Setting Up DUO with RADIUS
Users prefer Pleasant Password Server with a KeePass client!
Password Server supports authenticating with DUO utilizing a RADIUS proxy server server as a Two-Factor Provider, and allows use of DUO Push technology.
DUO - RADIUS Configuration
- DUO configuration steps -- to add a new protected service for RADIUS.
Once the DUO system config has been set up we can this information later, for example, where [FROMDUO] is noted.
Download Duo Authentication proxy from here: https://duo.com/docs/authproxy-reference
Configure the authproxy.cfg file as follows:
Password Server Configuration
- Users are able to authenticate through a single-step logon procedure able to output text into a web form. For example, a static password or most One-Time Password (OTP) Providers will be sufficient.
Users with the same username in Password Server as they have in RADIUS. This will likely be the case if both Password Server and RADIUS are importing from the same LDAP server.
In Password Server itself, the configuration is simple.
- Go to Users and Roles > Manage Policies and click the name of the user policy containing the users you want to authenticate against RADIUS.
- Scroll down to Two Factor Policy and look for RADIUS in the configuration list. Click the [Configure] link in that row.
- Using the details required by RSA SecurID, fill in the fields:
- Set Enabled to True
- Set "User Can Self-Enroll in this Provider"
- Server Address
- Server Port
- Select an Authentication Protocol - enabled for RSA SecurID
- See: available protocols
- Shared Secret
- Click Save.
- Server address :is the IP address of the PPASS server.
- Port: 1812
- NAS Identifier or IP Address: is an optional attribute. Some servers require it but if yours doesn't you can ignore it.
- Authentication Protocol: PAP
- Shared Secret: testing123 [for example]
Attach and Enroll Users
Additional Users can be attached to this policy by either:
- Setting a Role policy: from Policies -> Set the Role Policy or Edit -> Set Policy
- Setting a User's policy: From Manage Users -> Click User name -> Edit -> Change policy
Setting it as the Users' default Policy: From Policies -> Edit -> Global Settings -> Set the Default Policy
Disabled: Users attached to the policy will show as disabled, until they are enabled or enrolled or self-enrolled.
Enabling 2FA for a User
Two-Factor Authentication can also be enabled individually for all users you would like to authenticate against a RADIUS server:
- Go to Users and Roles > Manage Users and click the name of the user you want to enable RADIUS for.
- Scroll down to Policy Information and look for RADIUS in the Two Factor Authentication list. Click the [Configure] link in that row.
- Click the Enable button on that screen. The user will now be prompted for a password for the RADIUS server each time they log in.
- If RADIUS needs to be disabled for a user, you can go back to the previous screen and a Disable button will be present instead of the Enable button.
User Configuration and Self-Enrollment
The prompt is the same: for user configuration setup, and subsequently, for each time they use 2FA:
"Please enter the one-time password or secret code."
"RADIUS configuration failed. Please try again"
Token entry error:
"Invalid two-factor token. Please try again"
Using RADIUS via Duo
The support documentation on Duo's website has instructions for setting up the Duo proxy service as a RADIUS server or client.
Setup Requirement: The only requirement for using this setup with Password Server is that PAP must be selected as the authentication protocol in the policy configuration.
When a user logs in, they must type in both their password and Duo token as described in Duo's documentation here. If you are using the Duo-only client, this is unnecessary; users just need to type in their Duo token to authenticate.
Push Notification is also possible if we type "push" in as the token.