENTIKEY Appliance. Other users will be authenticated by another authentication method.
n Most users will have DIGIPASS and be permitted to log in to the system, but some users should not be
authenticated under any circumstances.
n Authentication is needed for the live Audit Viewer connection to IDENTIKEY Appliance (i.e. when using Act-
ive Directory as the data store). The Group Check can be used to limit which users are allowed to connect,
for example, to the Domain Admins group.
Nested Groups
IDENTIKEY Appliance supports nested groups for Windows Group Check in the context of Active Directory. For more
information on nested groups, refer to the Microsoft documentation.
Warning
Enabling Nested Groups may cause performance issues in IDENTIKEY Authentication Server, due to:
When Windows Group Check is active, users who are in one of the defined groups go through the full authen-
tication process. However, there are a few Group Check Modes that control the outcome for users who are not in
one of the groups. The Group Check Mode is defined in the policy.
One or more Windows Groups must be defined in the Windows Group List in the relevant policy. The list items can
be searched and edited , groups can be added and removed as required. Group membership is checked within the
user's own domain only; these groups must exist in each domain where there are users who need to be included
in a group.
Note
When Windows Group Check is used, the login will fail if the group check fails. This will occur for a user who is
unknown to Windows.
In effect, this means that such users do not need DIGIPASS user accounts, and they do not need to use a DIGIPASS
to log on. As soon as the group check indicates that the user is not to be handled, IDENTIKEY Appliance stops
authentication processing stops and returns a not handled result.
Pass back mode is suitable for staged deployment of DIGIPASS, and for cases where only certain users need strong
(DIGIPASS) authentication.
This mode is suitable for restricting which users are permitted to log in.
In this mode, IDENTIKEY Appliance will only use back-end authentication for users who are not in any defined/l-
isted groups.
Example
If RADIUS back-end authentication is used, the job of authenticating users not in the defined/listed groups is del-
egated to the RADIUS server. No lookup will be carried out for the DIGIPASS user account, and no further local
authentication will be carried out.
back-end authentication will be used for the out-of-group users, even if the policy setting for back-end authen-
tication is set to None. With such a policy setting, the in-group users would be authenticated only by local authen-
tication, while the out-of-group users would be authenticated only by back-end authentication. However, it is
necessary to define the Back-End Protocol Policy setting.
This mode is suitable for staged deployment of DIGIPASS, and for cases where only certain users need strong
(DIGIPASS) authentication.
IDENTIKEY Appliance verifies that a DIGIPASS user account for the user attempting to log in exists in the data store.
The user ID and domain resolution performed earlier determines the search criteria to look up the DIGIPASS user
account.
If a DIGIPASS user account is found, the account status is verified (see 3.5.5. Verify DIGIPASS User Account Status).
If no DIGIPASS user account is found, then policy settings will determine whether IDENTIKEY Appliance continues
processing the authentication request or rejects it:
n If local authentication is required, a DIGIPASS user account must exist. It is only possible to proceed if the
Dynamic User Registration feature is enabled (see 3.5.4. Dynamic User Registration).
n If local authentication is not required, authentication processing can proceed without a DIGIPASS user
account.
If the Local Authentication Policy setting is None, local authentication is not required. If it is set to DIGIPASS/Pass-
word during Grace Period, DIGIPASS or Password, or Digipass Only, local authentication is required.
For more information about local authentication settings, see 3.6. Local Authentication.
Dynamic User Registration (DUR) allows to create a DIGIPASS user account automatically when the user credentials
are validated using back-end authentication. The correct static password is sufficient to permit a DIGIPASS user
account to be created. DUR saves the administrative work of manually creating or importing DIGIPASS user
accounts.
n Auto-Assignment, where IDENTIKEY Appliance will select a random DIGIPASS authenticator and assign it to
the new DIGIPASS user account as it is created, or
n Self-Assignment, which will allow the new user to assign a DIGIPASS to their account as part of their login
process.
Note
When maker–checker authorization is enabled, assigning a DIGIPASS authenticator requires the approval of a
checker administrator. In that case, Auto-Assignment is not available.
For more information about DIGIPASS assignment features, see 28.3. Assigning DIGIPASS to Users.
In order to control the creation of new accounts, DUR can be used with the following features:
n Windows Name Resolution (mandatory for Active Directory)- this will prevent more than one DIGIPASS user
account being created for the same Windows user account, when they use different user ID formats to log
in.
n Windows Group Check , so that a staged creation of DIGIPASS user accounts and assignment of
DIGIPASS authenticator is achieved.
A typical DUR process using Auto-Assignment and Windows Group Check is illustrated below.
Note
If the data store is case-sensitive and IDENTIKEY Appliance has not been configured to convert user IDs and
domains to upper or lower case, it is possible for multiple DIGIPASS user accounts to be created for a single user
(when Dynamic User Registration is also enabled and configured).
For example, if IDENTIKEY Appliance is not configured to convert user IDs and domains to upper case and a user
logs in with jsmith on one occasion, and JSmith on another, two DIGIPASS user accounts may be created – jsmith
and JSmith.
Tip
LDAP Synchronization can be used as an alternative to Dynamic User Registration (see 25. LDAP User Syn-
chronization). However, there is a difference between these two methods:
Dynamic User Registration is a one-off synchronization. Deletion or modifications to a user account are not
updated in the back-end authentication system .
LDAP Synchronization supports ongoing synchronization of deletions or modifications to a user account in the
back-end authentication system.
IDENTIKEY Appliance verifies the status of the DIGIPASS user account found for the user attempting to log in.
2. If the DIGIPASS user account has expired because a specified expiration date has passed, the authen-
tication request is rejected.
3. If the DIGIPASS user account has been suspended due to inactivity, the authentication request is rejected.
IDENTIKEY Appliance can be configured to force a DIGIPASS user account to be suspended if it is not used
for a specified amount of time. The number of days that a DIGIPASS user account can remain unused
before being suspended can be configured in the policy used to log in. This value will be checked and the
number of days since the last login will be calculated. If the DIGIPASS user account has been unused for
too long, login will be denied.
4. If the DIGIPASS user account is locked, IDENTIKEY Appliance verifies whether a user auto-unlock attempt is
possible (see 27.8. DIGIPASS User Account Auto-Unlock).
If any unlock retries are left and the calculated lock duration since the last authentication request has
elapsed, IDENTIKEY Appliance assumes a possible user auto-unlock attempt and allows the authen-
tication request.
Local authentication is a term used to describe the IDENTIKEY Appliance authenticating a user based on inform-
ation in its data store. Typically the DIGIPASS one-time password is required, but in other cases a static password
may be sufficient.
The Local Authentication Policy setting indicates whether to perform local authentication, and if so, whether a
static password is permitted. This setting is overridden by the same setting in the DIGIPASS user account, unless
that has the value Default. However, this setting in the DIGIPASS user account would typically be used only for rare
special case users.
Note
The Local Authentication policy setting is relevant in the context of software DIGIPASS provisioning. For more
information, see 5. Software DIGIPASS Provisioning.
Using the Windows Group Check in Back-End mode, this setting can be overridden. If a user is not in the list of
groups, no local authentication will be performed.
The possible values for the local authentication setting are as follows:
Default
Local authentication is handled as configured in settings inherited from the parent policy. For more inform-
ation about policies, refer to 32.2. Policies.
None
No local authentication will take place.
DIGIPASS or Password
This authentication mode allows users to permanently use their static password or their
DIGIPASS authenticator, even after the grace period has expired and/or they have previously already used
their authenticator for authentication. In the context of the authentication scenario, use of this authentication
mode is subject to licensing. For provisioning, this authentication mode is license-free.
DIGIPASS Only
A DIGIPASS one-time password must be verified. Users without DIGIPASS will not be able to log in. However,
Self-Assignment is still possible, as an OTP is used as part of the process.
Note
It is also possible to configure user-specific policy settings local authentication. These settings will override those
set by the parent policy.
The first step of local authentication is to search for DIGIPASS records applicable to the login. Normally, this is a
simple search for all DIGIPASS assigned to the DIGIPASS user account. However, there are exceptions:
Application Names
This refer to a list of named applications. Only DIGIPASS that have one or more of the named applications will
be usable.
Application Type
This can be either Response-Only, Challenge/Response or Multi-Mode. If application Type is set to Response-
Only or Challenge/Response, only DIGIPASS with that application type will be usable. With Multi-Mode, all
application types will match.
DIGIPASS Type
This is a list of models, such as DPGO3, DIGIPASS 260. Only DIGIPASS from the listed models will be
usable. For a more extensive list of DIGIPASS models, refer to 2.4.1. Hardware DIGIPASS authenticator.
Therefore, it is possible that a DIGIPASS user account that has a DIGIPASS assigned will not be able to use that
DIGIPASS to log in, when a certain policy applies. Such a user will be regarded as without a DIGIPASS in that case.
In a different kind of login, a different policy may apply, with no restrictions. In that case, the same user would be
regarded as with a DIGIPASS.
Example
A company has GO 3 DIGIPASS (DPGO3) and Primary Virtual Mobile Authenticator (DPVTL). The Outlook Web
Access login permits both, so its policy does not restrict DIGIPASS Types. However the RADIUS VPN login requires
the Go 3, so its policy specifies DIGIPASS Type = DPGO3.
When an authenticating DIGIPASS user account is linked to another, the search for DIGIPASS will be done for the
other account.
Note
The linked DIGIPASS user account feature supports Response-Only and Challenge/Response authentication,
Authentication Signature, Push Notification Authentication, and Push Notification Transaction Data Signing.
Example
DIGIPASS user account 2 is linked to DIGIPASS user account 1. The DIGIPASS is assigned to DIGIPASS user account
1. When DIGIPASS user account 1 logs in, the DIGIPASS search is for that account. When DIGIPASS user account 2
When the DIGIPASS lookup returns at least one DIGIPASS record, authentication processing requires a valid one-
time password to succeed, unless:
In some cases a new Server PIN may need to be set. A user's Server PIN can be reset either manually by an
IDENTIKEY Authentication Server administrator, or in the course of assigning a DIGIPASS authenticator. When using
the DIGIPASS Self-Assignment or Auto-Assignment feature of IDENTIKEY Appliance, the user can reset their Server
PIN. When the Assignment Mode is set to Self-Assignment-Pin-Reset or Auto-Assignment-Pin-Reset, the user's
Server PIN is automatically reset. This is an optional feature and does not require any administrator action, once
the option has been enabled in the DIGIPASS properties and/or the relevant policy settings have been set accord-
ingly.
Server PIN run-time information is provided through the Administration Web Interface by selecting a specific
DIGIPASS record (see Table 2: Server Settings Regulating Server PINs).
PIN Enabled Factory default setting forcing a Server PIN to be used for login. (Only possible
if PIN Supported setting is active.)
PIN Change On Enables a user to change their Server PIN for this DIGIPASSdevice.
Force PIN Change Forces the user to change their Server PIN upon next login.
PIN Length The length of the current Server PIN.
PIN Minimum Length The minimum PIN length required by the server.
The following diagram illustrates the different Server PIN states and which user/administrator actions result in each
one:
When a server is in the PIN SET CHANGE FORCED state, its corresponding user is forced to change PINs upon login.
Once the user changes the PIN (user action <PIN><OTP><NewPIN><NewPIN>), the server state changes to PIN
SET.
For more information on other user and administrator actions that affect Server PIN states, refer to Section 28.4.
DIGIPASS Record Functions.
The grace period does not apply when the Local Authentication mode in a policy is set to Digipass Only. When local
authentication in the relevant policy is set to DIGIPASS/Password during Grace Period, the user can authenticate
with their static password until the grace period has expired; after that they can only authenticate with their
DIGIPASS authenticator. When local authentication is set to DIGIPASS or Password, users can choose to use either
their static password or their DIGIPASS authenticator, even if they have already used their DIGIPASS authenticator,
independent of grace period restrictions.
The grace period can be set during manual administrative assignment of DIGIPASS records as well as during Auto-
Assignment. The grace period does not apply to Self- Assignment , because the user must use the
DIGIPASS authenticator to complete the Self-Assignment process.
Example
The company has set up policies which require a Response-Only login via the local area network, and a Chal-
lenge/Response login via the internet; limited to certain employees. The local authentication mode is set to
DIGIPASS/Password during Grace Period.
Jane has two DIGIPASS authenticators assigned to her – a DIGIPASS 300 with the Challenge/Response applic-
ation enabled, and a DIGIPASS GO 3 with a Response-Only application. The DIGIPASS authenticators are both
assigned to her on Tuesday. Jane receives her DIGIPASS GO 3 on Friday, and immediately uses an OTP to login.
The grace period for her DIGIPASS GO 3 authenticator ends at that time – as of now she must use the DIGIPASS
GO 3 when logging into the intranet from the LAN.
Over the weekend, Jane needs to access the company intranet from home. Because a Challenge/Response
login is required via the internet and she does not yet have her DIGIPASS 300 authenticator, she uses only her
user ID and static password to log in. As she is still within the grace period for her DIGIPASS 300, the login is valid.
During the grace period, if OTP validation fails, the static password is checked. For more information on the static
password check during an authentication attempt, see Section 3.7. Back-End Authentication If the static password
is valid, local authentication succeeds. However, the overall login can still fail if back-end authentication is
enabled.
The password is compared against the DIGIPASS user account's password value. However, if the DIGIPASS user
account does not have a password set, the password has to be verified with back-end authentication. With back-
end authentication disabled and without a password in the DIGIPASS user account, grace period password logins
will not work.
If the passwords do not match and back-end authenticationis enabled, the password will be verified with back-
end authentication.
2-Step Challenge/Response
n This mode can be used for Web authentication, where Challenge/Response is supported. In this mode,
the authentication process takes place in two steps.
First, the user requests a challenge to be generated for them. The following policy settings define how this request
should be made:
n Request Method
n Request Keyword.
The challenge is generated specifically for their DIGIPASS and in accordance to the specified settings. For more
information about these settings, refer to 3.6.2.9. Request Method and Keyword.
Assuming that the request for the challenge is accepted and a challenge is returned, the user submits a second
step login with the response to the challenge as their OTP. This second step goes through the whole authen-
tication process again to verify the response.
1-Step Challenge/Response
This mode is also possible for Web authentication, where Challenge/Response is supported. In this mode, the user
sees only one logon step. This mode is suitable for time-based Challenge/Response, but is less secure for non-
time-based Challenge/Response. If an attacker manages to capture some valid responses, they can repeatedly
request new challenges until one they know comes up again.
In this mode, a random challenge is requested automatically by the Web application and presented to the user on
the login page. A general-purpose challenge is generated, without reference to any particular DIGIPASS' pro-
gramming. The user logs in with their response to the challenge as their OTP.
upon the Get Secure Challenge and Get Signing Request commands, and is bound to the
DIGIPASS authenticator selected for the relevant transaction. The client application then generates either a QR
code or a color QR code, which represents this request message, and delivers it to the end user, who scans this
image, using a DIGIPASS authenticator that is compliant with the Secure Channel feature. The
DIGIPASS authenticator generates a response for this request message which the end user enters into the client
application; IDENTIKEY Authentication Server validates this response and returns the result to the client application
which completes the signature authentication process.
For a typical user authentication process via Push Notification, the user initiates the authentication process by
providing their user ID/domain and a keyword, and enter their static password. The following policy settings spe-
cify how this request should be defined:
n Request Method
n Request Keyword
After receiving the corresponding request from the application server, IDENTIKEY Authentication Server generates
the required push notification message, and communicates this to the Message Delivery Component (MDC). The
MDC sends the Push Notification request to the OneSpan Notification Gateway. The DIGIPASS App retrieves the
push notification details from DIGIPASS Gateway and requests the user to confirm if they wish to log on to the spe-
cified client application. When the user confirms this and accepts the push–notification-based authentication, the
DIGIPASS App authenticates against IDENTIKEY Authentication Server via the DIGIPASS Gateway. IDENTIKEY
Authentication Server processes this request, and in case of success returns the authentication to the client applic-
ation; the user is informed via the client application that their authentication has succeeded.
For more information on this feature, refer to the DIGIPASS Push Notification - Getting Started Guide. For more
information on the DIGIPASS Gateway, refer to the DIGIPASS Gateway product documentation; for more information
on the DIGIPASS App, refer to the DIGIPASS App and DIGIPASS for Mobile product documentation.
First, the user requests an OTP to be generated and delivered to them. The following policy settings define how
this request should be made:
n Request Method
n Request Keyword
n Delivery method (SMS, Email, and/or Voice)
The OTP is then sent to the user's mobile phone number or email address recorded in the DIGIPASS user account.
For more information about Request Method and Request Keyword settings, refer to 3.6.2.9. Request Method and
Keyword.
Backup Virtual Mobile Authenticator have additional available restrictions on usage, to minimize the cost of usage.
These are verified before an OTP will be generated. The restrictions are described in Chapter 28. DIGIPASS.
Assuming that the request for the OTP is accepted and an OTP is generated and delivered successfully, the user
submits a second step login with the OTP. This second step goes through the whole authentication process again
to verify the OTP.
2-step Login
Two login prompts are used to provide an easy-to-use login interface for users with Virtual Mobile Authentic-
ator. The first prompt is used to request an OTP, and the second is for entering the received OTP. This can be
used with applications which support 2-step logins eg. Citrix Web Interface, RADIUS with support for Chal-
lenge/Response
For more information on the OTP Request Site, refer to the IDENTIKEY Authentication Server Websites Admin-
istrator Guide.
Note
If password is set for the Request Method, and a user's DIGIPASS is still within the grace period, IDENTIKEY Appli-
ance may process the authentication with the password only and not as a 2-Step Challenge/Response or Virtual
Mobile Authenticator login.
The static password in the request method is compared against the DIGIPASS user account's password value.
However, if the DIGIPASS user account does not have a password set, the password has to be verified with back-
end authentication. If there is no back-end authentication and no password in the DIGIPASS user account, the
request methods that use a password will not work.
If the passwords do not match and back-end authentication is enabled, the password will be verified with back-
end authentication.
The methods of requesting these three login processes can be the same. When it recognizes a request, the
IDENTIKEY Appliance will verify that there is a DIGIPASS capable of that login process. If there is not, it will ignore
the request.
For example, say that the request methods for Primary and Backup Virtual Mobile Authenticator are both defined
as keyword otp. A user has a Go 3 with Backup Virtual Mobile Authenticator enabled. When they login with the
keyword otp, the IDENTIKEY Appliance will produce a Backup Virtual Mobile Authenticator OTP, because the user
does not have a Primary Virtual Mobile Authenticator.
The following diagram illustrates an example of how DIGIPASS authenticators and applications can be assigned.
You can configure whether to allow the use of multiple DIGIPASS applications per user. By default, this setting is
enabled.
Note
As of version 3.7, IDENTIKEY Authentication Server also supports the DIGIPASS Multi-Device Licensing and Activ-
ation model.
One DIGIPASS license allows to instantiate several DIGIPASS instances bound to the same DIGIPASS license.
DIGIPASS instances are not different from DIGIPASS activated in the standard process with regard to the rep-
resentation of DIGIPASS applications. IDENTIKEY Authentication Server creates the DIGIPASS instance(s) for a par-
ticular license during the Multi-Device Activation process.
For more information on Multi-Device Licensing and Activation, refer to Section 2.5. DIGIPASS Licensing and Activ-
ation.
Aside from configuring whether multiple DIGIPASS applications per user is allowed, you can also restrict which
DIGIPASS Application is allowed for a specific policy. With this kind of restriction, IDENTIKEY Appliance will only
verify OTP against that type of DIGIPASS Application. So if a policy restricts allowed DIGIPASS Applications to
Response-Only, then IDENTIKEY Appliance will verify all OTP only against RO applications assigned to a user.
When considering whether to allow multiple DIGIPASS Applications per user and/or which DIGIPASS Applications to
allow, consider the following table. This table explains how IDENTIKEY Appliance authenticates OTP from each
DIGIPASS user account, given the following possible scenarios:
Table 3: OTP Authentication for Scenarios Involving Multiple and Single DIGIPASS Applications
Scenario DIGIPASS user account 1 DIGIPASS user account 2 DIGIPASS user account 3
Multiple DIGIPASS Applic- OTP is authenticated against all OTP is authenticated against all OTP is authenticated against
ations allowed, no policy DIGIPASS Applications from assigned DIGIPASS Applications from the DIGIPASS Application from
restrictions on DIGIPASS DIGIPASS authenticators. assigned DIGIPASS authenticators. assigned DIGIPASS authen-
Applications. ticators.
Multiple DIGIPASS Applic- OTP is authenticated only against OTP is authenticated only against OTP is authenticated against
ations allowed, only RO application1 of both assigned application 1 of assigned application 1 of
applications allowed. DIGIPASS authenticators. DIGIPASS authenticators. assigned DIGIPASS authen-
ticators.
Single DIGIPASS Applications IDENTIKEY Appliance detects multiple IDENTIKEY Appliance detects mul- OTP is authenticated against
allowed, no policy restric- DIGIPASS Applications assigned and tiple DIGIPASS Applications assigned DIGIPASS Application from
tions on DIGIPASS Applic- immediately fails the login attempt. and immediately fails the login assigned DIGIPASS authen-
ations. attempt. ticators.
Single DIGIPASS Applications IDENTIKEY Appliance detects multiple IDENTIKEY Appliance detects one RO OTP is authenticated against
allowed, only RO applications RO DIGIPASS Applications assigned assigned, and authenticates OTP DIGIPASS Application from
allowed. and immediately fails the login against this application. assigned DIGIPASS authen-
attempt. ticators.
When the DIGIPASS lookup does not return a DIGIPASS record, authentication processing requires a static password
check to succeed. In addition, Self- Assignment is possible when the DIGIPASS lookup does not return any
DIGIPASS.
Note
In this scenario, back-end authentication (if used) can still subsequently cause the overall login to fail.
However, if the DIGIPASS user account does not have a password set, the password has to be verified with back-
end authentication. If back-end authentication is disabled and there is no password in the DIGIPASS user account,
authentication without DIGIPASS cannot work. Similarly, during Dynamic User Registration (where there is no
DIGIPASS user account yet) the password has to be verified with back-end authentication.
If the passwords do not match and back-end authentication is enabled, the password will be verified with back-
end authentication.
If the Local Authentication setting is Digipass Only, static password verification on its own is not permitted. An OTP
must be used during login. This is possible using Self-Assignment.
3.6.3.2. Self-Assignment
A user can assign a DIGIPASS to their DIGIPASS user account using the Self-Assignment mechanism, when per-
mitted by the policy settings. The Assignment Mode setting must be Self-Assignment.
The Self-Assignment process is possible during Dynamic User Registration. It is also possible when the Local
Authentication setting is Digipass Only.
When using the DIGIPASS Self-Assignment or Auto-Assignment feature of IDENTIKEY Appliance, the user can reset
their Server PIN. When the Assignment Mode is set to Self-Assignment-Pin-Reset or Auto-Assignment-Pin-Reset,
the user's Server PIN is automatically reset. This is an optional feature and does not require any administrator
action, once the option has been enabled in the DIGIPASS properties and/or the relevant policy settings have been
set accordingly.
For a DIGIPASS that supports Response-Only the user needs to enter the following in the password login field,
depending on whether a Server PIN is needed or not:
For a DIGIPASS that supports only Challenge/Response this process requires two steps. In the first step, the static
password and serial number are given. This results in a challenge being returned. If the correct response is given
to the challenge, the self-assignment is successful.
n Step 1: SERIALNUMBERpassword
n Step 2: OTP
The SERIALNUMBER may be entered in one of two formats, depending on the Serial No. Separator Policy set-
ting:
n No separator specified – the full 10 digit serial number must be entered, with no dashes (-) or spaces; e.g.
0097123456.
n Separator value specified – the serial number can be entered as written on the back of the DIGIPASS; e.g.
9-712345-6.
Back-end authentication describes the process of checking user credentials with another system. It is used primar-
ily for:
n Enabling automatic management features such as Dynamic User Registration and Self-Assignment
n Static password verification for users who do not have a DIGIPASS and for Virtual Mobile Authenticator
n Retrieval of RADIUS attributes from a RADIUS server
n Password replacement to allow the user to log in with just a one-time password, in an environment where
the Windows password is required (e.g. Outlook Web Access)
n RADIUS
n Microsoft Active Directory (via LDAP)
n NetIQ eDirectory (via LDAP)
n IBM Security Directory Server (via LDAP)
The back-end authentication setting indicates whether to perform back-end authentication, and if so, when to do
it. This setting is overridden by the same setting in the DIGIPASS user account, unless that has the value Default.
However, this setting in the DIGIPASS user account would typically be used only for rare special case users.
Using the Windows Group Check in Back-End Mode, this setting can be overridden. If a user is not in the list of
groups, back-end authentication will be performed whether it is enabled or not.
The Back-End Protocol setting indicates which type of back-end authentication should be used. The possible val-
ues for the back-end authentication setting are as follows:
None
The IDENTIKEY Appliance will not utilize back-end authentication.
Always
The IDENTIKEY Appliance will use back-end authentication for every authentication request.
This setting is required, if you want to use offline authentication for DIGIPASS Authentication for Windows
Logon.
If Needed
back-end authentication will only be used in situations where local authentication is not sufficient and to sup-
port certain features:
Note
When a static password is used it is first verified with the stored static password, if one is used. If the static pass-
word matches the stored static password, no back-end authentication is carried out.
If the static password does not match the stored static password, or the stored static password is not available,
then back-end authentication will be performed.
The DIGIPASS user account has a Stored Static Password field. When back-end authentication is used, this field
can be used to:
n Store the static password required for back-end authentication. This means that the user does not need to
type in the static password at each login; they only need enter the OTP. The IDENTIKEY Appliance can
retrieve the stored static password from the DIGIPASS user account and use it for back-end authentication.
n Support password replacement. Back-end authentication is used to learn the static password so that it
can be replayed to the host system (eg. Outlook Web Access) when a successful OTP is given.
When the Stored Password Proxy setting is enabled in the policy, the IDENTIKEY Appliance will retrieve the stored
static password from the DIGIPASS user account. If back-end authentication is required for a login, the stored static
password will be used. If there is a host system (eg. Outlook Web Access), the stored static password will be
returned to it, for it to complete its login process.
However, if the user enters a static password in front of their OTP, the static password they enter will take pre-
cedence over the stored static password. In that case, the stored static password will not be used at all for that
login.
When the Stored Password Proxy setting is not enabled in the policy, the stored static password will not be used
for back-end authentication. If back-end authentication is required for a login, the user will have to enter the static
password. This is done in front of the OTP if an OTP is also used. Similarly, if there is a host system that requires a
static password to be returned, the user will have to enter the static password.
When the Password Autolearn setting is enabled in the policy, the IDENTIKEY Appliance will automatically store the
static password when it is verified by back-end authentication. This can happen at any time from Dynamic User
Registration onwards.
If the user's static password has changed in the back-end authentication system, they will need to provide the
new static password during their next login. This is done in front of the OTP if an OTP is used. When the IDENTIKEY
Appliance sees that the user has entered a static password, if it does not match the stored static password
already, back-end authentication will occur to verify the new password. If it is verified, the stored static password
will be updated.
A back-end server record is required when IDENTIKEY Authentication Server uses a RADIUS or LDAP server for
authentication. It is possible to create more than one back-end server record, for fail-over purposes. You can also
allocate different back-end servers for different user domains.
A back-end server record contains connection information for the system to be used. Typically, only one back-end
server record will be required for LDAP back-end authentication, whereas RADIUS back-end authentication will
require a record per RADIUS server to be used.
attempt to connect to the back-end server with the highest priority rating. If it is not available after the set number
of retries, the IDENTIKEY Appliance will attempt to connect to the back-end server with the next-highest priority rat-
ing.
If the IDENTIKEY Appliance repeatedly fails to get a response from a back-end server, it will ignore it for some
minutes before trying it again. Therefore, a temporary slow response will not prevent the IDENTIKEY Appliance
from using a back-end server. But a consistent availability problem will cause it to stop using the back-end server
for a while, when it has an alternative.
When the IDENTIKEY Appliance has to choose a back-end server, it will search for those records in the domain iden-
tified by the user ID and name resolution process. If any are found, it will only use those back-end servers for that
domain. If none are found, it will use the back-end servers that are not assigned to a domain.
IDENTIKEY Appliance can pass RADIUS return attributes from the back-end server to the client. Back-end authen-
tication is supported with the following protocols:
n PAP
n CHAP
n MSCHAP
n MSCHAP2 with MPPE key generation
IDENTIKEY Authentication Server also supports site awareness for Global Catalog-based Active Directory domain
controller lookup. IDENTIKEY Authentication Server queries the Global Catalog for all domain controllers serving the
user currently in process of back-end authentication and contacts the relevant domain controllers according to
their priority in the Global Catalog. In this context, IDENTIKEY Authentication Server identifies the network site to
which the machine that is running IDENTIKEY Authentication Server belongs. Those domain controllers that share
the same site with IDENTIKEY Authentication Server during back-end authentication take precedence over others.
When deploying Microsoft Active Directory with IDENTIKEY Appliance for back-end authentication, ensure that:
n After domain discovery, communication to the Active Directory server containing the user cre-
dentials will use SSL if and only if Enable SSL for Back-End Servers is selected in the Global Cata-
log Domain Discovery setting. You can also use the SSL Port option in this section to override the
port to be used for SSL communication. If not specified, IDENTIKEY Appliance will determine the
port number from DNS or the global catalog.
n IDENTIKEY Appliance must be configured to use the DNS server containing the DNS records of the Active Dir-
ectory server on the host OS.
n The user ID that is to be used to log in to the Active Directory back end during authentication must have
both search and update permissions for the data that is to be accessed. Also, for ANY group that uses
back-end authentication via LDAP and Active Directory, the permission List contents must be granted in
the Active Directory Users and Computers Extension to bind to Active Directory.
Table 4: Supported User Name Formats for Microsoft Active Directory
User ID Format User ID Source
UserID sAMAccountName attribute of the user
MYREALM\userid Fully qualified domain name + sAMAccountName attribute of
the user
[email protected] sAMAccountName attribute of the user + fully qualified
domain name
LDAP Configuration
The LDAP back end needs to be configured in order to allow the back end to authenticate via the LDAP protocol.
For instructions on how to do this, refer to the IDENTIKEY Appliance Administrator Guide.
Warning
When using Microsoft Active Directory as the back end and configuring LDAP back-end authentication with SASL-
DIGEST-MD5, the cyrus-sasl-md5 library must be installed to ensure connectivity between IDENTIKEY Authentic-
ation Server and Active Directory!
Note
For instructions on setting up a back-end server record for an Active Directory server, refer to the Administration
Web Interface online help.
The version of NetIQ eDirectory used for LDAP back-end authentication on IDENTIKEY Appliance must be version
8.8. In addition, the following rules must be followed to set up NetIQ eDirectory for LDAP back-end authentication
on IDENTIKEY Appliance:
n If anonymous binding is disabled on the NetIQ eDirectory server, the security principal DN has to be a NetIQ
eDirectory account that has the necessary permissions to search the directory for the user accounts that
have to be authenticated.
n Each user ID has to be unique below the search base distinguished name in the LDAP structure.
n Partitioning is not supported, although exactly the same search base distinguished name may be used on
different servers.
n NetIQ eDirectory must be enabled with universal password.
Table 5: Supported User Logon Format for NetIQ eDirectory
User ID Format Source of User ID
UserID User ID of the user
MYREALM\userid Fully qualified domain name + user ID of the user
[email protected] User ID attribute of the user + fully qualified domain name
Note
For more information about setting up a back-end server record for NetIQ eDirectory, refer to the Administration
3.7.8. IBM Security Directory Server Back-End Authentication Using LDAP Protocol
1. Identify the IBM Security Directory Server server based on the IBM Security Directory Server back end
records in IDENTIKEY Appliance.
2. Bind to IBM Security Directory Server using the security principal DN and password defined for the IBM
Security Directory Server back end record, if principal details specified.
3. Search the IBM Security Directory Server back-end server for the user to be authenticated based on the
User Object Class Name and the User ID Attribute Name defined on setup.
4. Try to authenticate with IBM Security Directory Server using a bind with the user ID and password of the
user to be authenticated.
If authentication fails, the attributes retrieved during the search will be used to determine the cause of the failure.
Note
When registering a IBM Security Directory Server back end for IDENTIKEY Appliance, ensure that the location
entered in the IBM Security Directory Server back end record (in the Administration Web Interface) is the same as
that shown on the Tivoli Web Administration > View Edit > Issued To > cn=<serverid>.
Note
IDENTIKEY Appliance only supports Simple binding with SSL as the client authentication mechanism for binding
with the supported instances of IBM Security Directory Server.
User attributes are used by IDENTIKEY Appliance to return specific information to a Client Component. There are
two types of user attributes available in IDENTIKEY Appliance:
n RADIUS attributes can be returned when handling authentication requests from a RADIUS Client.
n Custom user attributes can be returned to DIGIPASS Authentication Modules, DIGIPASS Plug-Ins and cus-
tom Web applications
User attributes may be set for each DIGIPASS user individually, or to a group of DIGIPASS users. For instructions on
adding user attributes to one or more DIGIPASS user account, refer to the online help in the Administration Web
Interface.
If the Client Component requests a Host Code and the DIGIPASS is capable of generating one, then IDENTIKEY
Authentication Server will generate a Host Code and the application will display it to the user. The user generates a
Host Code on their DIGIPASS and checks that it is the same as the one on the screen.
1. The DIGIPASS device generates a one-time password, and splits it into two parts. The first part is used for
end user authentication. The second part is the Host Code and is used for server authentication.
2. The end user sends the first part to the server as proof of identity and keeps the second part secret.
3. The server verifies the one-time password for end user authentication. If valid, the end user is authen-
ticated to the server. The server then computes the second part of the one-time password, i.e. the Host
Code.
4. The server sends the Host Code to the end user, who verifies (visually) whether it matches the Host Code
generated by the DIGIPASS device.
Host Code generation is passed as a parameter in the authentication request. This parameter has two options:
n PAP
n CHAP
n MSCHAP with MPPE (Microsoft Point-to-Point Encryption)
n MSCHAP2 with MPPE
n EAP-TTLSv0/PAP
n EAP-TTLSv0/CHAP
n EAP-TTLSv0/MSCHAP
n EAP-TTLSv0/MSCHAP2
n EAP-TTLSv0/EAP-MSCHAP2
n EAP-TTLSv0/EAP-GTC
n PEAPv0/EAP-MSCHAP2
n PEAPv0/EAP-GTC
n PEAPv1/EAP-MSCHAP2
n PEAPv1/EAP-GTC
Some protocols do not support all authentication features of IDENTIKEY Appliance. Refer to 3.11. Limitations of
RADIUS Support in IDENTIKEY Appliance for more information.
The following sections describe the caveats and limitations of IDENTIKEY Appliance in RADIUS support.
Some IDENTIKEY Appliance features are not supported with CHAP or MSCHAP. These protocols hash login data
together; this prevents separation of various entries.
n EAP-TTLSv0/CHAP
n EAP-TTLSv0/MSCHAP
n EAP-TTLSv0/MSCHAP2
n EAP-TTLSv0/EAP-MSCHAP2
n PEAPv0/EAP-MSCHAP2
n PEAPv1/EAP-MSCHAP2
The OneSpan User Websites, when utilized, can circumvent many of these problems by allowing users to manage
their account and DIGIPASS authenticators. Users can:
n Perform Self-Assignment
n Change their Server PIN
n Change their own Stored Static Password
A number of IDENTIKEY Appliance components provide international character support, and some limitations apply:
RADIUS
International character support in the IDENTIKEY Appliance using the RADIUS protocol is dependent on the
RADIUS Client(s) being used. If a RADIUS Client uses UTF-8 encoding, international characters will be fully sup-
ported. If a RADIUS Client uses a localized encoding (eg. ISO-8859-13), the same locale setting must be con-
figured on each machine.
If IDENTIKEY Appliance is used as an intermediary between a RADIUS client and RADIUS server, check the
encoding expected/required by the RADIUS server. If the RADIUS server requires any encoding format other
than UTF-8, you will need to configure IDENTIKEY Appliance accordingly.
Web
DIGIPASS Authentication for OWA, both Forms and Basic Authentication options, limit international character
support to a single configured encoding.
In IDENTIKEY Appliance, the HTTP Basic Authentication mechanism does not support a 2-step login process. In addi-
tion, Challenge/Response is also unsupported.
4. Signature Validation
IDENTIKEY Appliance will allow you to sign transaction data using Electronic Signatures generated via two meth-
ods:
An Electronic Signature is based on transaction details entered into the DIGIPASS authenticator. The
DIGIPASS authenticator uses the transaction details and an embedded secret to generate and display an Electronic
Signature. With Virtual Signature Generation, the user supplies the transaction details directly to IDENTIKEY Appli-
ance, which will then generate the Electronic Signature, i.e. the virtual signature. Virtual signatures are delivered
to the user via the Message Delivery Component.
Once a user receives the Electronic Signature, they can then use it to sign a transaction, typically through a con-
firmation page (e.g. for finalizing a transaction). This signature will be validated by IDENTIKEY Appliance; if the sig-
nature is incorrect or invalid, then the transaction will not be permitted to proceed.
If a signature is generated with a DIGIPASS authenticator, the signature validation process occurs as follows:
If signature generation is done via IDENTIKEY Appliance (i.e. virtual signature generation), the signature validation
process typically occurs as follows:
1. The user initiates the transaction as normal via a client program (e.g. money transfer via online banking
application). The client program then requests an Electronic Signature from the user in order to sign the
transaction.
2. At the same time, the client program submits the required transaction details to IDENTIKEY Appliance,
requesting a virtual signature.
3. IDENTIKEY Appliance then generates a virtual signature based on the transaction details supplied.
4. IDENTIKEY Appliance delivers the virtual signature to the user via e-mail, voice, SMS, or any supported
combination thereof (depending on how Message Delivery Component is configured).
5. The user receives the virtual signature and enters it into the transaction (as requested by the client pro-
gram).
Once the transaction is signed, it can then be sent to IDENTIKEY Appliance for validation. The signature validation
process from this point onwards is identical for transactions signed by either normal Electronic Signatures (gen-
erated via DIGIPASS) or virtual signatures (generated via IDENTIKEY Appliance).
As of IDENTIKEY Authentication Server 3.7, signatures can also be validated using the Secure Channel feature with
DIGIPASS authenticator compliant with this feature. Signature validation with the Secure Channel feature is used
for validating transactions such as e.g. online banking but is also used to add devices, activate DIGIPASS licenses
and instances in a Multi-Device Licensing and Activation Scenario. For more information on this, refer to Section
2.5. DIGIPASS Licensing and Activation.
1. The user logs in to the client application and enters the required transaction details.
2. After entering the transaction details, the user scans either a QR code or a color QR code, which are
provided by the client application.
3. The DIGIPASS authenticator displays the transaction signature and the user enters this in the client applic-
ation to complete the transaction.
Real-Time Signature Validation is generally used to provide security for transactions that require quick responses.
It is typically used by online banking applications.
With Real-Time Signature Validation, a user creates a transaction. The transaction normally requires a signature,
so the user enters the relevant details into their DIGIPASS. The DIGIPASS produces a signature and the user enters
this into the website, which then submits the transaction.
The transaction details and signature are verified by IDENTIKEY Appliance, and a status message is returned
straight to the web page the user is on. The user knows within the time it takes to process a normal transaction
whether or not the submitted transaction has been verified.
Deferred Signature Validation is signature validation that is not performed in real-time. In typical cases that use
this validation, a user submits a transaction online with the signature generated by the DIGIPASS. The transaction
will then enter a queue to be verified. The user receives a message that the transaction has gone into a queue. A
batch job picks up the transaction and verifies it against the policies and details of the DIGIPASS. The user may not
know until minutes or hours later that the transaction has been signed and verified.
It is important in this case for the user to keep a record of the time the transaction was submitted, as this may be
important if the transaction is challenged.
A signature application may be time-based. This means that the DIGIPASS will generate a different signature for
the same input data at different times.
The signature validation procedure relies on the time on the DIGIPASS and the time on IDENTIKEY Appliance being
synchronized to within an acceptable tolerance. Each time a one-time password or a signature is generated, the
IDENTIKEY Appliance records the time difference between the DIGIPASS and itself.
The time-based signature validation procedure also uses Time Steps to verify signatures. A Time Step is a setting
which specifies the number of seconds between generations of a one- time password on a DIGIPASS. The
IDENTIKEY Appliance will use the time step and the known difference in time between itself and the DIGIPASS to
verify signatures.
Use the Signature Time Window policy setting to set the tolerance allowable for signature verification.
Time based signatures can be real-time or deferred. If deferred time-based signatures are used, they may be re-
verified at a later date by comparing the input details against the signature produced by the DIGIPASS, as long as
the time the transaction was performed is known.
A signature application may also be event-based. This means that it contains a numeric counter that increases
every time a signature is generated.
The signature process relies on an event counter to enable each signature to be unique. The DIGIPASS and
IDENTIKEY Appliance need to have synchronized event counters. The tolerance for the difference between the
event counters can be set by using the Event Window policy setting.
During Real-Time Signature Validation the event counter on IDENTIKEY Appliance is updated with the value used by
the DIGIPASS, to keep the two event counter values synchronized.
During Deferred Time Signature Validation the event counters for transactions generated on the DIGIPASS may get
out of step with the event counter held on IDENTIKEY Appliance. The Event Window policy setting can enable
signed transactions to be processed in any order without causing a verification error.
These signatures are generated using neither time or event counter. They will always produce the same signature
for the same input. There is no difference between real-time and deferred time with these signatures.
Electronic Signatures are verified by IDENTIKEY Appliance using a number of specific checks, in the following
sequence:
1. Component checks
2. Policy checks
3. User account lookup and checks
4. Signature validation
5. Finalization
IDENTIKEY Appliance will try to identify the application from which the request for registration came. There must be
a component record on the data store for that application. A client component record must exist for the Signature
Verification application and location from which it connects to the server. The component type is set as a para-
meter by the application; the location is the source IP address of the SOAP address.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
IDENTIKEY Appliance identifies the policy to use in the signature authentication from the Client Component record
and checks the validity of the policy.
If the DIGIPASS user account is locked, IDENTIKEY Appliance verifies whether a user auto-unlock attempt is
possible (see 27.8. DIGIPASS User Account Auto-Unlock).
Dynamic User Registration is NOT possible. If the user account does not exist, then the check will fail.
A search is performed for a DIGIPASS that is assigned to the user that fulfils the signature policy limits. If more than
one DIGIPASS is found, the list is filtered using the serial number for the DIGIPASS. This serial number will be
passed to the signature process as a parameter.
Note
When designing a web page that will allow transactions to be signed, ensure that users with multiple DIGIPASS
can enter a serial number to identify which DIGIPASS is being used.
When the correct DIGIPASS is identified, the DIGIPASS type is checked. The DIGIPASS type must be either SG (Sig-
nature) or MM (Multi Mode) to allow signatures. The signature is then verified and a response is produced.
4.3.5. Finalization
The relevant parts of the Data Store are updated after the signature validation has been carried out successfully. A
response is produced. The audit data is updated with the transactions that took place and the result of those trans-
actions.
If the Web Application requests a confirmation code and the DIGIPASS is capable of generating one, then
IDENTIKEY Appliance will generate a confirmation code and the application will display it to the user. The user gen-
erates a Confirmation Code on their DIGIPASS and checks that it is the same as the one on the screen.
Confirmation code generation is passed as a parameter in the authentication request. There are two options:
n Event Window: the allowable difference between the DIGIPASS event counter and IDENTIKEY Appliance
event counter.
n Online Signature Level: specifies how signatures will be verified.
n Signature Time Window: Shows the acceptable difference in time between the time set on the DIGIPASS
and the time set on IDENTIKEY Appliance for signatures. The lowest value is 2, the highest is 500.
Note
For signature validation processes with the Secure Channel feature, IDENTIKEY Authentication Server provides
the default policy IDENTIKEY Signature Validation with Secure Channel.
In IDENTIKEY Appliance, the term Provisioning refers to delivery, registration, and activation of the software. The fol-
lowing sections describe each of these steps in detail.
You are free to deliver the software to your customers in any way you choose. You can either deliver software to
users, or allow them to download the software from a secure site. An Activation Code is required to activate the
software DIGIPASS authenticator or authenticators such as DP110. This code may be delivered via two methods:
Online Delivery
With this method, the activation code is delivered directly to the application that is going to use it. If the activation
code is delivered in this way, the user will never see it. This option is available for DIGIPASS for Web, DP110,
DIGIPASS for Mobile, and the DIGIPASS App.
Offline Delivery
With offline delivery, available for DIGIPASS for Web and DIGIPASS for Mobile, the activation code is delivered via a
mechanism such as email, text message, or fax.
In DIGIPASS for Web the activation code will typically be delivered in an email containing a link. The applet reads
the activation code from the link.
The DIGIPASS records must be imported from a *.dpx file before registration can occur.
Each software DIGIPASS user requires a DIGIPASS user account on IDENTIKEY Appliance. The user accounts can
either be imported into IDENTIKEY Appliance, created individually, or created dynamically during registration if
Dynamic User Registration is available.
For software DIGIPASS to work, a DIGIPASS record needs to be allocated to the user account. This can be done in
two ways:
Each software DIGIPASS needs to be activated before it can be used. This means that IDENTIKEY Appliance is
informed that all the components are in place for the software DIGIPASS and you are ready to use it.
The DIGIPASS start time defines a particular date and time when an activated (software) DIGIPASS authenticator
can effectively be used for authentication. If defined in the effective policy, the start time can be automatically cal-
culated based on a delayed activation period when assigning/registering the DIGIPASS authenticator to a user.
Although the software DIGIPASS authenticator has already been activated, IDENTIKEY Authentication Server will not
allow it to be used for authentication, until the start time has been reached. This is called delayed activation.
If defined in the effective policy, two separate notification messages are sent to the respective user to indicate
delayed activation:
a. The activation delayed notification is sent when the DIGIPASS authenticator is assigned/registered to the
user.
b. The activation completed notification is sent when the start time has been reached, i.e. when the
DIGIPASS authenticator can effectively be used.
The notification messages are sent using Message Delivery Component (MDC) and handled independently of each
other: if defined, either both, none, or either one is sent.
There are two required components and one optional component required to implement provisioning:
IDENTIKEY Appliance
IDENTIKEY Appliance handles DIGIPASS user account and DIGIPASS records. It generates activation codes, verifies
one-time password, and stores static passwords.
Back-End System
The back-end system can be used by IDENTIKEY Appliance for Dynamic User Registration and/or static password
verification. For more information, refer to 3.7. Back-End Authentication.
The user authentication method during a software DIGIPASS provisioning process depends on two factors: the local
authentication method set in the relevant policy, as well as on whether the user already has an activated DIGIPASS
authenticator.
The possible local authentication settings and their implications on the provisioning process are:
n If Local Authentication is set to DIGIPASS/ Password during Grace Period, the user must use their static
password when activating their first DIGIPASS authenticator. Upon successful completion of the DIGIPASS
activation the grace period ends, and any future provisioning operations will require the user to authen-
ticate with a one-time password.
n If Local Authentication is set to DIGIPASS or Password, the user must use their static password when activ-
ating their first DIGIPASS authenticator. After this, the user can authenticate with their static password or
their DIGIPASS authenticator during any future provisioning operations.
Warning
If the local authentication method is DIGIPASS Only, a user who is activating their first DIGIPASS authenticator will
be unable to complete the activation because they are not allowed to authenticate with their static password.
For more information about local authentication methods, see 3.6. Local Authentication.
Identify Component
IDENTIKEY Appliance will try to identify the application from which the request for registration came. A client
component record must exist for the provisioning application and location from which it connects to the
server. The component type is set as a parameter by the application; the location is the source IP address of
the SOAP request.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
Identify Policy
IDENTIKEY Appliance identifies the policy to use in the registration from the client component record and
checks the validity of the policy. The following settings of the policy will not be used as they are not relevant
to provisioning.
n Ensure that the user account and domain have been defined
If the DIGIPASS user account is locked, IDENTIKEY Appliance verifies whether a user auto-unlock attempt is
possible (see 27.8. DIGIPASS User Account Auto-Unlock).
Local Authentication
A static password or one-time password must be entered. For more information about local authentication
options and their implications on the user authentication process during software DIGIPASS provisioning, see
5.1.6. User Authentication during Provisioning
If back-end authentication is enabled, then the back-end system will verify the static password. If the pass-
word is verified but there is no user account in IDENTIKEY Appliance, an account will be created. Dynamic User
Registration must be enabled for this to succeed.
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
5.1.6. User Authentication during Provisioning.
Back-End Authentication
Back-end authentication is an optional step in software DIGIPASS registration. If enabled, the static password
will be authenticated by the back-end system. If the back-end system does not verify the credentials, regis-
tration will fail.
DIGIPASS Assignment
The registration process will perform the following steps:
n Search for an applicable DIGIPASS according to the criteria on the policy associated with the user account
that is capable of activation.
n If no DIGIPASS authenticator was found, the first applicable and available DIGIPASS record is assigned to
the user account.
The activation code is generated using the first capable application in the DIGIPASS. The activation code may
be encrypted with the user's password if the password was not verified by local and back-end authentication.
If defined in the effective policy, the DIGIPASS start time is calculated and set based on the delayed activation
period. If defined, notifications are scheduled to be sent to the respective user when (a) the delayed activ-
ation begins and (b) the DIGIPASS start time has been reached and the DIGIPASS authenticator becomes act-
ive.
Finalization
In the finalization step the created users and assignment are confirmed to the data store. Records are written
to the audit system to record the actions that have taken place, and the results. A response is sent to the user
to confirm registration or to show an error message if activation failed.
Note
For information specific to the registration process in the Multi-Device Licensing and Activation Mode, refer
The following diagram summarizes the activation process for Software DIGIPASS:
Identify component, policy and DIGIPASS user account lookup and checks
The activation process performs the same Identify Policy and DIGIPASS user account lookup and checks as
the registration process, except that the user account must already exist.
Activation
The DIGIPASS is set to ACTIVE in the data store and the grace period will end, if one was set.The grace period
automatically expires the first time an OTP is used to log in, i.e. after the OTP has been successfully validated
(if it has not been set manually to expire prior to that in the relevant policy).
Finalization
In the Finalization step the activation is confirmed to the data store. Records are written to the audit system
to record the actions that have taken place, and the results. A response is sent to the user to confirm activ-
ation or show an error message if activation failed.
Note
For information specific to the registration process in the Multi-Device Licensing and Activation Mode, refer
to Section 5.4.2. Multi-Device Activation .
From time to time software DIGIPASS will have to be reactivated. This may occur rarely for DIGIPASS for Mobile,
such as when the user buys a new mobile phone, or it may occur more often for DIGIPASS for Web, such as when
the user clears the cookies in their browser.
Reactivation is carried out in the same way as the original activation, but the user account will already exist with a
capable DIGIPASS assigned. The registration process will use the assigned DIGIPASS to generate the activation
code.
The following limits can be enabled via IDENTIKEY Appliance Configuration Utility:
n Activation Limit: limits the number of activations that can be performed on one Software DIGIPASS.
n Minimum Interval: sets the minimum time interval between reactivations.
n Maximum Locations: sets the maximum number of locations a from which a Software DIGIPASS can be
activated, such as home, office, laptop. This only applies to DIGIPASS for Web.
Note
The activation limits apply to all activation attempts. If an activation fails in the second stage this will still count
as an activation, and will count against the activation limits.
The following scenarios show how provisioning will work for different DIGIPASS authenticators in different situ-
ations.
The user authentication method during the provisioning process may vary depending on the local authentication
policy setting, and on whether the user already has an activated DIGIPASS authenticator. For more information,
see 5.1.6. User Authentication during Provisioning.
In a scenario involving DIGIPASS for Mobile, activation codes are encrypted with pre-loaded static passwords.
Pre-Conditions
n The user account has been created on IDENTIKEY Appliance
n The user knows their static password (in case of first-time software DIGIPASS provisioning)
n The static password has been imported into IDENTIKEY Appliance
n The provisioning policy has been defined with the following settings
n Local authentication (DIGIPASS/Password during Grace Period or DIGIPASS or Password)
n No back-end authentication (None)
n DIGIPASS type is the appropriate type for the version of DIGIPASS for Mobile being used.
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
5.1.6. User Authentication during Provisioning.
There is a choice of activation options for DIGIPASS for Mobile 4.x DIGIPASS provisioning, and the choice of activ-
ation option affects how the DIGIPASS for Mobile authenticator is provisioned:
If a bind is required, the administrator has to manually bind the device using the Administration Web Interface or
the Active Directory Users and Computers Extension.
The entire mobile phone, with activated DIGIPASS for Mobile application is then distributed to the user.
DIGIPASS for Mobile package. The registration identifier and activation password are then displayed on the pro-
visioning Web site. The user must then download the DIGIPASS for Mobile package, and enter the registration iden-
tifier and activation password into the DIGIPASS for Mobile application on the phone.
When the user has entered the registration identifier and activation password, the mobile phone sends a request
to the provisioning Web site for the activation data. The provisioning Web site sends the activation data back to the
mobile phone, which will then automatically activate the DIGIPASS for Mobile application. After this, if a bind is
required, the DIGIPASS for Mobile application will request the bind data and will bind DIGIPASS.
The user then receives a response on the mobile device indicating whether the activation has been successful.
The DSAPP protocol can be used for activation, providing it has been enabled on IDENTIKEY Authentication Server.
If the DSAPP protocol is to be used, the user has to enter a user ID, domain and password into the
DSAPP registration page of the provisioning Web site. The provisioning Web site verifies with IDENTIKEY Authentic-
ation Server that the user is valid and then assigns a DIGIPASS for Mobile DIGIPASS and sends an SMS with the URL
to be used to download the DIGIPASS for Mobile package. The registration identifier and activation password are
then displayed on the provisioning Web site. The user must then download the DIGIPASS for Mobile package, and
enter the registration identifier and activation password into the DIGIPASS for Mobile application on the phone.
When the user has entered the registration identifier and activation password, the mobile phone sends a request
to the provisioning Web site for the activation data. The provisioning Web site sends the activation data back to the
mobile phone, which will then automatically activate the DIGIPASS for Mobile application. After this, if a bind is
required, the DIGIPASS for Mobile application will request the bind data and will bind DIGIPASS.
The user then receives a response on the mobile device indicating whether the activation has been successful.
This section describes the post-deployment DIGIPASS provisioning using the Multi-Device Licensing and Activation
feature of IDENTIKEY Authentication Server. For more information on Multi-Device Licensing and Activation, refer to
Section 2.5. DIGIPASS Licensing and Activation.
Note
A DIGIPASS authenticator compliant with Multi-Device Licensing is required to perform Multi-Device Activation, for
instance DIGIPASS for Mobile and DP760.
During the provisioning procedures as described below a DIGIPASS instance is loaded into a DIGIPASS device.
These procedures are executed each time a new DIGIPASS instance needs to be loaded into a DIGIPASS device.
n The user account has not been created on IDENTIKEY Authentication Server
n The user knows their static password (in case of first-time software DIGIPASS provisioning)
n The provisioning policy has been defined with the following settings:
n Local Authentication (DIGIPASS/Password during Grace Period or DIGIPASS or Password)
n Back-end Authentication (Always or If Needed)
n Back-end Protocol (Windows, RADIUS, LDAP Back-End Authentication, or custom name)
n Dynamic User Registration is enabled
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
5.1.6. User Authentication during Provisioning.
The first step in the provisioning procedure is to register with the system to start the post-deployment provisioning
of a new DIGIPASS device.
1. Start a provisioning registration operation to provide the user credentials to IDENTIKEY Authentication
Server.
2. IDENTIKEY Authentication Server checks that a user account is available, validates the user credentials,
and queries for DIGIPASS licenses assigned to your user. The system then generates Activation Message 1
and includes it in the response envelope.
3. The client application provides Activation Message 1 in form of an image - scan this image with the
DIGIPASS authenticator that supports the Multi-Device Licensing model.
4. The DIGIPASS device generates and displays a device code.
Note
If no DIGIPASS license is assigned to the user, IDENTIKEY Authentication Server checks if Auto-Assignment has
been set in the policy used, and will search a random available DIGIPASS license which it assigns to the end user.
When Auto-Assignment has not been enabled in the policy, the provisioning operation fails.
When IDENTIKEY Authentication Server queries for DIGIPASS licenses assigned to the user but there are no activ-
ations left for this particular DIGIPASS license, the system will return an error message explaining that the activ-
ation threshold for this license has been reached.
After you have registered a DIGIPASS license, the second step in the Multi-Device Activation process is to register a
device.
1. The client application starts a provisioning DIGIPASS authenticator registration operation and provides the
end user's registration identifier and the device code to IDENTIKEY Authentication Server.
2. The server retrieves the registration context (e.g. the DIGIPASS serial number used in the previous step),
validates the device code, and generates a new DIGIPASS instance using the DIGIPASS license.
3. The server then generates Activation Message 2 for the DIGIPASS license and includes it in the response
envelope.
4. The client application provides Activation Message 2 in form of an image - scan this image with the
DIGIPASS authenticator that supports the Multi-Device Licensing model.
5. The DIGIPASS authenticator generates and displays a signature.
After registering the device, the end user activates a new DIGIPASS instance. Based on Activation Message 2, a sig-
nature generated with the DIGIPASS instance is validated. With this, the new DIGIPASS instance is activated.
5.4.2.1. Banking Scenario: Self-Provisioning and Administrating of DIGIPASS Authenticators in Multi-Device Activ-
ation
This section describes DIGIPASS self-provisioning and administrating in a banking context using the Multi-Device
Licensing and Activation feature of IDENTIKEY Authentication Server, with compliant DIGIPASS authenticators. This
includes generation and administration of an activation letter for the end user who then activates a new DIGIPASS.
Note
If no DIGIPASS license is available for assignment, the provisioning operation fails, and the client application noti-
fies the end user to contact their bank.
Also, for this operation to succeed, the policy specified in the client record in IDENTIKEY Authentication Server for
the client application must allow Auto-Assignment.
Alternatively, the user administrator can also initiate sending activation letter to end users by connecting to the cli-
ent application, entering the IDENTIKEY Authentication Server credentials, and uploading a .dpx file to the client
application. The system creates a DIGIPASS record to process all .dpx files. The user administrator also uploads a
user .csv file that aligns the DIGIPASS licenses with the user IDs for assignment. The system then generates Activ-
ation Message 1 and returns it to the client application which generates a color QR code on the basis of this mes-
sage, and prints an end user-specific activation letter which includes the serial number of the DIGIPASS license and
the color QR code. The activation letters are sent to the end users by post.
credentials in a back-end directory and verifies the DIGIPASS license with the provided serial number assigned to
the local user ID of the end user. The system adds the new device, creates a new DIGIPASS instance, and gen-
erates Activation Message 2. This message is returned together with a request key and the serial number of the
new DIGIPASS instance to the client application.
The client application generates a color QR code that represents Activation Message 2 - the end user scans this
image with the same DIGIPASS device that was used to scan the color QR code from the activation letter. With this,
the DIGIPASS device creates a new DIGIPASS instance based on Activation Message 2, and displays an activation
signature to be entered into the client application by the end user. The system validates the activation signature,
returns the result to the client application which displays this result to the end user who then disconnects from the
client application.
There are three scenarios that can be employed when activating DIGIPASS for Web, and each one has different
pre-conditions. Which scenario is employed will depend on how IDENTIKEY Appliance is implemented.
5.4.3.1. Scenario 1: Activation Codes are Encrypted with Pre-Loaded Static Passwords
Pre-Conditions
n The user account has been created on IDENTIKEY Appliance
n The user knows their static password
n The static password has been imported into IDENTIKEY Appliance
n The provisioning policy has been defined with the following settings:
n No local authentication (None)
n No back-end authentication (None)
Process
The user enters their user ID, email address and PIN on the website. If registration is successful, the DIGIPASS for
Web is provided with the serial number of the DIGIPASS that is to be activated and an encrypted activation code.
Note
In this case, the PIN is not sent to the server; rather, it is used locally by the DIGIPASS for Web applet.
The user will have to re-enter their user ID, PIN and password to decrypt the activation code and complete activ-
ation. The applet decrypts the activation code, activates itself and sends a one-time password to the server.
The user then receives a response indicating whether the activation has been successful.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
Pre-Conditions
n The user account has been created on IDENTIKEY Appliance
n The user knows their static password
n The static password has been imported into IDENTIKEY Appliance
n The provisioning policy has been defined with the following settings:
n Local authentication (Digipass Only or DIGIPASS/Password during Grace Period)
n No authentication (None)
Process
The user enters their user ID, email address, static password and PIN on the registration website. If registration is
successful, the serial number of the DIGIPASS that is to be activated and an activation code are delivered to the
DIGIPASS for Web applet.
The user re-enters the user ID and PIN. DIGIPASS for Web generates a one-time password and then submits this
with the serial number to the server. Activation then takes place.
The user will then receive a response indicating whether the activation has been successful.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
Pre-Conditions
n The user account has not been created on IDENTIKEY Appliance
n The user knows their static password for their account in the back-end system
n The provisioning policy has been defined with the following settings:
n Local authentication ( Digipass Only or DIGIPASS/Password during Grace Period)
n Back-end authentication (Always or If Needed)
n Back-end protocol (Windows, RADIUS, LDAP Back-End authentication, or custom name)
n Dynamic User Registration enabled
Process
The procedure for this scenario is very similar to that of 5.4.3.2. Scenario 2: Pre-Loaded User Accounts and Static
Passwords; the difference for the IDENTIKEY Appliance is that the back-end system is used to verify the user ID and
password. If both are OK, the account is created automatically in IDENTIKEY Appliance. Both scenario 2 and 3 are
identical from the user's perspective.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
The DIGIPASS 110 is a hardware/software combination DIGIPASS. It does not require any software to be installed
on the client-side to enable it to run, but it does require the correct policy settings to be provided, followed by activ-
ation.
There are two scenarios that can be employed when activating a DIGIPASS 110. They both have different pre-con-
ditions. Which scenario is used will depend on how IDENTIKEY Appliance is implemented.
Pre-Conditions
n The user account has been created
n The user knows their historical secret
n Historical Secret imported in IDENTIKEY Appliance (as static password)
n The provisioning policy has been defined with the following settings:
n Local authentication
n No back-end authentication
n DIGIPASS type is DIGIPASS 110
Process
The user opens the browser on their computer, and goes to the registration page of the DIGIPASS 110 provisioning
website. The DIGIPASS 110 provisioning website generates a challenge which will be used to encrypt the new
Server PIN. The user enters their user ID, static password, new Server PIN, confirmation of new Server PIN, and
DIGIPASS 110 serial number on the registration website. The DIGIPASS 110 Applet generates a Challenge Encrypted
Static Password (CESPR) using the generated challenge and the new Server PIN.
On the server-side, the CESPR is verified. If verification is successful the DIGIPASS 110 is assigned to the user, and
the initial PIN is set. The DIGIPASS grace period is set according to pre-defined parameters. The activation page is
returned if the provisioning is successful, or an error message will be returned if the provisioning is not successful.
Pre-Conditions
n The user account has NOT been created
n The user knows historical secret to allow authentication by a legacy back-end system
n The provisioning policy has been defined with the following settings:
n NO local authentication (None)
n Back-end authentication (Always)
n DIGIPASS type is DIGIPASS 110
Process
The user enters their user ID, static password, challenge, CESPR, and DIGIPASS 110 serial number on the regis-
tration website. On the server-side, the user is authenticated on the back end. If the back-end authentication is
successful the user is then registered to using Dynamic User Registration. The DIGIPASS 110 is then assigned to
the user, and the initial PIN is set. The DIGIPASS grace period is set according to pre-defined parameters.
A response will be received indicating whether the activation has been successful.
n User ID
n Password
n one-time password generated by a DIGIPASS authenticator
n Server PIN
The credentials used by DIGIPASS Authentication for Windows Logon are either validated directly by IDENTIKEY
Authentication Server (online authentication) or using offline authentication data generated by IDENTIKEY Authentic-
ation Server (offline authentication). Whether DIGIPASS Authentication for Windows Logon performs an online or an
offline authentication depends on the availability of the IDENTIKEY Authentication Server instance and is com-
pletely transparent to the user.
The DIGIPASS Authentication for Windows Logon consists of a client software package, which is installed on the cli-
ent computer, and server-side functionality, which is part of IDENTIKEY Appliance. DIGIPASS Authentication for Win-
dows Logon requires a valid license to enable it on IDENTIKEY Appliance.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center.
For more information on GDPR, refer to the IDENTIKEY Appliance General Data Protection Regulation Compliance
Guide.
Online authentication occurs when a user authenticates to Microsoft Windows using DIGIPASS Authentication for
Windows Logon while the client computer is connected to the network and can establish a connection to
IDENTIKEY Appliance. Authentication is performed using IDENTIKEY Appliance in real time.
The user ID, password (optional), and one-time password (OTP) are sent to IDENTIKEY Appliance to be verified. If
the OTP credentials are valid, DIGIPASS Authentication for Windows Logon receives the static Windows user pass-
word from IDENTIKEY Appliance and uses it to authenticate to Microsoft Windows.
If offline authentication is enabled, IDENTIKEY Appliance also sends (encrypted) offline authentication data to
DIGIPASS Authentication for Windows Logon. Offline authentication data is used for offline authentication when no
connection to IDENTIKEY Appliance can be established.
DIGIPASS Authentication for Windows Logon and IDENTIKEY Appliance communicate via SOAP using HTTPS.
Offline authentication occurs when a user authenticates to Microsoft Windows using DIGIPASS Authentication for
Windows Logon while the client computer is not connected to the network or cannot establish a connection to
IDENTIKEY Authentication Server. Authentication is performed using (locally stored and encrypted) offline authen-
tication data.
The offline authentication data is generated by IDENTIKEY Authentication Server during successful online authen-
tication. Offline authentication data is either limited to a specific time span (time-based) or a number of authen-
tications (event-based), thus requiring the client to perform online authentication regularly.
Offline authentication needs to be enabled via the IDENTIKEY Authentication Server configuration.
The user ID, password (optional), and one-time password (OTP) are authenticated using the offline authentication
data. The authentication result is then sent back to DIGIPASS Authentication for Windows Logon on the client com-
puter. The offline authentication data can be used a limited number of times, and that limit can be configured
using the Administration Web Interface.
n Offline authentication data is available for the user. Offline authentication data is generated after a suc-
cessful online authentication when offline authentication is enabled in the relevant DIGIPASS Authentic-
ation for Windows Logon client component policy.
n This offline authentication data is still valid. Offline authentication data is valid for a limited time for time-
based data, or a limited number of logons for event-based data. The time or event limit is defined in the
relevant DIGIPASS Authentication for Windows Logon client component policy.
Note
Although a user can have more than one DIGIPASS authenticator assigned, only the first one ever used with
DIGIPASS Authentication for Windows Logon has offline authentication data assigned. If the user attempts an off-
line authentication using another DIGIPASS authenticator with no offline authentication data assigned, DIGIPASS
Authentication for Windows Logon will display an authentication error.
If you need to switch offline authentication data support to another DIGIPASS authenticator, reset the offline
authentication data for the currently used DIGIPASS authenticator in the Administration Web Interface and per-
form an online authentication using the other DIGIPASS authenticator immediately afterward.
Note
It is also possible to configure user-specific policy settings for offline authentication. These settings will override
those set by the parent policy.
n Disabling offline authentication for a user means that IDENTIKEY Authentication Server will not send any
new encrypted offline logon data to the client computer.
n Disabling offline authentication for a user means that the user will still be able to use offline authen-
tication from the time that it is disabled until the encrypted offline logon data expires OR until the user per-
forms the next online authentication.
You can enforce static password verification during offline authentication via DIGIPASS Authentication for Windows
Logon, by disabling Stored Password Proxy and setting Back-End Authentication to Always.
A user may be forced to log on either online or offline using OTP by configuring DIGIPASS Authentication for Win-
dows Logon accordingly. For more information, refer to the DIGIPASS Authentication for Windows Logon User
Guide, Section "Enforcing DIGIPASS authentication".
6.3.4. Backup Offline Authentication for DIGIPASS Authentication for Windows Logon
You can use Primary Virtual Mobile Authenticator as a backup solution for DIGIPASS Authentication for Windows
Logon offline authentication. This extends the OTP delivery features of Message Delivery Component to DIGIPASS
Authentication for Windows Logon.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center, and the SEAL protocol used for com-
munication with IDENTIKEY Authentication Server must be SSL enabled in the Message Delivery Component Con-
figuration Utility.
For more information on GDPR, refer to the IDENTIKEY Appliance General Data Protection Regulation Compliance
Guide.
Backup offline authentication is intended as a temporary backup login solution. If offline authentication is enabled
in the used IDENTIKEY Authentication Server policy, IDENTIKEY Authentication Server sends encrypted offline
authentication data (for offline authentication with the primary DIGIPASS authenticator) and backup offline
authentication data (for backup offline authentication with Primary Virtual Mobile Authenticator) to the DIGIPASS
Authentication for Windows Logon client during successful online authentication; during backup offline authen-
tication, the DIGIPASS Authentication for Windows Logon client verifies OTPs against the backup offline authen-
tication data.
Backup offline authentication requires that users have assigned both a DIGIPASS authenticator for online and off-
line authentication, and Primary Virtual Mobile Authenticator for backup offline authentication. To generate
(backup) offline authentication data, users must successfully complete at least one online authentication pro-
cedure using DIGIPASS Authentication for Windows Logon.
Warning
Backup offline authentication will not work with Backup Virtual Mobile Authenticator.
Dynamic Component Registration (DCR) is used by DIGIPASS Authentication for Windows Logon 1.x to register a
component for use when logging on to Microsoft Windows using a one-time password (OTP). DIGIPASS Authentic-
ation for Windows Logon requires a client component to be registered for a user at the IP address used. DCR
checks to see if a client component for that IP address exists for a user, and if not it creates one.
Note
Dynamic Component Registration (DCR) is only supported for DIGIPASS Authentication for Windows Logon 1.x.
n Client machine hostname: If a DNS-based reverse lookup of an IP address is being used with the DNS suf-
fix not set on the client machine.
n Fully qualified domain name (FQDN): If a DNS-based reverse lookup of an IP address is being used with
the DNS suffix set.
Using Windows Group Check, IDENTIKEY Appliance can test for Microsoft Windows groups of client computers on a
network. These groups can be used to define which computers on a network can use DIGIPASS Authentication for
Windows Logon, thus allowing a gradual and controlled implementation.
For more information about Dynamic Component Registration, refer to the DIGIPASS Authentication for Windows
Logon Product Guide.
Warning
Password randomization is only possible in a Microsoft domain environment.
DIGIPASS Authentication for Windows Logon can be configured to provide password randomization. With password
randomization, the Windows logon password is generated in the background, with a randomized password format-
ted according to strict formatting rules.
With password randomization, the user logs on by entering only the user ID, OTP, and (optionally) a Server PIN,
with the password generated in the background. Using password randomization prevents a user from logging on
to Windows using a client computer which does not have DIGIPASS Authentication for Windows Logon installed.
After a successful authentication towards the IDENTIKEY Appliance, password randomization replaces the static
password used to authenticate the Windows client to the Windows domain with a randomly-generated static pass-
word. This randomly-generated password is no longer known to the user, thereby forcing the user to use DIGIPASS
OTP authentication.
Note
For Active Directory deployments with password randomization enabled, a new random password will be gen-
erated again once Active Directory indicates that the password is about to expire.
The randomly-generated password remains constant in the IDENTIKEY Appliance user account record, and a cor-
responding attribute is added to trace randomization status.
Note
If the Password Randomization feature of IDENTIKEY Authentication Server is used, the policy used in IDENTIKEY
Authentication Server must not apply password proxying for the changeBackendPassword SOAP com-
mand because this would lead to a user with a randomized password being able to change their password.
For more information about password randomization, refer to 2.12. Static Password Management.
Password Synchronization Manager (PSM) is a product that is installed on the domain controller which allows a
change of the Windows password to be automatically updated on IDENTIKEY Appliance. The new Windows pass-
word will be reflected as the static password on IDENTIKEY Appliance.
When the Windows password is changed, it is updated on the domain controller. PSM checks for the availability of
IDENTIKEY Appliance before sending the new password to IDENTIKEY Appliance so that the data store can be
updated.
If the user is not defined on IDENTIKEY Appliance, only the password on the domain controller will be changed.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), and if using tracing or dia-
gnostic log files, ensure to configure log file rotation.
For more information on GDPR, refer to the IDENTIKEY ApplianceGeneral Data Protection Regulation Compliance
Guide.
n Manually using manual configuration in each Microsoft Windows client or by using the Active Directory (AD)
group policy infrastructure to push configuration.
TSIG is used primarily by the Domain Name System (DNS) to provide a means of authenticating
updates to a dynamic DNS database. It uses shared secret keys and one-way hashing to provide
a cryptographically secure way of identifying whether each endpoint of a connection is allowed to
make or respond to a DNS update.
Additionally, to support failover it is possible to configure primary and backup IDENTIKEY Appliance instances in a
replication setup (see 26. Replication).
DIGIPASS Authentication for Windows Logon uses secure connections to the IDENTIKEY Appliance using the Secure
Sockets Layer (SSL) protocol.
DIGIPASS Authentication for Windows Logon can be configured to validate the server certificate when establishing
a connection. Validation requires the server certificate to be registered in the certificate store on the client work-
station.
For more information on using and exporting this certificate, refer to the Chapter "DIGIPASS Authentication for Win-
dows Logon" in the IDENTIKEY Appliance Administrator Guide.
7. EMV-CAP
EMV-CAP is the Chip Authentication Program (CAP) developed by credit card leaders Europay, Mastercard, and Visa
(EMV). OneSpan provides a range of smart card readers, which are EMV-CAP–compliant.
A Hardware Security Module is highly recommended for use with EMV-CAP smart card readers (see 8.2. Licensing
and Configuration).
The EMV-CAP scenario must be enabled in the configuration of each IDENTIKEY Appliance before EMV-CAP func-
tionality is available. For more information, refer to the Configuration Utility Help or the IDENTIKEY Authentication
Server Administrator Reference, Section "Configuration".
7.3. Licensing
n HSM
n EMV-CAP
The following standard features of IDENTIKEY Appliance are not supported with EMV-CAP:
n Auto-Assignment
n Self-Assignment
Whenever Primary Account Number (PAN) fields are displayed on the Administration Web Interface or the Con-
figuration Utility, they will be masked. Certain administrators will have an additional administrative permission
which will enable them to see PANs in clear text.
PANs will be stored as encrypted numbers on the data store. When the numbers are displayed they are decrypted
and then masked.
IDENTIKEY Authentication Server supports three EMV-CAP–compliant DIGIPASS applications, or modes. All modes
provide a secure code as output, but differ in the type of input data:
If you plan to integrate IDENTIKEY Appliance with a supported Hardware Security Module, this HSM must be
installed and functioning correctly prior to IDENTIKEY Appliance installation.
To use HSMs, all instances of IDENTIKEY Appliance involved must be licensed for Hardware Security Modules.
Connection and encryption settings for IDENTIKEY Appliance to use with the Hardware Security Module(s) are con-
figured when running the IDENTIKEY Wizard.
When using HSMs with IDENTIKEY Appliance, certain standard features are not supported and certain limitations
apply.
n OATH-based authenticators
n Offline Data Generation (for Windows Logon)
n CHAP
n MSCHAP
n MSCHAP2
IDENTIKEY Appliance provides load-balancing and failover between Hardware Security Module slots.
The IDENTIKEY Wizard can be used to choose from a list of available HSM for this purpose. For more information,
refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
When the VASCO IDENTIKEY Authentication Server daemon is started, IDENTIKEY Appliance will automatically cre-
ate a Session Pool for use in accessing each HSM. HSM slots with an attribute matching the IDENTIKEY Authentic-
ation Server configuration setting slotSelectionAttribute will be added to the Session Pool – up to the value of the
slotsExpected configuration setting.
When IDENTIKEY Appliance needs to access data protected by the HSM(s), it takes a random session from the
pool. Where multiple HSMs are available, this spreads the load across all slots.
If a session does not receive a response from a slot, the HSM is blacklisted and slots on the other HSM(s) will be
used, where available.
IDENTIKEY Appliance will stop and re-initialize all HSMs in the Session Pool when:
A Hardware Security Module can be used to protect and manage your high-value cryptographic keys. HSMs provide
stronger authentication for server applications. Cryptographic keys are used to encrypt four types of data:
n Storage data
n Sensitive data
n Transport keys
n Audit data (when Secure Auditing is enabled)
Storage data cryptographic keys are used for securing DIGIPASS BLOBs. Each DIGIPASS Application for each
DIGIPASS device has its own BLOB. This BLOB contains DIGIPASS configuration and other important information
about the device.
Audit data cryptographic keys are used for encrypting audit entries when secure auditing is enabled. For more
information, refer to 20.4. Secure Auditing.
Sensitive data keys are used for all other types of data.
Transport keys are used to decrypt DIGIPASS import files (.dpx files). Such files are protected by double-DPX encryp-
tion, which provides extra security to DIGIPASS records prior to importing.
Access to sensitive data, storage data, and audit data can be protected by the keys, which can be rotated at reg-
ular intervals, providing even greater security. To rotate the keys a job must be initiated from the Administration
Web Interface. The job can be scheduled or run immediately.
Note
When copying, migrating, or backing up encrypted database files, ensure that the encryption key (and/or the
optional password key) is also backed up. Otherwise, you will not be able to read the data, as it will be encryp-
ted.
The key rotation process involves decrypting data with an old encryption key, then re-keying the data with a new
encryption key. Rotating one sensitive data key affects all other sensitive data keys, while rotating a storage data
key affects all other storage data keys.
Cryptographic key rotation can take some time. You can schedule a key rotation to run at a convenient time, then
cancel it if not finished when system resources are needed again. If you restart the key rotation later, processed
data does not need to be re-processed.
With SafeNet HSMs, each slot contains a token. Multiple cryptographic keys can be stored in each token, as illus-
trated below:
Image 47: SafeNet Cryptographic Keys Allocated by Token Name and Slot ID
9. Administration
IDENTIKEY Appliance provides three major user interfaces to allow quick and easy administration:
The administration interface to use in a particular situation depends on the required tasks and the data store used
by IDENTIKEY Appliance.
Each administration interface has its own default administrative user with its own default credentials.
The password for sysadmin to access the Configuration Tool must be changed during initial setup via the First
Time Configuration Wizard.
Passwords for the Configuration Tool default administrative users can be reset to the factory default values in the
Configuration Tool (via System > Actions). For more information, refer to the IDENTIKEY Appliance Installation and
Maintenance Guide.
You can also add password protection to the Rescue Tool (see Section 36.1. Accessing the Rescue Tool).
The Administration Web Interface user name and password are defined during the installation and setup process.
The IDENTIKEY Authentication Server Setup Wizard will prompt you to configure an administrator login at that time
(see Section 10.4. IDENTIKEY Authentication Server Setup Wizard).
Note
A system administrator named _ system is registered in the Master Domain by default, and cannot be
removed. This administrator is used by the IDENTIKEY Appliance for system operations.
During the installation process, the IDENTIKEY Authentication Server Setup Wizard will prompt you to configure an
administrative login (using an administrative user name and password). By default, this login will have access to
the Administration Web Interface and the Configuration Tool.
For more information about the IDENTIKEY Authentication Server Setup Wizard, refer to Section 10.4. IDENTIKEY
Authentication Server Setup Wizard.
Using the default user account sysadmin to access the Configuration Tool is less secure than using the user-
defined administrator login. We therefore recommend that you disable the sysadmin account as soon as the
administrator login is enabled.
For information about disabling the sysadmin account, refer to the IDENTIKEY Appliance Administrator Guide.
For information about creating and configuring an administrator login, refer to the IDENTIKEY Appliance Installation
and Maintenance Guide.
The Configuration Tool interface supports installation and management of the IDENTIKEY Appliance and is inten-
ded for system administrators. Some of the features managed through the Configuration Tool require connection
to the VASCO Customer Portal (see Section 2.14. VASCO Customer Portal).
The Configuration Tool comprises the following functionality, supported through the Configuration Tool:
n Installation configuration. The Configuration Wizard supports installation configurations (see Chapter 10.
Installation Configuration). Manual configurations are also possible after completing the Configuration Wiz-
ard, using the Configuration Tool (see Section 10.5. Manual Configurations).
n Licensing. All instances of IDENTIKEY Appliance need to be licensed (see Chapter 11. Licensing).
n Updating. Manually download and install updates, when available (see Chapter 16. Updating).
n Backup and restore (see Chapter 17. Backup and Restore)
n Auditing and logging. Information generated from the IDENTIKEY Appliance can be searched using live
viewers (see Chapter 20. Auditing and Chapter 19. System Logging).
n System statistics. Statistics is available about the IDENTIKEY Appliance, the services, disk and memory
usage, and interface (see Chapter 22. Statistics).
n Message Delivery Component: This component supports the use of Virtual DIGIPASS and is used to send
IDENTIKEY Appliance notifications (see Chapter 23. Message Delivery Component).
n Remote support. Remote support can be provided by OneSpan (see Section 24.2. Remote Support). Note
that remote support requires a connection to the VASCO Customer Portal.
n LDAP user synchronization. Synchronization supports automatically creating and updating user account
records from an LDAP Server to the IDENTIKEY Appliance (see Chapter 25. LDAP User Synchronization).
n Replication (see Chapter 26. Replication)
n System actions. Restarting, shutting down, and resetting default administrative user passwords are
actions possible using the System Actions menu in the Configuration Tool. For more information, refer to
the IDENTIKEY Appliance Installation and Maintenance Guide.
The Administration Web Interface is intended for use by help desks and system administrators and support:
1. Creating a customized administrator account with the correct administration privileges to allow access to
the Configuration Tool using a DIGIPASS user account (based on the DIGIPASS user account or policy set-
tings). This allows you to disable the sysadmin user account (which uses a static password), hence
strengthening administrator logon and enabling authentication with DIGIPASS one-time password.
For information about creating this administrator account, refer to the IDENTIKEY Appliance Administrator
Guide.
2. Administrating the IDENTIKEY Appliance day-to-day. The Administration Web Interface allows managing:
n User accounts. Each DIGIPASS holder is registered in the database, with a DIGIPASS user account
(see Chapter 27. DIGIPASS User Accounts).
n DIGIPASSDeployment. Each DIGIPASS device is registered in the IDENTIKEY Appliance database
(see Chapter 28. DIGIPASS).
n Client components. Authentication and administration clients are registered in the IDENTIKEY
Appliance (see Chapter 30. Client Components).
n System. Server components are registered in the IDENTIKEY Appliance (see Chapter 31. Server
Components).
n Policies. Policies specify various settings that affect request handling processes. Each request is
handled according to a policy that is identified by the applicable component record (see Chapter
32. Policies).
n Back-end servers. Back-end authentication is the process of verifying user credentials with
another system (see Section 3.7. Back-End Authentication). With IDENTIKEY Appliance this can be
an LDAP or RADIUS server.
n Domains and organizational units. User accounts and DIGIPASS records can be grouped in the
IDENTIKEY Appliance using two structures: domains and organizational units (see Chapter 35.
Organization).
n Reports. The IDENTIKEY Appliance reporting functionality allows you to create reports from the
database and the audit information (see Chapter 33. Reporting).
The Administration Web Interface uses the IDENTIKEY Appliance SOAP administration interface to manage data.
The Rescue Tool allows administrators to access a limited number of settings through a menu.
Installation and licensing are both necessary to use IDENTIKEY Appliance services. In this chapter we describe
installation. For information about licensing, refer to Chapter 11. Licensing.
For more information about how to install IDENTIKEY Appliance, refer to the IDENTIKEY Appliance Installation and
Maintenance Guide.
For more information about the fields in the Configuration Tool, refer to the IDENTIKEY Appliance Administrator
Reference.
First you must set the IP address. You can do this by:
n Using the IDENTIKEY Appliance Rescue Tool (see Chapter "Rescue Tool" in the IDENTIKEY Appliance Install-
ation and Maintenance Guide). This is the simplest way to set the IP address.
n Temporarily isolating a client workstation from the network and linking it to the IDENTIKEY Appliance to
set the IDENTIKEY Appliance IP address within the range of the network.
1. Change a client workstation IP address to within the specified IP address range for the IDENTIKEY Appli-
ance.
2. Connect the client workstation to the IDENTIKEY Appliance with a network cable.
3. Use a Web browser on the client workstation to access the IDENTIKEY Appliance Configuration Tool.
The IDENTIKEY Appliance automatically detects that this is a first-time installation and launches the Con-
figuration Wizard.
4. Configure a new IP address within your network range on the IDENTIKEY Appliance via the Configuration
Wizard.
When the Configuration Wizard has finished you will be redirected to the new IP address. You can then
use the IDENTIKEY Appliance via the new IP address. If your workstation is still in the wrong range for the
network, you should change it now.
The Configuration Wizard is launched when a new Configuration Tool is accessed and must be completed to allow
full access to the Configuration Tool, for manual configurations.
n Password change
n Network settings: IP address within your network including the net mask, and the default gateway to
access the Internet
n Hostname, DNS suffix, DNS server
n NTP (time) server
n IDENTIKEY Appliance certification authority (CA) information
Tip
The major settings are completed during the Configuration Wizard, but additional features may also require to be
configured, including:
1. Message Delivery Component to support Virtual Mobile Authenticator authentication (see Chapter 23.
Message Delivery Component).
2. Replication for synchronization of data between multiple IDENTIKEY Appliance devices (see Chapter 26.
Replication)
3. LDAP Synchronization to synchronize user account records from an LDAP Active Directory (see Chapter
25. LDAP User Synchronization).
4. Back-end authentication for checking user credentials with a RADIUS or LDAP server (see Section 3.7.
Back-End Authentication).
A license must be installed at this point to enable IDENTIKEY Appliance to be set up and function correctly (see Sec-
tion "Upload License" in the IDENTIKEY Appliance Installation and Maintenance Guide).
The IDENTIKEY Authentication Server Setup Wizard will walk you through the configuration of a Master Domain,
along with an administrator logon (username and password) for that domain. This wizard will also allow you to eas-
ily enable and configure HSM and Secure Auditing.
If you enable HSM, the IDENTIKEY Authentication Server Setup Wizard will prompt you to configure the settings
necessary for enabling HSM linking (see Chapter 8.2. Licensing and Configuration).
If you enable Secure Auditing, the IDENTIKEY Authentication Server Setup Wizard will prompt you to configure
Secure Auditing settings. The IDENTIKEY Appliance settings available for Secure Auditing are identical to those avail-
able in IDENTIKEY Authentication Server (see Section 20.4. Secure Auditing).
For more information, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
The IDENTIKEY Authentication Server Setup Wizard also allows you to configure case-sensitive user IDs and
domain names. This setting is useful when authenticating against case-sensitive data stores: for example, if
IDENTIKEY Authentication Server is configured to be case-insensitive, then user ID Jsmith can be authenticated
against user jsmith in a case-sensitive data store.
Case-sensitivity is particularly important when Dynamic User Registration is enabled, as it can prevent the creation
of multiple DIGIPASS users from multiple logons (see Section 3.5.4. Dynamic User Registration).
Completing the IDENTIKEY Appliance Configuration Wizard is mandatory before manual changes are possible in
the Configuration Tool.
n to change default settings which are not available during the Configuration Wizard
n to change settings after initial setup (the Configuration Wizard is only offered on a factory default system)
10.6. Migration to IDENTIKEY Appliance / IDENTIKEY Virtual Appliance from IDENTIKEY Authentic-
ation Server
When migrating to IDENTIKEY Appliance / IDENTIKEY Virtual Appliance from IDENTIKEY Authentication Server you
can use the Data Migration Tool and the IDENTIKEY Appliance Update Wizard to migrate for instance user data or
DIGIPASS data. For information how to set the source IDENTIKEY Appliance / IDENTIKEY Virtual Appliance into migra-
tion mode, refer to the Data Migration Tool Administrator Guide; for information how to load the required package
into IDENTIKEY Appliance / IDENTIKEY Virtual Appliance, refer to the IDENTIKEY Appliance Installation and Main-
tenance Guide.
11. Licensing
Licensing is the process of obtaining a product or evaluation license. This serves for OneSpan to identify an issued
IDENTIKEY Appliance and to issue a license file to make IDENTIKEY Appliance fully operational. After installation,
and before licensing, the Configuration Tool and the Administration Web Interface are accessible for configuration
and management, but no services, such as authentication, are available.
The licensing process requires registering information on the VASCO Customer Portal. This information identifies
the appliance to OneSpan to issue a license file.
n Evaluation license, which lasts for a finite length of time and allows you to evaluate the product (see Sec-
tion 2.13.4. Evaluation Licensing).
n Commercial license, which is the full operating license (see Section 2.13.3. Commercial Licensing).
The licensing procedure is supported by a Licensing Wizard. The Licensing Wizard is accessible through the
IDENTIKEY Appliance Configuration Tool (see Chapter 9. Administration).
For more information about how to install and license the IDENTIKEY Appliance, refer to the IDENTIKEY Appliance
Installation and Maintenance Guide.
When the IDENTIKEY Appliance is accessed for the first time after installation (see Chapter 10. Install-
ation Configuration), the Configuration Tool displays a warning message that the appliance is not licensed
and provides a link to launch the Licensing Wizard.
2. Downloading a system information file identifying the IDENTIKEY Appliance using the Licensing Wizard.
For more information, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
11.2. Re-Licensing
Re-licensing may require you to contact your IDENTIKEY Appliance supplier to release the initial (but now invalid)
license from the IDENTIKEY Appliance. Afterwards you need to re-run the License Wizard.
For more information, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
Warning
It is not possible to re-license an appliance for which the IP address has changed until you have contacted your
IDENTIKEY Appliance supplier (see Chapter 37. Support Procedure).
Changing the IP address of the IDENTIKEY Appliance renders the license invalid, immediately stopping all services,
such as authentication. As no valid license is present for the new IP address, there is no grace period, although the
Configuration Tool and the Administration Web Interface remain accessible for configuration and management.
The IDENTIKEY Appliance automatically detects that the IP address has changed and that the license is no longer
valid. The Configuration Tool displays a warning message with a link to the Licensing Wizard. Then you need to
contact your IDENTIKEY Appliance supplier to release the initial (and now invalid) license from the IDENTIKEY Appli-
ance. Re-licensing follows the same procedure as first-time licensing.
The old IP address is removed the same way it is set for first time setups (see Section 10.1. First Time Setup). The
old IP address can be reassigned to the IDENTIKEY Appliance, and the appliance can be re-licensed using the old
license file, if necessary.
Warning
Restoring a backup from a different appliance renders the license invalid. It is not possible to re-license the appli-
ance until you have contacted your IDENTIKEY Appliance supplier (see Chapter 37. Support Procedure).
Note
The configuration key and the license from a backup are always restored.
Restoring a backup created by the same appliance does not require re-licensing, as the IP address, the host key
and the configuration key remain the same as supplied in the original system information file used for issuing the
license.
Restoring a backup created by the same appliance when the appliance has been reset to factory default does not
require re-licensing, as the IP address and the host key remain the same. Although the configuration key changed
when the appliance was reset to factory default, this value is overwritten by the original configuration key restored
from the backup. All reference values are the same as supplied in the original system information file used for issu-
ing the license.
Restoring a backup created by a different appliance, e.g. restoring to a new appliance in case of hardware failure,
requires re-licensing. Although the license restored from the backup is bound to the restored configuration key, the
host key is different to the one supplied in the original system information file used for issueing the license. After a
backup is restored, all services remain available for a grace period of 30 days; afterwards, all services will stop,
although the Configuration Tool and the Administration Web Interface remain accessible for configuration and man-
agement. The grace period allows you to contact your IDENTIKEY Appliance supplier to release the initial license
from the IDENTIKEY Appliance. Re-licensing follows the same procedure as first-time licensing.
For more information about restoring a backup and using a replacement appliance, refer to the IDENTIKEY Appli-
ance Installation and Maintenance Guide.
For more information about backup and restore, refer to Chapter 17. Backup and Restore.
With an evaluation license all services remain available for a grace period of 45 days (30 days, if the license con-
tains a different host key); afterwards all services will stop, although the Configuration Tool and the Administration
Web Interface remain accessible for configuration and management. You need to re-license the IDENTIKEY Appli-
ance with a commercial license before the evaluation license expires.
It is not necessary to contact your IDENTIKEY Appliance supplier to upgrade from an evaluation to a commercial
license. Re-licensing follows the same procedure as first-time licensing (see Section 11.1. First Time Licensing).
In this case, it is not necessary to upload the system information file to the VASCO Customer Portal, as the IP
address, the host key and the configuration key remain the same as supplied in the original system information
file used for issuing the license.
A new license file is made available via the VASCO Customer Portal after receiving a purchase order. The license
file can then be uploaded using the License Wizard (see Section 11.1. First Time Licensing) without downloading a
system information file first.
After successful re-licensing all services are operational and new options are immediately available.
A major version upgrade, e.g. from version 3.0.2.0 to 3.1.3.1, may require re-licensing. Re-licensing follows the
same procedure as upgrading a commercial license to add new options (see Section 11.2.4. Upgrading a Com-
mercial License to Add New License Options).
Warning
Restoring to factory defaults renders the license invalid. It is not possible to re-license the appliance until you
have contacted your IDENTIKEY Appliance supplier (see Chapter 37. Support Procedure).
Restoring IDENTIKEY Appliance to the factory default state cleans the system and changes the configuration key. In
this case the running license is bound to the previous configuration key, so re-licensing is not allowed. You need to
contact your IDENTIKEY Appliance supplier to release the initial license from the IDENTIKEY Appliance. Re-licensing
follows the same procedure as first-time licensing.(see Section 11.1. First Time Licensing).
Note
If a backup is restored to an appliance in the factory default state, the configuration key from the backup is
restored (see Section 11.2.2. Restoring a Backup to an IDENTIKEY Appliance).
In order to connect to IDENTIKEY Appliance the authentication and privacy encryption of an SNMP client must be
properly configured. In addition, you can add more information to the SNMP server by enabling the Performance
Monitoring Counter plug-in (see Chapter 13. Performance Monitoring).
In IDENTIKEY Appliance, SNMP is used for querying statistics and for system monitoring purposes.
SNMP is used to query IDENTIKEY Authentication Serverstatistics and system statistics. Querying IDENTIKEY
Authentication Server statistics includes for instance the number of authentications and failed authentications.
Querying system statistics includes memory usage, disk usage, system load etc.
SNMP is also used for system monitoring purposes to alert administrator of certain events by creating and sending
targets, amongst other, in the form of SNMP traps. We recommend to monitor the following types of events:
n System OS events
n IDENTIKEY Appliance Configuration Tool events
n IDENTIKEY Authentication Server events
For more information on the practical usage of SNMP and a detailed description of how to configure SNMP, hand-
ling MIB files and the IDENTIKEY Appliance System Monitoring feature, refer to Section 14. Health Check and the
IDENTIKEY Appliance Administrator Guide; for a list of the relevant field and file descriptions refer to the IDENTIKEY
Appliance Administrator Reference.
Performance Monitoring is disabled, enabled, and managed using the IDENTIKEY Appliance Configuration Tool.
IDENTIKEY Appliance uses Filters to define what to monitor; the different supported plugins are used to control how
to deliver that data. Filters are applied to all possible output plugins.
13.1. Filters
The Performance Monitoring tool uses filters to determine which specific parts of IDENTIKEY Appliance processing
should be monitored.
A filter must consist of the name of a performance transaction. You can specify a single performance transaction,
or you can use the asterisk (*) wildcard to identify a group of transactions.
In the IDENTIKEY Authentication ServerConfiguration Utility click Add to define a filter. In the Transaction Filter box ,
a filter can be added by entering a pattern. This pattern must consist of the name of a performance transaction.
The positioning of the asterisk determines what performance transactions will be filtered. For example:
n *administration.logon -by placing the asterisk at the beginning , all performance transactions
that end in administration.logon will be monitored
n *administration* -by placing an asterisk at the beginning and at the end, everything related to
administration will be monitored
n identikey.scenario.signature* -by placing the asterisk at the end, all performance trans-
actions starting with identikey.scenario.signature will be monitored
n identikey*logon -by placing the asterisk in the middle, all performance transactions starting with
identikey and ending with logon will be monitored.
You can find a list of available performance transactions in the IDENTIKEY Appliance Administrator Reference.
13.2. Plugins
The Performance Monitoring tool uses several plugins in order to define its output.
CSV Plugin
The CSV Plugin allows you to define a comma-separated variable (.csv) file to write the results to. To enable
the CSV plugin, click Enable CSV Plugin in the Performance Monitoring Tool.
Counter Plugin
To enable the counter plugin, click Enable Counter Plugin in the Performance Monitoring Tool.
The Counter Plugin will generate data relating to the number of times certain transactions have been carried
out, and relevant timing information for those transactions. The SNMP server on which the Counter Plugin
enters the data is the one running on IDENTIKEY Authentication Server.
Note
For the counter plugin to work, SNMP must be enabled.
System Monitoring is performed based on the IDENTIKEY Authentication Serverand IDENTIKEY Appliance audit mes-
sages and their contents, and creates an alert when specified messages appear. These alerts, or targets, are sent
via text messages, e-mails, or SNMP traps. To apply system monitoring, the IDENTIKEY Authentication Server Sys-
tem Monitoring feature must be enabled. Use the IDENTIKEY Appliance configuration interfaces to configure,
enable, or disable system monitoring.
Filters help system administrators monitor critical events as they occur, rather than making them search through
an extensive list of audit logs to locate potentially critical system events.
IDENTIKEY Appliance can monitor different types of events. VASCO recommends monitoring the following events:
For more information on system monitoring via SNMP, refer to the IDENTIKEY Appliance Administrator Guide.
Emergency alerts are sent for critical system OS events such as:
n Disk space status - a full disk, for instance, would prevent that additional audit logs are being written
n Memory status: a warning is produced if the system memory is filling
n SNMP status
n Certain processes are started or stopped
Note
The following emergency alerts sent by IDENTIKEY Appliance need to be attended in any case to ensure system
functionality:
n The IDENTIKEY Appliance hard disk drive is more than 90 percent full.
n A critical service is not running, e.g. IDENTIKEY Authentication Server, Syslog, Postgres.
n The swap memory is full.
IDENTIKEY Appliance monitors audit messages generated by the System Configtool source for all Configuration
Tool events.
IDENTIKEY Appliance monitors IDENTIKEY Authentication Server components via the audit messages generated by
the Identikey Server source and sends notifications via SMS, e-mail, or SNMP traps. You can configure which audit
messages are monitored via the source field of an audit message.
14.2. Filters
System Monitoring requires filters to specify which IDENTIKEY Appliance events / audit messages should be mon-
itored. Filter details must include a/an:
n Name
n Target, specifying which notification method is to be used
n Audit message type to monitor
n Specific field
n Condition
n Value for the specified field
14.3. Targets
The System Monitoring tool requires one or more targets to be defined to specify the output format. The available
target formats are:
n SMS
n E-mails
n SNMP-traps
The following table lists the different required information for each target.
Note
When you configure SNMP targets, make sure to set both the Authentication type AND the Privacy type for a
complete trap configuration in the IDENTIKEY Appliance Configuration Tool, i.e. you cannot set a privacy
type without setting an authentication type.
When using IDENTIKEY Authentication Server System Monitoring, OneSpan recommends defining SNMP targets for
the following IDENTIKEY Authentication Server events:
n IDENTIKEY Authentication Server Errors. For this type of events, OneSpan recommends defining an audit fil-
ter that extracts all error audit messages.
n Locked DIGIPASS users. For this type of events, a filter should be defined that extracts all audit messages
with the audit code ‘W-011003’.
n Failed administrative logons. For this type of events, a filter should be defined that extracts all audit mes-
sages with the audit code ‘F-004001’.
n Replication failures. For this type of events a filter should be defined that extracts all audit messages with
the audit code ‘F-003001’ or ‘F-003002’.
In addition, the User Dashboard facilitates user-specific report creation and provides easy access to audit mes-
sages for a single user or DIGIPASS activity record. For more information, refer to 15.1.7. Generating Reports via
the Dashboard Tab, 15.3. Generating Reports via the Reports Tab, and 15.2. View Audit Message Page.
The Dashboard tab of the User Properties page in the Administration Web Interface provides an overview of the
most important settings for the selected user such as user information, assigned DIGIPASS, used clients, and
recent activity.
n Last authentication
n Account status
n Expires
n Static password
n Administration privileges
To view all user account settings or to change settings, switch to the User Account tab of the User Properties page.
This section lists the policy override settings for the user:
n Local authentication
n Back-end authentication
n Offline authentication
n Max Days Between Authentications
n Virtual DIGIPASS
n Virtual signature
To change the policy override settings, switch to the Policy Overrides tab of the User Properties page.
n User name
n Phone
n Mobile
n Email address
n Description
To view all user info settings or to change settings, switch to the User Account tab of the User Properties page.
This section contains information about the five last used DIGIPASS assigned to the selected user, and includes the
following:
n Serial number
n DIGIPASS type
n Status
n Active applications
n Virtual Mobile Authenticator (VDP)
For a complete list of assigned DIGIPASS, switch to the Assigned DIGIPASS tab of the User Properties page.
This section shows the most recent activity records for the user.
To view all recent activity records, switch to the Recent Activity tab of the User Properties page.
This section lists the five last client components used by the selected user, and includes the following:
Click the client identifier to go to the Client Properties page for this client.
Policy ID The policy related to the used client.
Click the policy ID to go to the Policy Properties page for this policy.
To view all recently used clients, switch to the Recent Activity tab of the User Properties page.
The QUICK REPORT button in the User Dashboard of the selected user allows an administrator to quickly generate
a user-specific report. By default, IDENTIKEY Authentication Server generates a Detailed Activity Summary report.
For more information about generating reports via the User Dashboard, refer to the IDENTIKEY Appliance Admin-
istrator Guide, Section "User Dashboard".
For more information about generating user-specific reports via the Reports tab in the User Properties page, refer
to 15.3. Generating Reports via the Reports Tab.
Recent user activities include results from various user operations and IDENTIKEY Authentication Server events:
n Authentication
n Authenticating a user
n EMV-CAP Authentication
n Authenticating using EMV-CAP
n Signature Validation
n Authenticating a signature
n Generating a virtual signature
n Provisioning
n Registering
n Activating
n Assigning
n Registering using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Activating using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Getting activation data using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Registering using Multi-Device Licensing (MDL)
n Adding a device using Multi-Device Licensing (MDL)
n Activating using Multi-Device Licensing (MDL)
n Administration
n Assigning a DIGIPASS authenticator
n Moving a user
When a client application is configured to use auto- unlock and the user account becomes
locked,the audit information also displays the date and time when the end user can authenticate
again to auto-unlock their user account.
The number of recent user activity records displayed can be restricted by time and number. This means that activ-
ity records older than a certain time threshold are excluded from the result. Furthermore, only a total number of
records are returned. The limits are configured in the global server configuration. This means that they apply to all
IDENTIKEY Authentication Server instances within a replicated environment.
Recent DIGIPASS activities include results from various DIGIPASS operations and IDENTIKEY Authentication Server
events:
n Authentication
n Authenticating a user
n EMV-CAP Authentication
n Authenticating using EMV-CAP
n Signature Validation
n Authenticating a signature
n Generating a virtual signature
n Provisioning
n Registering
n Activating
n Assigning
n Registering using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Activating using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Getting activation data using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Registering using Multi-Device Licensing (MDL)
n Adding a device using Multi-Device Licensing (MDL)
n Activating using Multi-Device Licensing (MDL)
n Administration
n Assigning a DIGIPASS authenticator
n Moving a DIGIPASS authenticator
n Unassigning a DIGIPASS authenticator
n Resetting a PIN
n Forcing a PIN change
n Resetting a DIGIPASS Application
n Activating a DIGIPASS Application
n Deleting a DIGIPASS Application
n Resetting activation data
n Enabling a Server PIN
n Disabling a Server PIN
n Setting a DIGIPASS expiration
n Unbinding a device
n Updating a DIGIPASS authenticator (e.g. changing expiration, grace period, ...)
n Binding a device
n Deactivating a DIGIPASS Application
n Unlocking a DIGIPASS Application
n Testing an application
n Setting an event counter
n Events
n A Virtual Mobile Authenticator delivery failed.
n The quota of remaining uses for a Backup Virtual Mobile Authenticator has been spent.
The number of recent DIGIPASS activity records displayed can be restricted by time and number. This means that
activity records older than a certain time threshold are excluded from the result. Furthermore, only a total number
of records are returned. The limits are configured in the global server configuration. This means that they apply to
all IDENTIKEY Authentication Server instances within a replicated environment.
The View Audit Message page displays the details of a single audit message for the user or DIGIPASS recent activity
on a single page and provides access to all relevant audit message fields. To view this page, the administrator
must have the View Audit Information administration privilege; if this applies, they can access the View Audit Mes-
sage page by selecting the relevant audit message code displayed in the Recent Activity page.
The number of audit records for recent user or DIGIPASS activities displayed can be restricted by time and number.
This means that audit records older than a certain time threshold are excluded from the result. Furthermore, only a
total number of records are returned. The limits are configured in the global server configuration. This means that
they apply to all IDENTIKEY Authentication Server instances within a replicated environment.
The Reports tab of the User Properties page provides a list of reports that can be run via this tab. That list is a sub-
set of the global list of reports in IDENTIKEY Authentication Server, where the currently viewed user is automatically
preselected in the run-time query definition. For a complete list of reports that are by default available in this tab,
refer to the IDENTIKEY Appliance Administrator Reference, Section "Reporting".
This subset can be retrieved from the global report set by filtering the reports according to different sets of defin-
ition criteria (see Table 11: Report Definition Criteria).
Using these criteria to create a customized report allows you to also include this report in the results list.
16. Updating
OneSpan is constantly improving its products to solve problems or to address new needs. These improvements are
distributed to the IDENTIKEY Appliance through the updating process. Updating is included in IDENTIKEY Appliance
maintenance contracts.
Updating is managed through the IDENTIKEY Appliance Configuration Tool (see Section 9.3. Configuration Tool).
For more information about the updating procedure, refer to the IDENTIKEY Appliance Installation and Maintenance
Guide.
Updating is supported via an Update Wizard in the IDENTIKEY Appliance Configuration Tool.
When completing an update using the Update Wizard (either online or offline), the IDENTIKEY Appliance restarts
automatically. During restart, services are temporarily unavailable. After restart you need to log on to the Con-
figuration Tool, where you can verify the update state on the Status page.
A fail-over system reverts the IDENTIKEY Appliance to the previous operational version if any error occurs during
updating, e.g. power failure.
If you encounter problems with IDENTIKEY Appliance after upgrading to a new version, you can revert the
IDENTIKEY Appliance operating system to the previous version.
For more information, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
The VASCO Customer Portal server handles licensing, updating, and remote support for the IDENTIKEY Appliance.
Online updating requires a connection secured using HTTPS between the IDENTIKEY Appliance and the
VASCO Customer Portal (see Section 2.14. VASCO Customer Portal).
Packages for offline updates can be downloaded from the VASCO Customer Portal: https://cp.onespan.com/
For more information about backup and restore, refer to the IDENTIKEY Appliance Installation and Maintenance
Guide.
Note
When copying, migrating, or backing up encrypted database files, ensure that the encryption key (and/or the
optional password key) is also backed up. Otherwise, you will not be able to read the data, as it will be encryp-
ted.
17.1. Backup
Backups include all configurations of the Administration Web Interface and the Configuration Tool and all database
information, such as DIGIPASS run-time information.
Backups do not include audit and logging data. However, audit data can be backed up or exported (see Section
20.3. Exporting Auditing Information). Backup is possible using a replication setup, in which case audit data is rep-
licated to another IDENTIKEY Appliance (see Chapter 26. Replication).
For more information about configuring backups, refer to the IDENTIKEY Appliance Installation and Maintenance
Guide.
n Manually
n Automatically (backup pushed from the IDENTIKEY Appliance)
n Scripted (backup pulled from another server)
Manual Backup
The Configuration Tool allows a backup to be created at any time via an update command.
Automatic Backup
With automatic backups you can push a backup to a server using either the Secure File Transfer Protocol
(SFTP) or the File Transfer Protocol (FTP) protocol. SFTP authentication can use a static password or public-
key authentication. Public-key authentication allows connection to a remote server without sending a pass-
word over the Internet. Two keys are used: a private key which is stored securely on the IDENTIKEY Appliance
and cannot be downloaded. The public key is stored on the server to which access is required, usually by the
system administrator when the account is set up.
Automatic backups can be scheduled to run at certain times, for example, daily (e.g. each day at 01:30),
weekly (e.g. each Thursday at 01:30), monthly (e.g. each first of the month at 01:30), or annually (e.g. each
January 1, at 01:30).
Scripted Backup
You can write your own backup script or tool to request a backup from the IDENTIKEY Appliance. Static pass-
word authentication is used. The IP addresses of the network servers permitted to request a backup must be
configured in the IDENTIKEY Appliance Configuration Tool.
All backups (manual, automatic, and scripted) are encrypted by default. A custom encryption passphrase can be
configured; in this case, the passphrase needs to be entered to upload a backup.
The restore function in the Configuration Tool allows you to upload configuration settings and data, which have
been backed up from the same or another appliance, to the IDENTIKEY Appliance internal database.
The file to be restored is first verified as a valid restore file. The IDENTIKEY Appliance needs to be restarted before
the restore is completed. When the file has been restored you can verify the restore state on the Status page.
If you restore a backup to the same appliance, e.g. to repair a configuration error or loss of data, the settings and
data overwrite those currently in the appliance. In this case, re-licensing is not necessary.
If you restore a backup to another appliance, you will get a warning message that the license was issued for a dif-
ferent appliance and will only be operational for a grace period of 30 days. In this case, a new license must be
acquired (see Chapter 11. Licensing).
Warning
The appliance to which a backup is restored should run the same product version as the appliance from which
the backup was made. Upgrade paths for all features may not be supported when restoring a backup to a more
recent version. If in doubt, contact your IDENTIKEY Appliance supplier, who will contact the appropriate OneSpan
expert, if necessary.
18. RAID
Note
The information in this section does not apply to IDENTIKEY Virtual Appliance!
The RAID option (for IDENTIKEY Appliance AG-7XXX models only) provides redundancy between two (hot swap-
pable) disks, supporting full services even when a disk fails or is being replaced. The two disks are continuously
synchronized (also known as RAID mirroring). If one disk fails, all information is still present on the other one.
The two disks are housed in two out of three available slots. The RAID is configured using a wizard, available via
the IDENTIKEY Appliance Configuration Tool whenever an action is required.
Note
Redundancy with the RAID configuration is at disk level. Replication at all levels is also possible between two
appliances and supports redundancy (see Chapter 26. Replication).
RAID can be configured using a wizard. The Configuration Tool automatically provides a respective link with a
status message when an action is required.
n Insert. A new disk needs to be physically inserted into an available slot in the IDENTIKEY Appliance AG-
7XXX. (Note that inserting is not the same as adding the disk to the RAID configuration for syn-
chronization).
n Add. A new disk already inserted into a slot in the IDENTIKEY Appliance AG-7XXX will be added by the
IDENTIKEY Appliance to the RAID configuration for synchronization.
n Replace. The synchronization of a disk to the RAID configuration will be stopped by the IDENTIKEY Appli-
ance. The disk needs to be physically removed from the respective slot in the IDENTIKEY Appliance AG-
7XXX and a new disk needs to be physically inserted. Afterwards, the wizard will offer to add the new disk
to the RAID configuration for synchronization.
n Re-add. This option is only offered for a disk which is physically present and recognized as having been
previously synced, but which is not currently added for synchronization and therefore considered as faulty.
A present disk which is not synchronized might have been physically removed and reinserted while the sys-
tem was running to mimic hardware failure and test fail-over. Re-add can then be used to add the disk to
the RAID configuration for synchronization again.
For more information, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
Auditing
Auditing uses information generated about events in the IDENTIKEY Authentication Server , LDAP Synchronization
and Configuration Tool components as well as system and user actions. Auditing can be managed via the
IDENTIKEY Appliance Configuration Tool using the live audit viewer (see Chapter 9. Administration). It happens in
real-time, allowing administrators to view a limited number of recent events and includes amongst others, inform-
ation about administration events, authentication attempts and RADIUS accounting. For example, an event might
be: User successfully authenticated.
Note
Auditing information also includes RADIUS accounting data.
Tracing
IDENTIKEY Appliance trace files contain debugging and troubleshooting information. The content can help
OneSpan support engineers and experienced end-customers to troubleshoot specific issues.
For more information about configuring and using trace files, refer to the IDENTIKEY Appliance Administrator Guide.
Logging
Logging uses information generated about events in the IDENTIKEY Appliance Configuration Tool (see Section
2.6.2. What is the IDENTIKEY Appliance?) and includes information about operations such as updating, backup
and restore. For example, a log entry might be: Backup was created successfully.
Logging is based on the syslog utility which supports local and remote storage and processing of logs. Settings
can be configured in the Configuration Tool manually or using the Configuration Wizard (see Chapter 10.
Installation Configuration).
Image 49: Data Transmission from the Syslog Utitilty to the Live Log Viewer and Remote Syslog
Each component of the Configuration Tool on the IDENTIKEY Appliance sends information to syslog, i.e. a standard
log message system on a Linux server that can forward log messages in an IP network. The syslog utility handles
the information, which can be stored locally or remotely. Both is possible at the same time. Local logging is always
active and cannot be disabled. Syslog data is made available in the live log viewer. Remote syslog can be activ-
ated and requires configuration.
The syslog audit levels are configured with the IDENTIKEY Appliance Configuration Tool (see Section 19.4. Log
Levels).
A live log viewer in the IDENTIKEY Appliance Configuration Tool allows monitoring of Configuration Tool events.
Live log views can be filtered using log levels and / or words (see Image 50: Live Log Viewer).
Logged events are accumulated on the disk in files of up to 80,000 lines. Then a new log file is created. Log files
are rotated to limit the disk space used. The number of files kept before deleting the oldest file can be configured.
Remote syslog must be activated in the IDENTIKEY Appliance Configuration Tool and requires configuration of:
A syslog-compliant application can then use the data for log viewing.
The log system can be configured to generate log information at different levels.
Notice Events that are unusual, but not errors. No immediate action required.
Informational Normal operational messages, may be collected for reporting or other purposes. No action required.
Debug Information useful to debug error conditions. Not useful during productive operation.
20. Auditing
Three sources of information are generated on IDENTIKEY Appliance:
Auditing
Auditing uses information generated about events in the IDENTIKEY Authentication Server , LDAP Synchronization
and Configuration Tool components as well as system and user actions. Auditing can be managed via the
IDENTIKEY Appliance Configuration Tool using the live audit viewer (see Chapter 9. Administration). It happens in
real-time, allowing administrators to view a limited number of recent events and includes amongst others, inform-
ation about administration events, authentication attempts and RADIUS accounting. For example, an event might
be: User successfully authenticated.
Note
Auditing information also includes RADIUS accounting data.
Tracing
IDENTIKEY Appliance trace files contain debugging and troubleshooting information. The content can help
OneSpan support engineers and experienced end-customers to troubleshoot specific issues.
For more information about configuring and using trace files, refer to the IDENTIKEY Appliance Administrator Guide.
Logging
Logging uses information generated about events in the IDENTIKEY Appliance Configuration Tool (see Section
2.6.2. What is the IDENTIKEY Appliance?) and includes information about operations such as updating, backup
and restore. For example, a log entry might be: Backup was created successfully.
Logging is based on the syslog utility which supports local and remote storage and processing of logs. Settings
can be configured in the Configuration Tool manually or using the Configuration Wizard (see Chapter 10.
Installation Configuration).
To configure the settings for auditing IDENTIKEY Authentication Server, navigate to Authentication Server > Audit
Settings in the IDENTIKEY Appliance Configuration Tool.
For more information on the audit settings and a detailed description of each setting, refer to the IDENTIKEY Appli-
ance Administrator Guide and the IDENTIKEY Appliance Administrator Reference.
Individual audit records can be viewed in the live audit viewer (see Image 51: Live Audit Viewer), filtered, and
exported (see Section 20.3. Exporting Auditing Information) in the IDENTIKEY Appliance Configuration Tool.
Events generated by the IDENTIKEY Authentication Server component for auditing are stored in the internal data-
base and moved to an audit database on a monthly basis or until a maximum audit data size of 500 MB is reached.
When this limit is exceeded, new audit data is stored in a new database part.
Parts of the database can be downloaded and deleted via the IDENTIKEY Appliance Configuration Tool. Down-
loading is the same as the exporting, but uses a format compatible with IDENTIKEY Authentication Server (see Sec-
tion 20.3. Exporting Auditing Information) ).
For more informationc on auditing, refer to the IDENTIKEY Appliance Product Guide.
For a list of audit messages, refer to the IDENTIKEY Appliance Administrator Reference.
n Compatible with IDENTIKEY Authentication Server. This allows the exported data to be imported to an
IDENTIKEY Authentication Server instance acting as dedicated reporting server in a setup with multiple
IDENTIKEY Authentication Server and/or IDENTIKEY Appliance instances.
n As comma-separated values (.csv). This format is commonly used and allows to import the data by other
auditing systems.
Note
The export file created with the .csv option uses tabulators as separator character, not a comma (although it is
still called comma-separated values).
An option is available to enable Secure Auditing during the installation of IDENTIKEY Appliance.
Integrity protection
With Secure Auditing, IDENTIKEY Appliance uses a non-viewable encrypted signature added to each line of an
audit file, or each row of an audit data store. This prevents any operator from making untraceable manual
changes to the audit file.
Independent verification
Each audit file or data store can be verified using the Secure Auditing Verification Tool.
Non-repudiation
Secure Auditing verifies audit data by comparing each signed line or row of audit data with the previous and
subsequent entries in the audit data.
Secure Auditing can also work with a Hardware Security Module (HSM) (see 8.2. Licensing and Configuration).
Secure Auditing adds a cryptographic signature to each audit message written to the output. The cryptographic sig-
nature relates each message entry to the previous and subsequent entries. External auditors can cryptographically
verify each signature and verify that no lines have been manually deleted or added from the audit information; the
relationship between the entries is verifiable using the Secure Auditing Verification Tool.
Each audit message entry belongs to an epoch, which is a period delimited either by time or by number of audit
messages. At the end of each epoch the encryption key is changed. A message is written to the audit file to indic-
ate that an epoch has ended, and another message is written to indicate that a new epoch has begun. The length
of processing for each epoch is defined during initial configuration. A new epoch always begins at midnight. A mes-
sage is written to the output to indicate the beginning and end of an epoch. Each epoch message contains inform-
ation required by the Secure Auditing Verification Tool to decrypt the signatures for that epoch. This information is
located at the start of each epoch message.
21. Tracing
Three sources of information are generated on IDENTIKEY Appliance:
Auditing
Auditing uses information generated about events in the IDENTIKEY Authentication Server , LDAP Synchronization
and Configuration Tool components as well as system and user actions. Auditing can be managed via the
IDENTIKEY Appliance Configuration Tool using the live audit viewer (see Chapter 9. Administration). It happens in
real-time, allowing administrators to view a limited number of recent events and includes amongst others, inform-
ation about administration events, authentication attempts and RADIUS accounting. For example, an event might
be: User successfully authenticated.
Note
Auditing information also includes RADIUS accounting data.
Tracing
IDENTIKEY Appliance trace files contain debugging and troubleshooting information. The content can help
OneSpan support engineers and experienced end-customers to troubleshoot specific issues.
For more information about configuring and using trace files, refer to the IDENTIKEY Appliance Administrator Guide.
Logging
Logging uses information generated about events in the IDENTIKEY Appliance Configuration Tool (see Section
2.6.2. What is the IDENTIKEY Appliance?) and includes information about operations such as updating, backup
and restore. For example, a log entry might be: Backup was created successfully.
Logging is based on the syslog utility which supports local and remote storage and processing of logs. Settings
can be configured in the Configuration Tool manually or using the Configuration Wizard (see Chapter 10.
Installation Configuration).
n Message Delivery Component trace files (see Chapter 23. Message Delivery Component)
n IDENTIKEY Authentication Server trace files. These files record actions performed in the Administration
Web Interface and services such as authentication, electronic signatures, and provisioning.
n LDAP Synchronization trace files (see Chapter 25. LDAP User Synchronization).
n None
n Basic
n Full
n Debug (Only to be used when specifically requested by OneSpan Customer Support)
Message Delivery Component trace files and IDENTIKEY Authentication Server trace files can be configured for
trace file rotation. After a specified amount of time (number of days) or if the trace file exceeds a specified size
limit, the trace file is copied to another (optionally compressed) archive file and a new trace file is created. The
number of files kept before deleting the oldest file can be configured.
Trace files can be viewed, downloaded, and deleted in the Configuration Tool.
Downloading trace files is useful if a OneSpan support engineer needs to troubleshoot a problem, but cannot use
the remote support function. In this case, the system administrator needs to activate tracing in the Configuration
Tool, download the trace file and forward it to support (see Section 24.2. Remote Support).
22. Statistics
Statistics present information in visual charts and graphs about the system usage over time. This information is
available via the IDENTIKEY Appliance Configuration Tool (see Section 9.3. Configuration Tool).
Statistics are available on the IDENTIKEY Appliance, the services, the disk, memory and interfaces.
For example:
It is also possible to filter specific information from some of the statistics data.
MDC interfaces with an SMS, email, voice, or Push Notification gateway to send a one-time password (OTP) or
other message to a user’s phone or email address. MDC acts as a service, accepting messages from the
IDENTIKEY Appliance, which are then forwarded to an SMS, email, voice, or Push Notification gateway.
IDENTIKEY Appliance also supports exporting and importing gateway definition settings to and from XML.
1. User accesses remote application and requests Virtual Mobile Authenticator login.
2. Remote application server forwards the authentication request.
3. IDENTIKEY Appliance checks whether the user is allowed to use a Virtual Mobile Authenticator.
4. Message Delivery Component of IDENTIKEY Appliance sends an OTP to the SMS or email gateway.
5. Gateway server forwards the OTP as a text message to the user's mobile phone or as an email.
6. User enters the OTP from the message or e-mail into the remote application.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that if the Email Delivery
option is selected, ensure that the gateway server is configured to use SSL and TLS encryption.
For more information on GDPR, refer to the IDENTIKEY Appliance General Data Protection Regulation Compliance
Guide.
Image 52: Virtual Mobile Authenticator Process Using IDENTIKEY Appliance MDC
IDENTIKEY Appliance trace files contain debugging and troubleshooting information. The content can help
OneSpan support engineers and experienced end-customers to troubleshoot specific issues. An MDC-specific trace
file can be accessed in the IDENTIKEY Appliance Configuration Tool (see Chapter 21. Tracing).
Since every gateway uses different submission parameters, certain settings are required, which can be configured
through the IDENTIKEY Appliance Configuration Tool. For more information, refer to the IDENTIKEY Appliance Admin-
istrator Guide.
Remote support and access to your IDENTIKEY Appliance are achieved through the VASCO Customer Portal (see
Section 2.14. VASCO Customer Portal).
If necessary, OneSpan experts can access the IDENTIKEY Appliance remotely to solve any problems. Remote sup-
port requires a connection between the VASCO Customer Portal and the IDENTIKEY Appliance (see Section 2.14.
VASCO Customer Portal). System administrators can activate this connection through the Configuration Tool.
Connection to the VASCO Customer Portal is not possible, however, until a support certificate has been uploaded
to the IDENTIKEY Appliance. This certificate is available for use after successful licensing (see Chapter 11. Licens-
ing) of the IDENTIKEY Appliance and is activated via the VASCO Customer Portal.
For more information about how to download and activate the support certificate and how to connect to the
VASCO Customer Portal, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
Replication is the process of replicating data between separate instances of IDENTIKEY Appliance (see 26. Rep-
lication).
LDAP user synchronization can be configured in the Configuration Tool and supports automatic creation and updat-
ing of user accounts on the IDENTIKEY Appliance from records stored on an LDAP server. Other methods of creating
user accounts using the Administration Web Interface include creating user accounts manually, importing user
accounts, and Dynamic User Registration (see 27. DIGIPASS User Accounts).
LDAP user synchronization is not server-specific and must be configured particularly for different LDAP servers, e.g.
for Microsoft Active Directory 2008 or for NetIQ eDirectory. For more information, refer to the IDENTIKEY Appliance
Administrator Guide.
For a full listing and explanations of the fields for LDAP synchronization profiles, please refer to the IDENTIKEY Appli-
ance Administrator Guide, Section Configuration Tool: Field Listings.
Example mappings of LDAP server user account attributes to IDENTIKEY Appliance user account properties are lis-
ted in the IDENTIKEY Appliance Administrator Guide.
Note
For most LDAP servers, the LDAP user password attribute cannot be mapped to an IDENTIKEY Appliance user
account password, due to security settings on the LDAP server.
Once the appropriate settings and mappings have been configured, synchronization is automatic. LDAP syn-
chronization of user accounts is from the LDAP server (source) towards the IDENTIKEY Appliance (destination), and
is not bidirectional.
The Distinguished Name attribute is used to track the source status of a user account, i.e. whether the user
account was created through a synchronization or by another method. User accounts created or updated by a syn-
chronization profile have the Distinguished Name attribute (from the LDAP user account) added to their IDENTIKEY
Appliance user account. The specific IDENTIKEY Appliance user account properties, which are updated or created
by the synchronization, depend on the Attribute Mapping entries in the synchronization profile.
The User Attributes tab in the IDENTIKEY Appliance (see Image 53: User Attributes in Administration Web Interface)
identifies user accounts which have been synchronized from an LDAP server. For more information about user
attributes, see Section 27.3. User Attributes.
Example
In the example shown in the image below, the user account 'axsguard' has been synchronized.
Synchronization involves searching in the LDAP server for user accounts which match the filter definitions and are
located at the search base defined in the synchronization profile. User accounts and the attributes listed for map-
ping in the profile are retrieved from the LDAP server. For retrieved user accounts, the synchronization process may
identify one of the following possibilities on the IDENTIKEY Appliance (see Image 54: LDAP Synchronization to
Create or Update an IDENTIKEY Appliance User Account):
1. The user account exists on the IDENTIKEY Appliance in the destination domain and organizational unit:
n With the Distinguished Name attribute. In this case the user account is updated.
n Without the Distinguished Name attribute. In this case, synchronization behavior depends on the syn-
chronization profile Update Users setting. The following settings are possible:
n None: existing users are not updated during synchronization; the status of the Distinguished
Name attribute also remains unchanged.
n All: all existing users are updated during synchronization, if necessary; the Distinguished Name
attribute is created for all users who so far did not have this attribute.
n Created by LDAP Synchronization only: only user records previously created by
LDAP synchronization are updated; the Distinguished Name attribute is not created, because dur-
ing LDAP synchronization only users who already have this attribute are handled.
n Not created by LDAP Synchronization: only user records that were not created previously by LDAP
synchronization are updated; the Distinguished Name attribute is created for all users who so far
did not have this attribute.
2. The user account exists on the IDENTIKEY Appliance in the destination domain but in a different organ-
izational unit:
n With the Distinguished Name attribute. In this case the user account is moved and the properties
are updated.
n Without the Distinguished Name attribute. In this case, no account is created and an error is
logged. User accounts must be unique within a domain in the IDENTIKEY Appliance (see Chapter
35. Organization).
3. The user account does not exist on the IDENTIKEY Appliance. In this case the user account is created and
the value for the Distinguished Name attribute added.
Image 54: LDAP Synchronization to Create or Update an IDENTIKEY Appliance User Account
Note
1. Missing LDAP attributes and LDAP attributes with empty values initiate different synchronization behaviors. If a
mapped attribute is missing on the LDAP server, the IDENTIKEY Appliance property is not updated (i.e. the exist-
ing value remains). If a mapped attribute is present on the LDAP server with an empty value, the IDENTIKEY Appli-
ance property is updated with the empty value, (i.e. any existing value is overwritten).
2. If an IDENTIKEY Appliance user account has a Distinguished Name attribute, any manual changes made by the
administrator to properties which are mapped to LDAP attributes in the profile are overwritten during syn-
chronization.
An activated synchronization profile deletes a user account on the IDENTIKEY Appliance if it has the Distinguished
Name attribute, but the corresponding user account cannot be found on the LDAP server. This may occur under the
following circumstances:
n the user account has been removed from the LDAP server
n the user account on the LDAP server has been moved from the search base defined in the profile
n the user account on the LDAP server has been changed and no longer matches the profile's filter
n synchronization profile settings have been changed, e.g. the search base or filter entries.
Synchronization frequency can be configured up to 24 times per day and happens at 14 minutes past the hour (at
intervals depending on the frequency setting). The IDENTIKEY Appliancealso checks at five- minute intervals
whether any synchronization profiles have been changed and, if so, initiates a synchronization immediately.
The minimal rights for a BIND DN user account should permit reading all user information in the configured search
base.
1. To manage synchronizations from multiple LDAP Servers to different domains on a single IDENTIKEY Appli-
ance.
2. To filter user accounts on more than one value of a particular LDAP server attribute, e.g. to synchronize
user accounts for which the email address attribute matches both able.be or skynet.be endings. Entering
both these specifications for a filter match in a single synchronization profile would only retrieve accounts
which had both values for the email address attribute. Retrieving accounts which have one or the other
value therefore requires two profiles.
3. To help manage source and destination organizational hierarchies (see next section).
With multiple synchronization profiles, synchronizations are completed in series, i.e. not simultaneously, and are
grouped according to their LDAP server and Bind DN to optimize re-use of connections and authentications.
If a server cannot be contacted, further synchronizations from the same server are skipped until the next sched-
uled synchronization.
More than one synchronization profile can be applied to a particular user account record, although this is not recom-
mended, because it may cause user account properties on the IDENTIKEY Appliance to alternate between different
values synchronized from the different profiles.
LDAP Synchronization of user accounts can either synchronize user accounts to a flat name space as specified, or
mirror the organizational unit structure on the source LDAP server.
If configured not to mirror the source structure,user accounts from the search base in the LDAP server hierarchy are
synchronized to a single destination address in the IDENTIKEY Appliance hierarchy as defined in the syn-
chronization profile. The synchronization profile can be configured to either synchronize all user accounts at and
below the search base (Profile 1 in the examples below), or only user accounts at the level of the search base (Pro-
file 2 in the examples below).
If the synchronization profile is configured to mirror the source structure and create missing organizational units,
synchronization creates an organizational structure on the destination IDENTIKEY Appliance to match the structure
on the LDAP server. If the LDAP structure differs from the existing IDENTIKEY Appliance structure, missing organ-
izational units which have users in them on the source server are created on the IDENTIKEY Appliance(Profile 3 in
the examples below). If the Create missing OU's option is not configured, organizational units not already existing
on the IDENTIKEY Appliance are not created, so that these parts of the hierarchy will be missing (Profile 4 in the
examples below).
Options which define the structure and synchronization in the IDENTIKEY Appliance are explained in the table
below.
User accounts can be synchronized to different destination domains and/or organizational units in the IDENTIKEY
Appliance through separate definitions of synchronization profiles using the above options as shown in the
examples below.
Example
Synchronization Profiles 1 and 2 in the image below are both configured to synchronize from the LDAP server
search base 'Domain A, Organizational Unit A1', to the IDENTIKEY Appliance destination address 'Domain A,
Organizational Unit A1'.
With Profile 1, the option to synchronize all user accounts at and below the search base is configured. Users 1 to
9 are synchronized to the single destination address in the IDENTIKEY Appliance hierarchy. No sub-organizational
units are created below the organizational unit A1 at the destination.
With Profile 2, the option to synchronize only user accounts at the level of the search base is configured. Users 1
to 3 are synchronized to the single destination address at in the IDENTIKEY Appliance. Users 4 to 9 are not syn-
chronized and no sub-organizational units are created below the organizational unit A1 at the destination.
Synchronization Profiles 3 and 4 in the image below are both configured to synchronize from the LDAP server
search base 'Domain A, Organizational Unit: DIGIPASS users', to the IDENTIKEY Appliance destination address
'Domain B, Organizational Unit: DIGIPASS users'.
With Profile 3, the options to synchronize all user accounts at and below the search base, to mirror the organ-
izational unit structure and create missing organizational units are selected. The structure of the LDAP server is
replicated in the IDENTIKEY Appliance.
With Profile 4, the options to synchronize all user accounts at and below the search base and to mirror the organ-
izational unit structure are selected. The structure of the LDAP server is replicated in the IDENTIKEY Appliance,
but the sub-organizational units A1 and A2 are not created because the option to create missing organizational
units has not been selected.
Note
Parent and child organizational unit naming
Although parent and child organizational units in an LDAP hierarchy can have the same names, this is not pos-
sible in the IDENTIKEY Appliance. User synchronization will fail, therefore, if the LDAP structure includes the same
names for parent and child organizational units.
There are two sources of information recorded for LDAP user synchronization:
n Audit files for general information. An audit file is created when a service is started, containing basic
information such as the start and end time of the synchronization, records found in the source LDAP
server, records created or updated in the destination IDENTIKEY Appliance and any error messages or
warnings. For more information about audit files, refer to Chapter 20. Auditing).
n Trace files for troubleshooting. Trace files contain detailed debugging or troubleshooting information. The
content may be cryptic, but helps OneSpan support engineers and experienced end-customers to
troubleshoot specific issues. A trace file specifically for LDAP user synchronization can be accessed in the
Configuration Tool. For more information about trace files, refer to Chapter 21. Tracing.
26. Replication
Two instances of IDENTIKEY Appliance can be configured to synchronize data changes between each other. This
process is called replication, and can be set up using the Replication Wizard. The replication process ensures that
each database is up-to-date with the latest modified data changes.
This chapter intends to provide information on which data is replicated, common replication configurations, the
Replication Wizard, the replication process, and how it is monitored.
For information on the Replication Wizard and configuring replication, refer to the IDENTIKEY Appliance Admin-
istrator Guide.
For more information on the fields available for configuring replication, refer to the IDENTIKEY Appliance Admin-
istrator Reference.
Note
Audit records are copied, but changes are not synchronized. For example, deleting audit records on one system
does not delete the records on another system.
Data which are not replicated between appliances in a replication setup include:
n Logging. However, the remote syslog function allows consolidation and/or backup of logging information
(see Chapter 19. System Logging).
n Configuration Tool settings. This allows the activation of different services (e.g. authentication, signature
and/or provisioning) on IDENTIKEY Appliances within a replication setup. However, this also means that
some settings, such as enabling LDAP Active Directory back-end authentication, need to be configured
manually on each replication peer.
The most common, and most basic, replication setup is used when a company has two IDENTIKEY Appliances,
allowing a redundant setup in case of hardware failure. Following initial synchronization, all services are identical
on both IDENTIKEY Appliances with modified data replicated in both directions.
This scenario is often used when a company requires an off-site disaster recovery IDENTIKEY Appliance and data-
base.
Image 58: Replication Between Primary, Backup, and Disaster Recovery IDENTIKEY Appliance
Replication is configured using a wizard in the IDENTIKEY Appliance Configuration Tool. IP addresses of the source
and target IDENTIKEY Appliances need to be specified in both: all further configuration is automated with the target
becoming a replication of the source IDENTIKEY Appliance. Following synchronization, all services are identical on
both IDENTIKEY Appliances with modified data replicated in both directions.
Note
Auditing data are copied, they are not replicated. For more information on audit log copying, refer to the
IDENTIKEY Appliance Administrator Guide.
The host name specified in the Configuration Tool during the first-time Configuration Wizard or manually (see
Chapter 10. Installation Configuration) is used to identify the correct IDENTIKEY Appliance in the replication setup.
This host name is used:
n for selecting the correct IDENTIKEY Appliance to log on to using the Administration Web Interface
n as an identifier in the logging to determine the source of the log line (see Chapter 19. System Logging).
The procedure of how to complete the Replication Wizard is explained in the IDENTIKEY Appliance Administrator
Guide.
Note
1. Only the authentication setup can be replicated. Audit logs can be copied between two systems in a rep-
lication setup.
2. Replication between different major versions of IDENTIKEY Appliance is not possible.
3. During most upgrades, replication links that are present on the instance of IDENTIKEY Appliance are
removed.
Replication and replication setup between two or more appliances is performed using three separate TCP con-
nections:
These connections need to be permitted if replicating appliances are separated by a company firewall.
For more information about the ports used by IDENTIKEY Appliance, refer to the IDENTIKEY Appliance Administrator
Reference.
Replication consists of two separate processes: it involves writing a data update to the replication queue (creating
a replication entry) and sending a replication entry to another IDENTIKEY Appliance.
Replication forwarding is required and activated automatically where more than two IDENTIKEY Appliance
instances are replicating. The ID of the source IDENTIKEY Appliance and the target IDENTIKEY Appliance(s) to which
the source is sending the information are added to the replication entry. This allows the receiving IDENTIKEY Appli-
ance to check which other IDENTIKEY Appliance the replication entry has already been sent. It will forward the
entry only to those IDENTIKEY Appliance instances not listed.
The replication method used by the IDENTIKEY Appliance involves replication of entire records, for example all set-
tings of a specific DIGIPASS user account, rather than an individual user account setting, such as a password. This
means that data clashes can occur when a single record is updated at the same time from different sources. If this
occurs, the later change is written to the database and earlier changes are ignored.
The replication status, viewable in the System tab in the Administration Web Interface (see Image 61:
'System' Tab in the Administration Web Interface), shows the current status of replication for an IDENTIKEY Appli-
ance and the number of entries currently in the replication queue (see Image 62: Replication Status Screen in the
Administration Web Interface).
User accounts can be created, managed, and searched for using the Administration Web Interface (see 9.4. Admin-
istration Web Interface).
A DIGIPASS user account can be created using the Administration Web Interface in the following ways:
n Importing users from a file, single records or in bulk. For more information, refer to the Administration Web
Interface Help, "How To Import Users".
n Manually creating user records using Create User in the Administration Web Interface. For more inform-
ation, refer to the Administration Web Interface Help, "How To Create a User".
n Dynamically during authentication processing (if Dynamic User Registration is enabled).
n Via LDAP synchronization. User information on IDENTIKEY Appliance can be synchronized with external
LDAP databases by using the LDAP Synchronization Tool. For more information, refer to the LDAP Syn-
chronization Tool Guide.
n By synchronizing with LDAP servers (see 25. LDAP User Synchronization).
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that LDAP Syn-
chronization Tool is used to synchronize user information from any LDAP data store with any IDENTIKEY
Authentication Server data store. To be GDPR-compliant, the following requirements must be met:
For more information on GDPR, refer to the IDENTIKEY ApplianceGeneral Data Protection Regulation Com-
pliance Guide.
Users can be created manually by the system administrator. The following records need to be defined to create a
user:
n user ID, domain and optionally an organizational unit (see 35. Organization)
n static password (optional)
Further management possibilities with user accounts are listed below. For more information about the user prop-
erty fields, refer to the IDENTIKEY Appliance Administrator Reference.
Multiple user accounts can be imported into the IDENTIKEY Appliance in a comma separated values (.csv) text file
through the User/Import screen of the Administration Web Interface.
For more information about structuring comma separated values within a text file, refer to the IDENTIKEY Appliance
Administrator Reference, Section "Importing users using Comma Separated Value Files".
27.1.3. Creating a DIGIPASS User Account Using Dynamic User Registration (DUR)
When IDENTIKEY Appliance receives an authentication request for a user without a DIGIPASS user account, it can
check the credentials with the back-end server (e.g. RADIUS). If back-end authentication is successful, IDENTIKEY
Appliance can create a DIGIPASS user account automatically for the user. This process is called Dynamic User Regis-
tration (DUR) and can be enabled via policy. For more information about Dynamic User Registration, see 3.5.4.
Dynamic User Registration.
DUR is commonly used together with Auto-Assignment; with this combination, new accounts are immediately
assigned to a DIGIPASS. For more information about Auto-Assignment, see 28.3.2. Auto-Assignment.
By default, DUR user information synchronization is disabled. To enable and configure it, you need to change
the applicable policy accordingly.
LDAP user synchronization supports automatic creation and updating of user accounts on the IDENTIKEY Appliance
from records stored on one or more LDAP servers. Synchronization needs to be configured in the Configuration
Tool, by defining a synchronization profile for your specific LDAP server(s).
User Account settings which can be managed through the Administration Web Interface include:
n the user ID, the domain and possibly organizational unit they belong to, are defined on creation; users can
also be moved from one organizational unit to another, but cannot be moved between domains (see Sec-
tion 35.3. Moving DIGIPASS User Accounts and DIGIPASS)
n the account status can be enabled, disabled, locked or deleted
n a static password can be enabled and set (see Section 27.5. DIGIPASS User Account Static Password)
n whether policy settings for local or back-end authentication may be overruled for a user can be specified
n DIGIPASS records can be assigned to or unassigned from a user
n parameters, such as a user's mobile phone number for using a Virtual Mobile Authenticator, can be stored
n user and RADIUS attributes, which may need returning to applications when requested, can be stored (see
Section 27.3. User Attributes)
n privileges can be assigned to a user, e.g. for administration (see Section 27.7. Administration Privileges )
n identifying that a user account's static password has been randomized (see Section 6.5. Password Ran-
domization)
n storing attributes which may need to be returned to applications when requested
n storing RADIUS attributes (see Section 27.3.1. RADIUS Attribute Settings)
n identifying that a user account has been created and is updated through LDAP user synchronization (see
Section 25.2. Identifying Synchronized Users)
RADIUS and custom user attributes can be configured and modified in the Administration Web Interface , as
explained in the following sections.
RADIUS reply attributes can be returned with an Access-Accept when handling authentication requests from
a RADIUS Client. The attributes may include authentication parameters or authorization settings.
Acceptable RADIUS attribute names for use with IDENTIKEY Appliance can be uploaded via the Configuration Tool.
For more information, refer to the IDENTIKEY Appliance Administrator Guide.
Attribute Group
For RADIUS attributes, one or more attribute groups are specified in the policy used for the specific client.
Usage
Not currently in use for RADIUS attributes.
Value
The required value of the RADIUS attribute.
Custom attributes can be used with OneSpan Plug-Ins and DIGIPASS Authentication Modules.
Attribute Group
An attribute group is specified by the client component as a parameter in the authentication request. When
multiple client components are using custom user attributes, the specified attribute group ensures that only
attributes required by the specific client are returned.
Name
A name for the attribute as expected by the client component.
Usage
n Basic indicates that the attribute is for use by DIGIPASS Authentication for IIS Basic for Basic
Authentication.
n Return indicates an SBR return attribute
n Check indicates an SBR check attribute
Value
The required value of the named attribute.
The Administration Web Interface allows you to search for user account records in a number of ways:
The DIGIPASS user account has one static password field which can be used in different ways:
n local static password verification for users who do not have a DIGIPASS device (see Section 3.6.3.
Authentication without DIGIPASS) or if the local authentication mode in the relevant policy is set to
DIGIPASS or Password (see Section 3.6. Local Authentication)
n during Challenge/Response authentication, as request method (see Section 3.6.2.9. Request Method and
Keyword)
n when using Virtual Mobile Authenticator as request method (see Section 3.6.2.9. Request Method and Key-
word)
n for password replacement and auto-learn (see Section 3.7. Back-End Authentication)
n for back-end authentication, e.g. for retrieval of RADIUS attributes (see Section 3.7. Back-End Authentic-
ation)
n for static password authentication during the grace period (see Section 3.5. Looking Up and Checking the
DIGIPASS User Account) or if the local authentication mode in the relevant policy is set to DIGIPASS or Pass-
word (see Section 3.6. Local Authentication)
You can customize password strength rules to enhance password security. These rules control the required format-
ting of passwords. Password strength rules are configurable in the policy associated with the IDENTIKEY Authentic-
ation Server component. The password strength rules can be configured via the User tab in the Administration Web
Interface policy administration page. Different password complexity rules can be applied for administrators and
users.
n Administrators. IDENTIKEY Authentication Server supports password complexity rules through the server
policy. There is a client component entry per server in the database, which has a policy assigned. The
effective policy values for password complexity rules are applied for administrator users.
n Users. When applying password complexity rules to users (i.e. no administrative privileges assigned), only
the values defined in the base policy of the server policy are applied, instead of the effective settings.
By default, password complexity rules are only defined in the base policy, i.e. a default installation of IDENTIKEY
Authentication Server will have to be adapted accordingly.
Note
The user password strength rules for administrative programs or clients that will connect to IDENTIKEY
Authentication Server are defined in the server policy. Password policies only apply to static passwords when
they need to be created or updated. They do not apply to the passwords used by the following:
n First administrator
n SSL certificates
n Security configuration for the initial SNMPv3 user
Note
IDENTIKEY Authentication Server supports Unicode in passwords, however support of characters can be
limited by the back-end server, should one have been configured to be used in the respective context.
The default password strength rules will be applied to the first administrator password. The default password
strength rules are:
Password strength rules are NOT enforced for users in Active Directory installations.
For back-end authentication with ODBC, the password policy of both IDENTIKEY Appliance and back end should be
identical. If there are multiple back ends with each one having different password policies, the IDENTIKEY Appli-
ance should be either less strict or just as strict as the least strict password policy among all the back ends.
Another factor contributing to password strength is the expiration of the static password as this ensures that end
users change their static password at adequate intervals. In IDENTIKEY Authentication Server the end user's local
static password continuously expires at the interval that has been specified, and if the local authentication mode
DIGIPASS or Password has been selected in the effective policy. For more information about this authentication
mode, see 3.6. Local Authentication.
Note that this type of password expiration applies to the static password locally stored in IDENTIKEY Authentication
Server. If you change the local static password, it is not synchronized with the static password in a possible back-
end system. That means that if you are using back-end authentication, the local static password and the back-end
password will be different, for example, after changing the local password via the Administration Web Interface.
Note
You should not use local static password expiration when using back-end authentication, but rely on the back-
end system to enforce password expiration (see 27.6.4. Static Password Expiration (Back-End Password)).
If Days to Notify before Expiration has been set in the effective policy, the user will receive a notification in
IDENTIKEY Authentication Server and/or OneSpan User Websites that the static password is about to expire with
the exact expiration date indicated.
Web Administration Service allows users to set their passwords when they are notified and have the respective
administrative privileges (Set User Password).
Usually you can configure your back-end passwords to expire to force users to change their back-end passwords
regularly. This is preferred to using local password expiration (see 27.6.3. Static Password Expiration (Local Pass-
word)).
If you configure your static back-end passwords to expire after a certain time, you can allow users who log on to
the Administration Web Interface to change their password right from the login page. This means that whenever a
user attempts to log on to the Administration Web Interface and the back-end password has expired or has been
set to be changed at next logon, the user is automatically redirected to a change password page.
In order to set a new back-end password, the user needs to authenticate first using either the current back-end
password or a one-time password (OTP) generated by an authenticator assigned to the user. In the former case,
the user is automatically logged on after successfully setting a new back-end password; in the latter case, the
user is redirected to the login page again.
Changing expired back-end passwords at the login page requires the following:
n If you have enabled Stored Password Proxy in the policy to use the stored password for back-end authen-
tication, you must enable Password Autolearn as well. Otherwise, the stored password and the effective
back-end password will differ after changing an expired back-end password and logon will no longer
work.
Only DIGIPASS user accounts with administrative permissions can use the Administration Web Interface to con-
figure the IDENTIKEY Appliance. Administrative privileges are assigned to DIGIPASS user accounts and therefore a
DIGIPASS user account is needed for each administrator. For more information about the default administrative
accounts, refer to Section 9.1. Default Administrative Users. For more information about creating more secure
administrative accounts using DIGIPASS OTP authentication, refer to Section 9.2. Creating a New System Admin-
istrator. Creation of more secure administrative accounts requires the assignment of privileges, as explained here.
The domain and organizational unit in which the administrator account is located will determine their range of
administration access:
n If the account belongs to an organizational unit, the administrator will be able to administer user accounts
and DIGIPASS records belonging to that organizational unit.
n If the account does not belong to an organizational unit, the administrator will be able to administer all
DIGIPASS records and user accounts in the domain to which they belong.
n If the account belongs to the Master Domain, the administrator may be able to administer all DIGIPASS
records and user accounts in the database. This depends on the Access Data in All Domains privilege,
which is only available to administrators in the Master Domain.
For more information, refer to Section 35.1. Domains and Organizational Units.
Note
Copy Admin Privileges From does not copy the domain scope along with the Administrative Privileges. Domain
scope values must be set per administrator.
A DIGIPASS user account can become locked after a specified number of unsuccessful authentication attempts.
Unlocking a locked DIGIPASS user account usually requires assistance from an administrator.
To ease unlock effort and reduce support incidents, you can allow users to unlock a locked DIGIPASS user account
themselves without administrative assistance using user auto-unlock.
The user auto-unlock mechanism allows a user to implicitly unlock a locked DIGIPASS user account during regular
authentication or signature validation. It is enabled and configured using policies.
Note
For security reasons user auto-unlock works only, if the DIGIPASS user account has been locked after too many
consecutively failed authentication attempts. A DIGIPASS user account that has been explicitly locked by an
administrator cannot be unlocked by the user auto-unlock mechanism.
When a DIGIPASS user account becomes locked, it remains locked for a specified time span, i.e. the lock duration.
After that time span the user may try to authenticate again. If authentication succeeds the DIGIPASS user account
is unlocked at the same time. If authentication fails the DIGIPASS user account remains locked. The number of
maximum unlock attempts is limited; if no more unlock attempts are left, the DIGIPASS user account remains
locked and can only be unlocked by an administrator.
After each unsuccessful unlock attempt the effective lock duration is increased by a specified multiplier, thus
increasing the time span before the user may try to unlock the DIGIPASS user account again. Note that the effective
lock duration is considered to begin from the last authentication request. Attempting to unlock by authenticating
(even with a valid password or OTP) before the lock duration has elapsed does not count as unlock attempt (and
does not unlock the DIGIPASS user account). However, since it is considered an (unsuccessful) authentication
request, the last authentication request time is updated, meaning that the lock duration begins again.
27.8.2. Configuration
By default, user auto-unlock is disabled. To enable and configure it, you need to change the applicable policy
accordingly. A default policy prepared to support user auto-unlock is included in the set of pre-loaded policies, i.e.
IDENTIKEY Local Authentication with Auto-Unlock . For more information, refer to the IDENTIKEY Authentication
Server Administrator Guide, section "DIGIPASS User Account Locking".
28. DIGIPASS
A DIGIPASS authenticator is a device providing one-time password and digital signatures to a user, and is used to
enable secure access for a specific person within an organization. For more information, refer to Section 2.4.
DIGIPASS Authenticator Types.
Each DIGIPASS authenticator need to be registered in IDENTIKEY Appliance to support authentication requests
which use a one-time password generated by the DIGIPASS authenticator.
Some DIGIPASS settings are pre-programmed into the devices during manufacture, some are assigned through
policies and others can be assigned specifically to a DIGIPASS authenticator using DIGIPASS records. Both, policies
and DIGIPASS records, are configurable in the Administration Web Interface.
A DIGIPASS (client) PIN is a digit-based secret, known by the user, which needs to be entered into the DIGIPASS
device for a one-time password (OTP) to be generated. This implies 2-factor authentication: the person logging in
must be in possession of the DIGIPASS device (something you have) and know the DIGIPASS PIN (something you
know) to generate an OTP.
This option requires a DIGIPASS device with a keypad for the PIN to be entered, and is therefore not possible with
one-button DIGIPASS models. An alternative solution for 2-factor authentication with a one-button DIGIPASS model
is explained in the next section.
PIN change can be offered to users through pre-programmed PIN modification settings (see specific DIGIPASS
model user guides):
n An initial PIN can be set for a DIGIPASS device. This PIN must then be sent to the user of the DIGIPASS, typ-
ically separate from the DIGIPASS delivery.
n First Use PIN Modification requires a PIN change from the user upon the first use of the DIGIPASS device.
n PIN Change allows a user to change their PIN as desired.
n The PIN length can be set for a DIGIPASS device.
n DIGIPASS Lock sets the number of consecutive faulty PIN entries allowed before the DIGIPASS device is
locked.
Note
The DIGIPASS client PIN is not possible with one-button models (i.e. the DIGIPASS GO range models). The Server
PIN is an alternative solution for two-factor authentication only available with one-button DIGIPASS models. Refer
to Section 3.6.2.1. Server PIN for more information on the server PIN.
Also, each DIGIPASS authenticator may be given a grace period when it is assigned to a DIGIPASS user account. For
more information on this, refer to Section 3.6.2.2. Grace Period.
DIGIPASS records may be imported into IDENTIKEY Appliance via the Administration Web Interface. DIGIPASS can be
imported either individually or in bulk.
The DIGIPASS Import Wizard guides you through the steps of importing DIGIPASS from the .dpx file. You can specify
the applications that will be available with the imported DIGIPASS, and whether the imported DIGIPASS will be set
as Active or Inactive on import. You can also specify if existing DIGIPASS will be updated with the data from the
.dpx import file.
DIGIPASS may be assigned to users in a number of ways, depending on the requirements of your company. For
example, a company with only a few user accounts may use Manual Assignment. A larger company needing to dis-
tribute large numbers of DIGIPASS may find it easier to simply distribute the DIGIPASS and require each user to go
through Self-Assignment.
For both assignment modes, a grace period is typically set, which allows a number of days in which the user may
still log in using only their static password. After the grace period has expired, depending on the Local Authentic-
ation settings in the relevant policy, users can then either continue to use both their static password or their
DIGIPASS authenticator (DIGIPASS or Password), or must only use the authenticator (DIGIPASS/Password during
Grace Period or Digipass Only) to log in. The grace period automatically expires the first time an OTP is used to log
in, i.e. after the OTP has been successfully validated (if it has not been set manually to expire prior to that in the rel-
evant policy). Refer to Sections 3.6. Local Authentication and 3.6.2.2. Grace Period for more information.
Note
DIGIPASS records must be imported into the data store before being assigned to users.
Resetting the Server PIN is also possible during DIGIPASS assignment. When using the DIGIPASS Self-Assignment or
Auto-Assignment feature of IDENTIKEY Appliance, the user can reset their Server PIN. When the Assignment Mode
is set to Self-Assignment-Pin-Reset or Auto-Assignment-Pin-Reset, the user's Server PIN is automatically reset.
This is an optional feature and does not require any administrator action, once the option has been enabled in the
DIGIPASS properties and/or the relevant policy settings have been set accordingly.
28.3.1. Self-Assignment
Users can assign a DIGIPASS device themselves via Self-Assignment. With this process, the user must log in and
include the serial number, static password, and one-time password. This informs the IDENTIKEY Appliance of the
assignment; provided that the user enters the details correctly, IDENTIKEY Appliance will link the DIGIPASS record
and the user account. A grace period is not used for this method.
28.3.2. Auto-Assignment
With Dynamic User Registration, IDENTIKEY Appliance performs Auto-Assignment, where IDENTIKEY Appliance will
select a random DIGIPASS authenticator and assign it to the new DIGIPASS user account as it is created. The
DIGIPASS authenticator will then be delivered to the user.
Note
When maker–checker authorization is enabled, assigning a DIGIPASS authenticator requires the approval of a
checker administrator. In that case, Auto-Assignment is not available.
1. DIGIPASS user account is created automatically by IDENTIKEY Appliance during Dynamic User Registration.
2. IDENTIKEY Appliance selects a random available DIGIPASS authenticator to prevent collisions during par-
allel assignment of DIGIPASS authenticators.
3. IDENTIKEY Appliance assigns this DIGIPASS authenticator.
4. IDENTIKEY Appliance sets a grace period.
5. DIGIPASS is sent to the user.
6. User logs in with the static password during the grace period.
7. User receives the DIGIPASS.
8. User logs in with one-time password.
9. Grace period automatically ends.
With Manual Assignment, selected DIGIPASS devices are manually assigned to specific DIGIPASS user accounts.
The DIGIPASS must then be sent to the users.
A number of functions are available to administer DIGIPASS records. These are typically required for
maintenance; for example, if a user has forgotten their Server PIN, or if a DIGIPASS has been locked.
A DIGIPASS Application may need to be reset if the time difference between the application and the server
needs to be recalculated. This would typically be for time-based Response-Only DIGIPASS after a very long
period of inactivity. The 'reset' widens the allowable time window for the next login, allowing the user to log
in and the IDENTIKEY Appliance to calculate the current time shift.
If the event count for an event-based application has become unsynchronized between the DIGIPASS and the
server, this function can be used to set the server event count to the event count on the DIGIPASS.
An administrator may enable or disable use of a Server PIN with a specific DIGIPASS authenticator, or with mul-
tiple authenticators. If Server PIN is enabled, the user must include their Server PIN when logging in. If Server
PIN is disabled, the user must not include a Server PIN.
If a user’s Server PIN needs to be changed – usually because the user has forgotten it – then it can be reset,
and the user can create a new Server PIN when they next log in. This may be done when unassigning or re-
assigning a DIGIPASS.
This function can be used when an administrator wants a user to change their Server PIN on their next login.
This may be desirable as a security measure.
A user’s Server PIN can be set to a specific value and communicated to the user.
If a user incorrectly enters their DIGIPASS PIN into their DIGIPASS a predetermined number of times, the
DIGIPASS will become locked. Once locked, the assistance of an administrator will be required to unlock it.
This function allows an administrator to provide the user with an Unlock Code to enter into their
DIGIPASS.
If a user has attempted to log in with incorrect details too many times, the DIGIPASS Application used may be
locked, depending on policy settings. This function can be used to reset the record status for the DIGIPASS
Application to the unlocked status. This differs from user locking, as the user may still log in with a different
DIGIPASS.
Use this function to check that a DIGIPASS Application is working as expected. This works for either one-time
passwords or Electronic Signatures. There is also a function to test the Backup Virtual Mobile Authenticator
functionality.
Use this function to reset the Event Counter, Activation time and Activation Location on a DIGIPASS.
IDENTIKEY Appliance comes with a wide variety of pre-set reports useful for managing and analyzing DIGIPASS
activity. These reports are available via the Administration Web Interface, and can track the following statistics
(among others):
This section enumerates the different DIGIPASS settings that can affect common administrative tasks.
The following table describes the time-based and event-based modes of different DIGIPASS Applications.
Response-Only Changes the displayed OTP based on the current time. Displays a new OTP each time a request for an
The common time step used is 36 seconds: this means OTP is made.
that the OTP to be displayed will change every 36
seconds, whether or not an OTP has been requested
from the DIGIPASS.
Challenge/Response Generate an OTP based on the challenge given and the Generates an OTP based only on the challenge
current time. The common time step used is 9 hours ( given.
'slow challenge'). This would mean that if the exact same
challenge were given to a DIGIPASS within a 9- hour
period, the DIGIPASS Application will generate the same
OTP. However, challenges are very rarely repeated within
such a time period.
Signature Generates a different signature for the same input data at Contains a numeric counter that increases every
different times. time a signature is generated.
A Signature DIGIPASS Application can also be neither time- nor event-based. Such DIGIPASS Applications will
always produce the same signature for the same input. There is no difference between real-time and deferred
time with such signatures.
This setting refers to the length of the one-time password generated by the DIGIPASS for Response-Only and Chal-
lenge/Response DIGIPASS Application.
Check Digit
A check digit may be added to each OTP. This is generated from the response and allows for faster inval-
idation of incorrect OTPs.
The OTP Length setting does not count the check digit.
This setting refers to the length of the challenge which should be expected by the DIGIPASS. This is used by the
Challenge/Response DIGIPASS Application.
Check Digit
A check digit may be expected with each challenge. This is generated by the server from the challenge and
allows the DIGIPASS to reject most invalid challenges.
These settings are kept in the record for a DIGIPASS Application, and affect which OTP is expected by the
IDENTIKEY Appliance.
Example
Time window may be 5 steps in either direction.
This means that 11 OTPs would be considered valid – the exact OTP for that time, and the OTPs for the 5
time steps either side of the exact time. If the OTP given is for a different time step, the time shift for that
DIGIPASS will be recorded. The next time the user logs in, the expected OTP will be calculated based on that
time shift.
The purpose of this setting is similar to that of Last Time Shift setting: it allows IDENTIKEY Appliance to track
any shifts between the event count recorded by itself and the DIGIPASS.
Several settings dictate how a user can use the Backup Virtual Mobile Authenticator feature. These settings are:
n Enable or disable Backup Virtual Mobile Authenticator and enable method (i.e. Required).
n Time limit/expiry (applies to Time Limited enable only)
n Maximum number of times a user may make use of the Backup Virtual Mobile Authenticator.
The above settings may be set both at the policy level and at the DIGIPASS record level. Individual settings override
policy settings for an individual DIGIPASS, but some policy settings (see below) may be used to automatically set
DIGIPASS settings which are blank when the Backup Virtual Mobile Authenticator is first utilized by the user.
The following table lists Backup Virtual Mobile Authenticator policy settings and DIGIPASS settings relating to time
limits and maximum users:
If Backup Virtual Mobile Authenticator is enabled for a DIGIPASS and set to Time Limited, and the Enabled Until
field in the DIGIPASS property sheet is blank on their first use of the Backup Virtual Mobile Authenticator, the time
limit will begin counting on the user's first usage of the feature. The expiry date (today’s date + time limit) will
then be displayed in the Enabled Until field.
If a Max. Uses/User is set for the relevant policy and a DIGIPASS record's Uses Remaining field in their user property
sheet is blank on their first use of the Backup Virtual Mobile Authenticator, a number (Max Uses/User) will be auto-
matically entered into the user's Uses Remaining field and immediately decremented by 1.
Note
If a user has Backup Virtual Mobile Authenticator enabled with Enabled Until date set and their Uses Remaining
has been set (automatically or manually), whichever of these expires first will disable Backup Virtual Mobile
Authenticator for the user.
Example
Backup Virtual Mobile Authenticator is enabled for a user as Time Limited, and the server Time Limit setting is 3
days. The Max. Uses/User policy setting is 5. When the user first makes use of the Backup Virtual Mobile
Authenticator, his Enabled Until is set to a date 3 days hence and their Uses Remaining to 4.
Although the user’s time limit does not run out for another 24 hours, their Uses Remaining is now 0, thereby dis-
abling Backup Virtual Mobile Authenticator .
The following is a list of factors to consider when planning to integrate Virtual Mobile Authenticator into an authen-
tication service.
With the introduction of Virtual Mobile Authenticator, there are several different assignment combinations that can
be used. The first option in the table below does not utilize Virtual Mobile Authenticator. The others include a
28.9. Cost
Your company will probably need to pay an amount for each text message sent. In some countries, mobile phone
owners might need to pay an amount for each text message received on their mobile phone. This will need to be
taken into consideration when deciding how to implement Virtual Mobile Authenticator functionality.
28.10. Security
The level of security provided by hardware DIGIPASS devices is higher than that of Virtual Mobile Authenticator. This
needs to be weighed against other considerations before deciding whether your company will implement Virtual
Mobile Authenticator, and if so, how it will be implemented.
28.11. Convenience
Virtual Mobile Authenticator is more convenient than a hardware DIGIPASS for many users. Virtual Mobile Authentic-
ator uses ordinary mobile phones (of which most users already own); there are no extra devices required. users
who do not habitually carry their mobile phone with them, though, are likely to find a DIGIPASS GO3 or DIGIPASS
GO1 easier to transport.
For users with Backup Virtual Mobile Authenticator enabled, it might be the difference between going to work to
pick up a forgotten DIGIPASS and getting important work done at home.
Your company will need the use of an SMS gateway and an account with the gateway. The Message Delivery Com-
ponent will need configuration information for the gateway and the username and password for the account. Your
OneSpan supplier can assist with this process.
The Backup Virtual Mobile Authenticator feature may be enabled as an emergency backup for users who have left
their primary DIGIPASS at home, or for other reasons do not have access to their primary DIGIPASS. Use of this fea-
ture can be limited for each DIGIPASS by:
Time period
User access to Backup Virtual Mobile Authenticator can be set during a specific time period. After this period
expires, any Virtual Mobile Authenticator requests from the user will be rejected. If the user is still unable to
use their DIGIPASS, the time period must then be extended by an administrator. Once a user starts using their
DIGIPASS again, the administrator must reset the time period if the user is to be allowed to use Backup Virtual
Mobile Authenticator again.
Number of Uses
Set a maximum number of times a user may request an OTP using the Backup Virtual Mobile Authenticator
feature. When the user has reached this number of uses, any further OTP requests from the user will be rejec-
ted. This must be reset by an administrator if further use of the Backup Virtual Mobile Authenticator is
required for the user.
Global options are defined in the policy that controls authentication. As such, using multiple policies provides
you with additional flexibility.
The following questions will need to be answered in line with developing Backup Virtual Mobile Authenticator
usage guidelines:
When a user reaches their limit of Virtual Mobile Authenticator use, an administrator must reset that user's limit.
A decision must be made as to how users will log in using Virtual Mobile Authenticator. In particular, users with a
hardware DIGIPASS and the Backup Virtual Mobile Authenticator enabled must be able to request an OTP to be sent
to their mobile when required, but to login using the hardware DIGIPASS at other times.
The simplest method for the user is to allow a 2-step login process, where the user enters their user ID and pass-
word only, triggering an OTP request, and are redirected to a second login page to enter the OTP sent to them. To
use this method, though, your system must be set up to allow 2-step logins. Check with your system administrator
if unsure.
Alternatives to the 2-step login are a sequence of two 1-step logins or the use of a specific web page to request an
OTP, separate from the login page screen.
For more information, refer to the Login Permutations section of the IDENTIKEY Authentication Server Administrator
Reference.
For information on possible login permutation, see the IDENTIKEY Appliance Administrator Reference.
The configuration wizards in the Administration Web Interface feature a Schedule Task page. This page allows you
to define this schedule for each task and to set a task schedule as a recurring event.
For each scheduled task, you can set the required time and date; details for scheduled tasks are kept in the data
store. The tasks will run at the scheduled date and time, and audit messages are generated for the relevant start,
end, and result transactions. You can also configure your preferred notification method: IDENTIKEY Appliance can
send you a text message or an e-mail notification when the scheduled task is completed.
The Task Scheduling page in the Administration Web Interface lists all scheduled tasks. To view and edit sched-
uled tasks, you need the View Task administrative privilege.
The following sections provide information about which tasks can be scheduled, the available scheduling func-
tions, scheduling restrictions, and the result notification after the scheduled task is completed.
n User import
n Reports
n DIGIPASS.dpx file import (with restrictions)
n Cryptographic key rotations
n Delete audit data
A scheduled, recurring event can be configured on a daily or monthly basis. In addition, you can also schedule a
task to run on:
n specific day/s of every week (e.g. every Monday, Wednesday, and Friday)
n a specific day of selected months (e.g. the 15th day of the months January, April, and July)
n Edit
n Delete
n Disable
n Enable
n Cancel (running tasks only)
29.1.3. Restrictions
n The DIGIPASS Import task can only be run immediately and cannot be scheduled for a later date.
When the scheduled task is completed, the results are communicated to the task owner via text message or e-
mail, if desired. The result notification method is configured in the task scheduling pages.
The Task Scheduling page in the Administration Web Interface lists all scheduled tasks. To view and edit sched-
uled tasks, you need the View Task administrative privilege.
The Edit button allows you to change the options and schedule of a task. After editing a task, click Save.
Different options are available to run and/or schedule tasks; the availability of these options varies, depending on
the task to be run. The options are:
n Run immediately
n Run in background - scheduled tasks
If you select the option Run Immediately, the task is run in the foreground. This option blocks the Administration
Web Interface session until the task is complete.
Note
These tasks are stopped if the VASCO IDENTIKEY Authentication Server service is restarted.
Select the option Run in Background to schedule tasks; this frees the Administration Web Interface session to per-
form other tasks. The following scheduling options are available:
n Scheduled, with specified time and date - the task runs on the scheduled time and date.
n Scheduled, reoccurring - the task is scheduled to recur on a daily or monthly basis.
n Scheduled, no time specified - the task is run immediately, but in the background.
Note
Scheduled tasks are automatically restarted if the VASCO IDENTIKEY Authentication Server service is restarted.
The Schedule Task page in the Administration Web Interface offers the following options for scheduled tasks:
This chapter describes the client components necessary for the administration program, the RADIUS client, and the
OneSpan IIS module.
For more information, refer to Chapter 3.1. IDENTIKEY Appliance Authentication Process
There are seven client application types which interact with IDENTIKEY Appliance:
n RADIUS Authentication
n IIS Authentication
n Administration Program: an administration program client component record is added by default for the
Administration Web Interface. This component record includes a policy to allow connections from this pro-
gram.
n SOAP Authentication
n DIGIPASS Software Provisioning
n Electronic Signature Validation
n DIGIPASS Authentication for Windows Logon
Warning
Modifying the IP address of the IDENTIKEY Appliance in the Configuration Tool results in the creation of a new
administration program client component record. The older records can be erased: however, do not erase the cli-
ent component configured for the current IP address, because this prevents access to the Administration Web
Interface.
SOAP client programs are not called 'SOAP clients'. The program itself specifies the type as a parameter to each
request. A client component record must exist for this type at the location (IP address) where the application runs.
The policy in the component record will be used for all processing of requests from this client.
Creating a component record for a OneSpan administration program (e.g. Administration Web Interface or Audit
Viewer) allows a policy to be set for connections from that program.
A component record must exist for each Administration Web Interface or any other administration program using
SOAP and SEAL.
IDENTIKEY User Websites is a pre-defined SOAP-based client component used for OneSpan User Websites clients.
The client component record will be checked whenever the OneSpan User Websites client sends request to
IDENTIKEY Appliance.
One client component record must exist for each OneSpan User Websites client installed at different locations
(IP address). Each client component record requires a valid license key.
A RADIUS client component record is required when clients will be sending authentication requests to IDENTIKEY
Appliance using the RADIUS protocol. The IDENTIKEY Appliance will check the component record to find:
n the shared secret to use for communicating with the RADIUS client
n the policy to apply to the authentication request
A default RADIUS client component record is automatically created during installation of IDENTIKEY Appliance. This
can be deleted and specific records created for each location.
Note
The default RADIUS client created during installation will be given a shared secret by default.
A component record is required for any DIGIPASS Authentication Module used with IDENTIKEY Appliance. The com-
ponent record will be checked whenever the DIGIPASS Authentication Module sends an authentication request to
the IDENTIKEY Appliance. The IDENTIKEY Appliance will check:
n that the component record contains a valid license key for a client module
n which policy to apply to the authentication request
There are two pre-defined client components for DIGIPASS Authentication for Windows Logon:
n DIGIPASS Authentication for Windows Logon is a pre-defined SOAP-based client component used for
DIGIPASS Authentication for Windows Logon 2.x. Client component records of this type require a valid cli-
ent component license.
Client component records of this type are required for all client IP addresses used to log on to Windows via
DIGIPASS Authentication for Windows Logon 2.x. However, unlike DIGIPASS Authentication for Windows
Logon 1.x, you can define client component records to cover IP address ranges instead of individual client
component records for each individual IP address.
n Identikey Windows Logon Client is a pre- defined SEAL- based client component used for DIGIPASS
Authentication for Windows Logon 1.x. Client component records of this type do not require a client com-
ponent license
A client component record of this type is required for each client IP address used to log on to Windows via
DIGIPASS Authentication for Windows Logon 1.x. DIGIPASS Authentication for Windows Logon 1.x uses
Dynamic Component Registration (DCR) to ensure that the correct client component record is available
when required (see 6.4. Dynamic Component Registration (DCR)).
Dynamic Component Registration (DCR) must be enabled in the Windows Logon policy.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center.
For more information on GDPR, refer to the IDENTIKEY Appliance General Data Protection Regulation Compliance
Guide.
An IDENTIKEY Federation Server client component record for IDENTIKEY Authentication Server is required when
IDENTIKEY Federation Server is used for authentication to different Web applications. IDENTIKEY Federation Server
communicates with IDENTIKEY Authentication Server via the SEAL protocol. For more information about the func-
tionalities of and settings for IDENTIKEY Federation Server, refer to the IDENTIKEY Federation Server Product Guide.
Note
If you register IDENTIKEY Federation Server as a client, IDENTIKEY Authentication Server will require you to upload
a valid IDENTIKEY Federation Server license.
Some client components require licenses to be operational, e.g. DIGIPASS Authentication Modules.
Client component licenses can be uploaded and viewed through the Administration Web Interface client com-
ponent records. For more information about client component licensing, see section 2.13. License Types .
For more information about creating a component record and installing a license for DIGIPASS Authentication Mod-
ules, refer to the IDENTIKEY Appliance Administrator Guide.
The Administration Web Interface (see Section 9.4. Administration Web Interface) allows:
During the licensing process in the IDENTIKEY Appliance Configuration Tool (see Section 9.3. Configuration Tool), a
server component record including a valid license is automatically created. Whenever the IP address is changed in
the Configuration Tool, a new license is mandatory (see Section 11.2.1. Changing the IP Address).
Warning
Do not modify the policy assigned to the server record as this may cause problems during installation of IIS mod-
ules in your setup (see Section30.2.5. DIGIPASS Authentication Module). This setting should only be modified by
OneSpan experts.
Tip
The old server component is not erased automatically allowing re-use of the old IP address without the need to
re-license, since the license is still stored in the record.
31.1.2. Replication
A component record is created for each IDENTIKEY Appliance in a replication setup. This is automatically configured
through the Replication Wizard. For more information about replication, refer to Chapter 26. Replication.
31.2. Licenses
A Server Component record holds the License Key for a specific IDENTIKEY Appliance instance. This component
record will be checked for a valid license when the IDENTIKEY Appliance is started. If the license key is missing,
invalid or expired, the Configuration Tool and Administration Web Interface are accessible for configuration and
management, but no services, such as authentication, are available.
Licenses can only be viewed in the server component record through the System tab in the Administration Web
Interface. For more information about modifying a license, refer to Section 11.1. First Time Licensing. For more
information on license types, refer to Section 2.13. License Types .
32. Policies
Policies specify various settings that affect all request handling processes. Each request is handled according to a
policy identified by the applicable client and server records.
Policies may be set up in a hierarchy, where a policy will inherit most of its attributes from a parent policy, but with
some modifications for a slightly different scenario. At the top of this hierarchy is a given parent or base policy - not
necessarily the default IDENTIKEY Authentication Server Base Policy - which does not inherit any attributes from
any other policies (i.e. parentless policies).
The Administration Web Interface (see Section 9.4. Administration Web Interface) allows:
n Editing policies
n Copying policies
n Deleting policies
This chapter describes policy properties, the concept of policy inheritance, and provides example settings for the
IDENTIKEY Appliance RADIUS Self-Assignment policy.
There are many policy settings which can be defined through the Administration Web Interface:
Some policy properties can be overruled in user or DIGIPASS records (see 27. DIGIPASS User Accounts and 28.
DIGIPASS). For more information about all fields available for configuring policies, refer to the IDENTIKEY Appliance
Administrator Reference.
32.2. Policies
Policies may be set up in a hierarchy, where a policy will inherit most of its attributes from a parent policy, but with
some modifications for a slightly different scenario. At the top of this hierarchy is a given parent or base policy - not
necessarily the default IDENTIKEY Authentication Server Base Policy - which does not inherit any attributes from
any other policies (i.e. parentless policies).
In the example above, all attributes are inherited from the parent policy. The attributes shown in the child policies
above are explicitly set, which make the policy different from the parent policy. The explicitly set attributes in the
child policies override those of the parent policies.
As the various levels of settings in policy inheritance can get confusing, functionality is available which allows you
to view the settings effective for a selected policy, taking inherited settings into account. The text below shows the
effective settings for the IDENTIKEY Appliance RADIUS self-assignment policy:
Effective Policy Settings
[Local/back-end authentication]
Local Authentication : DIGIPASS/Password during Grace Period
back-end authentication : Always
Back-End Protocol : RADIUS
User Accounts]
Dynamic User Registration : Yes
Password Autolearn : Yes
Stored Password Proxy : Yes
Default Domain: (none)
User Lock Threshold : 3
[DIGIPASS Assignment]
Assignment Mode : Self-Assignment
Grace Period (days) : 0
Serial No. Separator : |
Search up Organizational Unit Hierarchy : Yes
[DIGIPASS Settings]
Application Names
Application Type : No Restriction
DIGIPASS Types
PIN Changed Allowed : Yes
The settings listed here include those set in policies from which the IDENTIKEY Appliance RADIUS Self-Assignment
policy inherits.
Pre-loaded policies are created for IDENTIKEY Appliance during installation and provide useful policy examples for
typical environments.
Event Window=20
Sync Window=6
Identification Threshold=0
Local Authentication=None
Back-End Authentication=None
DUR=No
Password Autolearn=No
Search Up OU Path=No
1-Step Challenge/Response=No
IDENTIKEY Local Authentic- Base Policy Settings applicable to all Local Authentication=DIGIPASS/Password
ation IDENTIKEY Appliance authen- during Grace Period
tication Policies, including local
authentication. In general, all
other IDENTIKEY Appliance
Policies using local authen-
tication should inherit from this,
directly or indirectly.
IDENTIKEY Windows Pass- IDENTIKEY Local IDENTIKEY Appliance model for Back-End Authentication=Always
word Replacement Authentication password replacement and
Dynamic User Registration, Back-End Protocol=Windows
using Windows back-end
authentication. DUR=Yes
Assignment Mode=Neither
Password Autolearn=Yes
IDENTIKEY Microsoft AD Pass- IDENTIKEY Local IDENTIKEY Appliance model for Local Auth=Default
word Replacement Authentication password replacement with
Microsoft Active Directory (LDAP Backend Auth=Always
connection).
Backend Protocol=Microsoft AD
DUR=Yes
Password Autolearn=Yes
IDENTIKEY Novell eDirectory IDENTIKEY Local IDENTIKEY Appliance model for Local Auth=Default
Password Replacement Authentication password replacement with
NetIQ eDirectory (formerly Novell Backend Auth=Always
eDirectory) (LDAP connection).
Backend Protocol=Novell eDirectory
DUR=Yes
Password Autolearn=Yes
IDENTIKEY Windows Auto- IDENTIKEY Win- IDENTIKEY Appliance model for Assignment Mode=Auto-Assignment
Assignment dows Password Auto-Assignment based on the
Replacement Windows password replace- Search Up OU Path=Yes
ment model.
Grace Period=7
IDENTIKEY Microsoft AD Auto IDENTIKEY Local IDENTIKEY Appliance model for Local Auth=Default
Assignment Authentication Auto Assignment for Microsoft
Active Directory Backend Auth=If Needed
Backend Protocol=Microsoft AD
Assignment Mode=Auto-Assignment
Search-Up-OU-Path=Yes
IDENTIKEY Windows Self- IDENTIKEY Win- IDENTIKEY Appliance model for Assignment Mode=Self-Assignment
Assignment dows Password Self-Assignment based on the
Replacement Windows password replace- Search Up OU Path=Yes
ment model.
Self Assignment Separator=|
IDENTIKEY Microsoft AD Self IDENTIKEY Appliance model for Local Auth = Default
Assignment Self-Assignment for AD Pass-
word Replacement Backend Auth = Always
Search-Up-OU-Path = Yes
IDENTIKEY Novell eDirectory IDENTIKEY Novell IDENTIKEY Appliance model for Local Auth = Default
Self-Assignment eDirectory Pass- self-assignment for NetIQ eDir-
word Replace- ectory (formerly Novell eDir- Backend Auth = Always
ment ectory).
Backend Protocol = Novell eDirectory
Search-Up-OU-Path = Yes
IDENTIKEY RADIUS Pass- IDENTIKEY Local IDENTIKEY Appliance model for Backend Authentication=Always
word Replacement Authentication password replacement and
Dynamic Component Regis- Backend Protocol=RADIUS
tration using a RADIUS server for
back-end authentication. Password Autolearn=Yes
IDENTIKEY RADIUS Auto- IDENTIKEY Local IDENTIKEY Appliance model for Grace Period=7
Assignment Authentication Auto-Assignment based on the
RADIUS password replacement Search Up OU Path=Yes
model.
Assignment Mode=Self-Assignment
IDENTIKEY RADIUS Self- IDENTIKEY Local IDENTIKEY Appliance model for Search Up OU Path=Yes
Assignment Authentication Self-Assignment based on the
RADIUS password replacement Assignment Mode=Self-Assignment
model.
Self Assignment Separator=|
IDENTIKEY Back End Base Policy IDENTIKEY Appliance model for Backend Protocol=RADIUS
Authentication only back-end authentication.
Change the back-end protocol to Backend Authentication=Always
the one required.
IDENTIKEY DP110 Pro- Base Policy DIGIPASS for Web provisioning Local Auth=DIGIPASS/Password during
visioning 1 model scenario 1 - Activation Grace Period
codes are encrypted with pre-
loaded static passwords. 1-Step Challenge/Response=Yes-Any chal-
lenge
IDENTIKEY DP110 Pro- Base Policy IDENTIKEY DP110 Provisioning Local Auth = DIGIPASS/Password during
visioning 2 model scenario 2 - Dynamic Grace Period
Registration using back-end sys-
tem. Change the back-end pro- Back-End Authentication = Always
tocol to the one required.
1-Step Challenge/Response=Yes – Any chal-
lenge
IDENTIKEY DP4Mobile Prov- Base Policy IDENTIKEY DIGIPASS for Mobile- Local Authentication = DIGIPASS/Password
sioning 2 provisioning model scenario 2 during Grace Period
DIGIPASS type:
'Mob30'
IDENTIKEY DP4Mobile Prov- Base Policy IDENTIKEY DIGIPASS for Mobile- Local Authentication = DIGIPASS/Password
sioning 3 provisioning model scenario 3 during Grace Period
DIGIPASS type:
'Mob30'
IDENTIKEY DP4Web Pro- Base Policy IDENTIKEY DIGIPASS for WebPro- Local Auth = DIGIPASS/Password during
visioning 2 visioning model scenario 2 - pre- Grace Period
loaded user accounts and static
passwords.
IDENTIKEY DP4Web Pro- Base Policy IDENTIKEY DIGIPASS for WebPro- Local Auth = DIGIPASS/Password during
visioning 3 visioning model scenario 3 - Grace Period
Dynamic Registration using
back-end system. Change the DUR=Yes
back-end protocol to the one
required.
IDENTIKEY Deferred Time sig- Base Policy Deferred time signature veri- Signature Time Window = 24
nature Verfication fication settings: Time based.
IDENTIKEY Real-Time sig- Base Policy Real-time signature verification Online signature level = 1 - Multiple Sig-
nature verfication 1 settings: Time-based, several natures allowed in same Time Step
signatures are allowed in the
same timestep but 2 identical
successive signatures will be
rejected.
IDENTIKEY Real-Time sig- Base Policy Real-time signature verification Online signature level = 2 - Only 1 Sig-
nature verfication 2 settings: Time-based, one sig- nature/Time Step allowed
nature allowed per timestep.
IDENTIKEY Real-Time sig- Base Policy Deferred time signature veri- Signature Time Window = 24
nature verfication 3 fication settings: Event based,
off-line mode.
Windows logon online authen- IDENTIKEY Local Windows Logon with Windows Back-End Authentication = Always
tication - Windows Back-End Authentication back end
Back-End Protocol = Windows
Offline Authentication = No
Windows logon online authen- IDENTIKEY Local Windows Logon for LDAP AD Back-End Authentication = Always
tication - LDAP AD Back-End Authentication back end
Back-End Protocol = Microsoft AD
Offline Authentication = No
Windows logon online and off- Windows logon Windows logon online and offline OfflineOffline Authentication = Yes
line authentication – Win- online authen- authentication for Windows back
dows Back-End tication - Win- end Offline Time Window (days) = 21
dows Back-End
Offline Event Window = 300
Windows logon online and off- Windows logon Windows logon online and offline Offline Authentication = Yes
line authentication – LDAP AD online authen- authentication settings for LDAP
Back-End tication - LDAP AD AD back end Offline Time Window (days) = 21
Back-End
Offline Event Window = 300
33. Reporting
IDENTIKEY Appliance allows you to define and run a wide range of detailed reports. Reporting aspects include
desired fields, runtime query options, permissions, templates and scheduling. You can use pre-defined standard
reports, which can be edited, or you can define elements to create your own customized reports. Reports are man-
aged via the Administration Web Interface.
For detailed instructions on reporting tasks, refer to the Reporting chapter in the IDENTIKEY Authentication Server
Administrator Guide.
For a list of factors to consider when configuring reporting, refer to the IDENTIKEY Appliance Administrator Refer-
ence, section "Considerations for Reporting and Auditing".
Reports are created by collecting and manipulating data from a variety of sources. The principle concepts and fea-
tures behind reporting in IDENTIKEY Appliance are described in the following sections.
n List Analysis. Lists all items that match the criteria specified in the report definition, e.g. a list of users with
no DIGIPASS assigned.
n Detailed Analysis. Shows detail of the events specified in the report definition, e.g. a detailed list of failed
authentications for a user.
n Distribution Analysis. Shows a count of events and objects, e.g. the number of failed authentications for a
domain.
n Trend Analysis. Shows a trend over a period of time for the objects specified in the report definition. For
Trend Analysis reports, there is an extra parameter: the period of time for which the data needs to be
extracted must be specified by hour, day, month, and year.
All reports, whether standard or custom, are based on these report types. Each report type retrieves information
from either the audit data, the data store, or both.
The grouping level specifies how the data in the report will be grouped:
n Client. If a report has set grouping level to Client, each (physical) client connected will be represented indi-
vidually.
n Domain.
n Organizational Unit. If a detailed or list report has set grouping level to Organizational Unit, the data for all
the users in that organizational unit will be added together and represented only once under the organ-
izational unit.
n User. If a detailed or list report has set at grouping level to User, each user will be represented individually.
n Digipass.
n Users. Generates the report based on the user information from the IDENTIKEY Appliance data store.
n Users + Audit Data. Generates the report based on the user information mentioned above, and the audit
data from IDENTIKEY Appliance.
n Digipass. Generates the report based on the authenticator information from the IDENTIKEY Appliance data
store.
n Digipass + Audit Data. Generates the report based on the authenticator information mentioned above,
and the audit data from IDENTIKEY Appliance.
n Audit Data. Generates the report based on the audit data only. This means that the results are grouped by
the distinct grouping objects, e.g. client components, found in the audit data for the selected reporting
time period, whether they currently exist in the IDENTIKEY Appliance database or not.
n Users + Digipass. Generates the report based on the user and authenticator information from the
IDENTIKEY Appliance data store. This option can be used for list or detailed analysis reports only.
The administrative scope of reports allows to define for which part of the organizational structure the report is to
be generated and run. Via this administrative scope it is possible to determine which users, DIGIPASS authen-
ticators, organizational units, and domains are to be included in the report processing and the relevant output.
n ODBC Storage
n All domains. Running the report is initiated by a Master Domain administrator; objects are pro-
cessed over all domains, including the Master Domain.
n Single domain. Running the report is initiated by a single domain administrator; objects which are
part of that same domain are processed.
n Multiple domains. Running the report is initiated by a multiple domain administrator; objects
which are part of those domains for which the administrator has the relevant permissions are pro-
cessed.
n Org unit and all child org units. Running the report is initiated by an organizational unit
administrator; objects which are part of that organizational unit and all its child organizational
units are processed.
Note
The administrative scope is not applicable to reports on client applications.
When configuring report settings, you can specify a time zone. This selected time zone will be used for:
33.1.6. Fields
You can filter report data at a field level, but only if:
If no specific fields are selected, then all fields are included in the report. For example, your report could display
the number of session times over one hour within the past week.
33.1.7. Query
You can further customize reporting data by setting one or more Queries.
For example, to generate a report for a specific audit message, e.g. Authentication, you can specify the fol-
lowing line in your query:
Audit Message = 'Authentication'
You will then only receive information on Authentication audit messages in your report.
You can use multiple queries to gain even finer-grained control of data. For example, the Authentication Activity by
Client report includes the following query data:
Audit:Category equals Authentication,
Audit:Type equals success,
Audit:Code equals S-002001,
Audit:Code equals S-010001
The Query value field can also recognize free text for time values. For example:
Audit:Timestamp + is greater than + “6 months ago”
33.1.8. Permissions
Each report definition has an owner. The owner is usually the administrator that created the report, but ownership
can be transferred to another administrator in the same domain. Permissions associated with each report determ-
ine:
n Who can run the report. Use can be restricted to the report owner, or it can be granted to other admin-
istrators.
n Who can change the report definitions. The ability to change the report format and details can be restric-
ted to the report owner, or it can be granted to other administrators.
n Who can view the report.
Usage Permissions
There are three types of usage permissions:
n Private. Only the owner can view and run the report.
n Domain. The report can be run and viewed only by administrators that belong to the domain where the
report was defined.
n Public. All administrators in all domains can view and run the report.
Change Permissions
There are three types of change permissions:
33.1.9. Templates
Reports can be generated in XML, HTML or PDF format. When defining a report, you can either:
Templates are defined when creating a report, and are then selected from a list when running the report. Each
report definition can have more than one formatting template.
PDF
The XML data is run through a PDF generator to produce a basic PDF report. This is then combined with the
template data (including header, footer and logo data), to provide a finished PDF with bookmarked headline
sections. The PDF header, footer and logo data can be customized, or use the standard template.
Note
Only PDF reports can be run from the background. As such, running a report with XML or HTML outputs will lock
the Administration Web Interface until the reporting task is completed.
Saved PDF reports can be retrieved using the System tab of the Administration Web Interface . The PDF report may
be opened directly from the Administration Web Interface, or it may be saved.
The Wireless Access Point must be configured to use one of the following wireless protocols:
n WPA Enterprise
n WPA2 Enterprise
Warning
OneSpan does not recommend the use of the TKIP encryption algorithm on wireless networks due to inherent
security issues. Configure your WAP(s) to use the AES algorithm.
When a one-time password authentication is performed, a session ID is assigned to the wireless connection. Fast
Reconnect uses this session ID to automatically re-authenticate the wireless connection rather than requiring user
ID and one-time password input from the user.
A change from one wireless access point to the next can be made without inconvenience to the user when Fast
Reconnect can be used between the access points.
Note
Roaming connections are not supported over multiple instances of IDENTIKEY Appliance.
Fast reconnect will only work for roaming wireless connections where:
n All wireless access points are sending authentication requests to the same IDENTIKEY Appliance instance
n All component records for the wireless access points are using the same policy
n All wireless access points are configured to use the same SSID
Multiple roaming zones – where roaming wireless connections are not permitted between zones - may be estab-
lished by assigning different SSIDs to wireless access points in different zones, and using different policies for com-
ponents in each zone. The following diagram illustrates how Fast Reconnect works with an environment with
multiple roaming zones.
35. Organization
User accounts and DIGIPASS records can be grouped in the IDENTIKEY Appliance using two structures: domains and
organizational units, which are managed using the Administration Web Interface.
This chapter describes IDENTIKEY Appliance domains and organizational units, their similarities and differences,
the Master Domain concept and its usage, how to move DIGIPASS user accounts, and the location of DIGIPASS
records, including some typical DIGIPASS location models.
Domains and Organizational Units are included in the internal database in a way that mirrors the hierarchical organ-
ization of your company.
Domains and Organizational Units are included in the internal database in a way that mirrors the hierarchical organ-
ization of your company.
n to allocate DIGIPASS records to different domains or organizational units, for example to mirror the geo-
graphic location of the devices.
However, there are two differences between domains and organizational units:
AllDIGIPASS user accounts and DIGIPASS records must belong to a domain. DIGIPASS user accounts and records do
not have to belong to an organizational unit.
The domain is used to identify user accounts, whereas organizational units are not (as explained below). As a con-
sequence, two user accounts with the same name can only exist if they are in different domains.
When theIDENTIKEY Appliance is installed, a single domain is created in the database, the Master Domain. By
default, all new DIGIPASS user accounts and DIGIPASS records are created in the Master Domain.
n for initial access and configuration of the IDENTIKEY Appliance. Two system administrators exist on the
Master Domain, one for system operation, which should never be removed, and one for the IDENTIKEY
Appliance system administrator (see Section 9.1. Default Administrative Users).
n all DIGIPASS instances are imported by default into the Master Domain although different domains or
organizational units can be chosen during importation. For example relocation models, refer to Section
35.5. Typical DIGIPASS Location Models for ODBC.
n for whenever a domain cannot be found for an authentication request (explained below).
If a separate domain field is provided on login, this is used with the user ID. If a separate domain field is not
provided, but the user name is in the form userid@domain, and there is a domain with the given domain name,
that domain is used. In this case, the user name has the '@domain' part removed. Otherwise, the user name
remains as userid@domain and no domain is identified.
If no domain is identified, the applicable policy is checked for a Default Domain. The default domain is used if it is
specified in the policy. Otherwise, the Master Domain is used as a default (see image below).
You can change the Master Domain name, allowing you to set the company/organization domain as the master
domain. This will enable authentication via user ID alone without having to configure a default domain.
Configuring the Master Domain is done via the IDENTIKEY Authentication Server setup wizard. For more inform-
ation, refer to the IDENTIKEY Appliance Installation and Maintenance Guide.
(1 )A domain must be chosen for a DIGIPASS user account when it is created, as the domain makes up part of the
identification for the account. A DIGIPASS record assigned to a DIGIPASS user account must belong to the same
domain as the account. You therefore need to ensure that the correct numbers of DIGIPASS records are allocated to
the different domains.
(2) A DIGIPASS record assigned to a DIGIPASS user account must belong to the same organizational unit as the user
account. If a DIGIPASS record is assigned to a user account in another organizational unit, it is moved there auto-
matically.
(3) A DIGIPASS user account may not be moved to a different domain. It must be deleted and recreated in the
required domain.
(4) Unassigned DIGIPASS records may be moved to the required domain after importation.
(5) A DIGIPASS record assigned to a user cannot be moved. DIGIPASS user accounts can be moved between organ-
izational units within the same domain whenever required, in which case the assigned DIGIPASS records are auto-
matically moved with them.
Image 73: Possibilities for Moving User Accounts and DIGIPASS (OU = Organizational Unit)
Note
When a user account is moved to an organizational unit, all DIGIPASS records assigned to it are also moved.
A DIGIPASS record assigned to a user cannot be moved - the user account must be moved.
When looking for an available DIGIPASS record for a device to assign to a user, the IDENTIKEY Appliance will first
look in the same organizational unit as the specific user account, if the user account belongs to an organizational
unit. The Search Upwards in Organizational Unit hierarchy option, when enabled, allows the IDENTIKEY Appliance
to search in parent organizational units and the DIGIPASS pool container. This option may be set at the policy level
for system searches (i.e. Auto-Assignment and Self-Assignment (see Section 28.3.2. Auto-Assignment and Section
28.3.1. Self-Assignment) or at the time of the search for manual assignment.
Note
The IDENTIKEY Appliance will always find or assign the closest available DIGIPASS record to the selected user
record(s).
If the user account being assigned a DIGIPASS record does not belong to an organizational unit, the IDENTIKEY
Appliance will look for an available DIGIPASS record which does not belong to an organizational unit, i.e. for an
available record stored directly in the domain.
This option allows a centralized point of access for assignment of DIGIPASS records. It also requires less calculation
and high-level administration - DIGIPASS records are all stored in one area and there is no need to manually move
records or calculate the exact number of DIGIPASS required for each organizational unit or group of units. Admin-
istrators must belong to the domain only (not an organizational unit) to assign DIGIPASS from the domain root.
In the diagram above, the IDENTIKEY Appliance searches upwards through the organizational unit structure for
available DIGIPASS record to assign to a DIGIPASS user in the organizational unit B1. Because no available
DIGIPASS records are found in B1, it searches in B, then in the domain root.
The administrator account manually assigning the DIGIPASS records must be located in the domain root (no organ-
izational unit) in order for this model to work successfully.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
This option is simplified if an organizational unit structure is not used in the database. User accounts and DIGIPASS
records may all be stored in the domain root. The Search Upwards in Organizational Unit hierarchy option does not
need to be enabled in this case.
In the diagram above, the IDENTIKEY Appliance can search in the parent organizational unit for available DIGIPASS
records.
The administrator account manually assigning the DIGIPASS records must belong to the parent organizational unit.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
In the diagram above, unassigned DIGIPASS records are stored in the exact organizational units in which they will
be assigned.
Administrator accounts belonging to the organizational units A1 and A2 have administration privileges in their own
organizational unit only.
Note
The Search Upwards in Organizational Unit hierarchy option does not need to be enabled for this model.
DIGIPASS records may be stored in the domain root as well as some or all organizational units. If no unassigned
DIGIPASS records are found in the organizational unit, and the Search Upwards in Organization Unit hierarchy
option is enabled, then IDENTIKEY Appliance will search upwards to the domain root and search in the DIGIPASS
Pool for an available, unassigned DIGIPASS record.
Note
The Rescue Tool is not the DIGIPASS Command Line Administration (DPCLA). DPCLA is an extension of the Tcl 8.4
scripting language, which allows interactive command-line and scripted administration of DIGIPASS-related data.
The DPCLA is only accessible to OneSpan support engineers.
To access the Rescue Tool, use the logon user name rescue. No password is required when using the default
logon options. However, you can specify several user/password combinations and require a minimum number of
successful logins before granting access. For example, you can have five possible user/password combinations,
and a user will need to supply at least three of these to access the Rescue Tool. For more information, refer to the
IDENTIKEY Appliance Administrator Reference, Section "Authentication Settings".
You can access the Rescue Tool using one of the following methods:
n If using IDENTIKEY Virtual Appliance, switch to the console view in your hypervisor software and log on.
n Connecting a screen and keyboard directly to the IDENTIKEY Appliance, and logging on in a command-line
prompt.
n Connecting a workstation or laptop computer to the IDENTIKEY Appliance using a serial null modem cable
plugged into a serial port on both devices. This requires configuration specific to the operating system of
the workstation or laptop computer.
For more information about using the Rescue Tool, refer to the IDENTIKEY Appliance Installation and Maintenance
Guide.
36.2. Functions
n Reset IDENTIKEY Appliance configuration settings to factory default settings. This means that licenses are
removed, configuration data is lost and even network settings are re-set. The same conditions apply as
with first time installation (refer to Chapter10. Installation Configuration).
n Ping other IP addresses to determine if connection can be established.
n Reset the sysadmin user account. If the Rescue Tool is used to reset the default sysadmin user account
for the Configuration Tool, it resets the password to the factory default, sysadmin, enables the sysadmin
user, and logs out of the Configuration Tool. When theIDENTIKEY Appliance is accessed, the Configuration
Wizard detects that the sysadmin password needs to be changed and presents this page of the Con-
figuration Wizard for completion. The Configuration Tool is not accessible until the password has been
changed.
n Reset the access settings for the Configuration Tool, allowing access from any client computer. This fea-
ture effectively resets the Limit Access to Networks setting.
n Change and view network settings, e.g. changing the IDENTIKEY Appliance IP address. After the Rescue
Tool has been used to change the IP address, the same conditions apply as described in Section11.2.1.
Changing the IP Address.
n reboot or shut down the IDENTIKEY Appliance.
When the Rescue Tool is started a support connection will be established. This will enable a support technician to
access your IDENTIKEY Appliance if you need support when the Configuration Tool is unavailable.
1. Check if your problem has been resolved in the online knowledge base at http://www.vasco.com/support.
2. If you are unable to solve your problem with the Knowledge Base, please contact the company which sold
you the OneSpan product.
3. If your supplier is unable to solve your query, they will automatically contact the appropriate VASCO expert.
If necessary OneSpan experts can access your IDENTIKEY Appliance remotely to solve any problems.
Remote support and access to your IDENTIKEY Appliance are achieved through the VASCO Customer
Portal.
For more information about remote support, refer to Section 24.2. Remote Support.
For more information about the VASCO Customer Portal, refer to Section 2.14. VASCO Customer Portal.
Before installing any software, ensure that the installation source of your host operating system and other soft-
ware that you intend to install on it comes from a trusted source.
n Servers should be connected to a trusted network during the installation and hardening processes.
n Use the Windows file system NTFS only; it offers access controls and protections that are not available
with FAT32 file system.
n Update the system after the base installation; install all current service packs. Make sure the system stays
updated at all times.
n Rename the built-in administrator account. This account is the primary point for attacks.
n Use a strong password for the renamed administrator account. See 27.6. Password Strength and 38.2.
Password Guidelines for more information about password guidelines.
n Disable the guest account.
n Configure an account lockout policy to counter brute-force attacks.
n Disable all unnecessary services and file shares. Configure appropriate Access Control Lists (ACL) for ser-
vices and file shares that are necessary for day-to-day operations.
n Install anti-virus software and implement processes to keep it up-to-date so that your host is shielded
against the latest virus threats.
n Install and use an intrusion detection system (IDS).
n Servers should be connected to a trusted network during the installation and hardening processes.
n Use separate disk partitions. The following file systems should be mounted on separate partitions:
n /usr
n /home
n /var
n /var/tmp
n /tmp
n Disable unwanted SUID and SGID binaries; every local or remote user can use such binaries.
n Keep the Linux kernel and other installed software up-to-date.
n Make sure that no non-root accounts have their UID set to 0.
n Once IDENTIKEY Appliance is configured, create one or more dedicated users with system administrator
privileges using DIGIPASS authentication.
n Disable the factory sysadmin user.
n Enforce authentication for access to the Rescue tool.
n Create a strong passphrase to encrypt your backups. See 38.2. Password Guidelines for more information
about password guidelines.
n Keep IDENTIKEY Appliance up-to-date. Make sure your are always running the latest version.
Procedure 12: Hardening the IDENTIKEY Authentication Server Administration Web Interface
n Create one or more dedicated users with system administrator privileges using DIGIPASS authentication.
n Configure your authentication policies to exclude administrative logins. This avoids unwanted admin-
istrator account lockouts.
n If you are using static passwords, OneSpan recommends using strong static passwords; this lowers the
overall risk of a security breach. Make sure to update your password policy accordingly.
n Disable inactive user accounts. IDENTIKEY Authentication Server policies can be configured so that inactive
accounts are automatically disabled after a certain period of inactivity.
n Use SOAP over SSL to secure communications between your Web applications and IDENTIKEY Authentic-
ation Server. Mutual authentication is optional, but improves security considerably .
n Use a Hardware Security Module (HSM) to protect the system's cryptographic information and its pro-
cessing of authentication requests.
To minimize the risk of compromised passwords and increase protection against brute-force attacks, enforce pass-
word guidelines. Recommendations for safe passwords include but are not limited to the following measures:
Do not use personal information. Never use any information personally related to yourself or any other individual
such as names, birth dates, addresses, telephone numbers etc. as a part of your password. It is very easy for
attackers to guess your last name, your pet's name, the birthday of your child, and similar details.
Do not use ordinary words or phrases. Attackers attempt to crack your password by executing programs that use
multilingual wordlists and data structures (rainbow tables), similar to a dictionary (dictionary attack).
Mix different character types. Mix different types of characters. Use combinations of uppercase and lowercase let-
ters, numbers, and special characters such as & or %.
Use at least 16 characters. The greater the length of the password, the longer an attempted brute-force attack will
take and the more difficult it is to crack the password. A password length of 16 characters equals 96 bits, which is
well beyond the cracking capabilities of regular computers.
Use a passphrase. Rather than trying to remember a password created by using various character types which do
not form a word from the dictionary, you can use a passphrase. Think up a sentence or a line from a song or poem
that you like and create a password using the first letter of each word.
Index
A Challenge/Response
1-Step 64
Activation Code 88, 93 1-Step Challenge/Response 64, 222
activation completed notification 90 2-Step 64
activation delayed notification 90 2-Step Challenge/Response 64
Active Directory challenge generation 64
Back-End Authentication, site awareness 74 time/event-based 202
administration interfaces 31 types of DIGIPASS 20
Administration Web Interface 127 CHAP 33, 74, 79-80, 122
ADUCE 75, 98 Check Digit 203, 221-222
application service provider 17 Citrix Web Interface 19, 38, 48, 66, 214
Audit Viewer 52, 161, 213, 223 Classless Inter-Domain Routing (CIDR) notation 48, 85, 92
auditing 127 client
Authentication RADIUS 19
RADIUS 32 client component 128
SEAL IIS 32 communication protocols 32
SOAP 32 Configuration Tool 127
authentication process 47 Configuration Wizard 131
Auto-Assignment connection handling 185
and maker-checker authorization 54, 199 creating users via dynamic user registration (DUR) 188
overview 199 cryptographic signature
auto-unlock 196 Secure Auditing 164
Autolearn CSV
Password Autolearn 72-73, 80, 192, 195, 218, 220, 222 plugin 140
B D
back-end authentication data fields 20, 82, 121, 188
back-end server 128 Data Migration Tool 19, 132
Back-End Authentication 71 default domain processing 50
DP110 Provisioning Scenarios 109 Deferred Signature Validation 83
Grace Period 63 delayed activation 89
LDAP protocol and Active Directory, site awareness 74 activation completed notification 90
Password Autolearn 73 activation delayed notification 90
provisioning 95 delayed activation period 89
Software DIGIPASS Registration 93 delivery of Software DIGIPASS 88
Stored Static Password 72 dictionary attack 251
back-end protocol 53, 71, 96, 101, 107, 218, 220, 223
back-end server
RADIUS server 36
record 73
backup and restore 127
Backup Virtual DIGIPASS 26
Usage Guidelines 207
C
challenge
Access-Challenge mechanism 36
generating a challenge 64
Index
Index
H Microsoft Windows
authenticating 19
Hardware Security Module (HSM) 120, 122-123, 164, 250 monitoring
EMV-CAP 120 filters 138
Load Balancing and Failover 123 performance 138
supported models 122 Performance Monitoring tool 138, 140
host code 16 plugins 140
HTTP Basic Authentication 66, 81 Replication 185
system monitoring 137, 142-144
I Multi-Mode 20, 25, 59
types of DIGIPASS 20
IDENTIKEY Appliance 30-31
IDENTIKEY Appliance Administration Web Interface 32 O
IDENTIKEY Appliance Configuration Tool 31
IDENTIKEY Appliance Rescue Tool 32 ODBC
IDENTIKEY Virtual Appliance 33 domain root 241
IIS module 32, 212 domains and organizational units 237
inheritance 218, 220 Offline Delivery 88
installation 127 One-time password 16
international character support one-time passwords (OTP) 19
limitations 81 organizational unit 128
Internet Information Services 39 out-of-band (OOB) authentication
push notification 65
L Outlook Web Access 48, 59, 71-73, 128, 214
LDAP P
site awareness 74
LDAP user synchronization 127 PAP 33, 74, 79
license key 43, 213, 216 Parent Organizational Units
licenses ODBC 242
upgrading 136 password
licensing 15, 19, 27, 29, 31, 43, 45, 58, 69, 83, 93, 95, 100, 102, supported protocols 33
120, 122, 127, 130, 133-134, 148, 150, 152, 154, 162, Password
170, 215-216 expiration, back-end password 194
Licensing expiration, local password 194
EMV-CAP 120 password strength 192
Load Balancing and Failover Policy 194, 250
Hardware Security Modules 123 RADIUS password protocols (limitations) 80
Local Authentication 57 password guidelines
Grace Period 63 dictionary attack 251
provisioning 95 rainbow tables 251
Software DIGIPASS Registration 92 password replacement 128
Login Permutations 208 Password Synchronization Manager 43
PCI-DSS 46
M PEAP 36
performance monitoring 138
manual configuration 132
master domain 50, 126
Message Delivery Component 127, 168
Microsoft Point-to-Point Encryption (MPPE) 74, 79
Index
PIN S
DIGIPASS authenticators with keypads 21
Server PIN 60 Secure Auditing 163-164
plugins Self-Assignment 199
performance monitoring 140 serial number 17, 27, 45, 70, 86, 101-102, 104, 111, 133, 147,
policy 128 199
Policy server component 128
base policy vs. Base Policy, definition 218-219 Server PIN 60
parentless policy 218-219 Server PIN reset 60
Primary Account Number 121 Server PIN reset, Auto-Assignment and Self-Assign-
Primary Virtual DIGIPASS 26 ment 60, 70, 198
protocols Signature
RADIUS (supported) 79 time/event-based 202
provisioning 95 types of DIGIPASS 20
Provisioning simple name resolution 50
DP110 109 site awareness, Active Directory back-end authentication 74
proxy server 46 SOAP 128
Push Notification Software DIGIPASS 24
authentication method 30 delivery 88
DIGIPASS App 25 DP110 109
DIGIPASS Gateway 65 registration 91
software provisioning 32
R static password 128
static passwords 32, 37, 40, 42, 90, 96, 103, 128, 192-193, 225,
RADIUS 33, 128
250
as a back-end server 36
statistics 127
Attributes 33
Stored Static Password 72
limitations 80
strength, password 192
securing connections 41, 113, 116, 187, 215
sysadmin
supported protocols 79
resetting 129
rainbow tables 251
resetting password 127
recent DIGIPASS activity 149
system action 127
recent user activity 148
restart 127
registration of Software DIGIPASS 91
shut down 127
remote support 127
System Monitoring
replication 127
configuration via configuration interfaces 142
Replication
events to be monitored 144
forwarding entries 184
filters 142
monitoring 185
process 182 T
queue 183
reporting 128 Time-based DIGIPASS Applications 202
features and settings 228
Rescue Tool 128 U
Response-Only
time/event-based 202 update 127
types of DIGIPASS 20 upgrading licenses 136
User Account
DIGIPASS 187
User Account Lookup and Checks 85
Index
user authentication
overview 47
User Dashboard 146
UTF-8
encoding 81
V
VACMAN Controller 16
Verification Tool
Secure Auditing 163-164
view audit information 150
Virtual DIGIPASS 26
Backup Virtual DIGIPASS Usage Guidelines 207
limiting usage 207
login options 208
Primary and Backup 26
W
Web Basic Authentication 81
Windows Group Check 51, 54, 57, 71, 86, 92, 117, 220
wireless RADIUS 35, 233