Table of Contents
Multi-Factor Authentication (MFA) is a method of authentication that requires the use of more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the following verification methods:
- Something you know (typically a password)
- Something you have (a trusted device that is not easily duplicated, like a phone)
- Something you are (biometrics)
Azure MFA is a method of verifying who you are that requires the use of more than just a username and password. It provides a second layer of security to user sign-ins and transactions.
Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication with a range of easy verification options – phone call, text message or mobile app notification – allowing users to choose the method they prefer.
Azure MFA is an easy to use, scalable and reliable solution that provides a second method of authentication so your users are always protected.
The security of multi-factor authentication lies in its layered approach. Comprising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user’s password, it is useless without also having possession of the trusted device. Should the user lose the device, the person who finds it will not be able to use it unless they also know the user’s password.
This document provides step-by-step instructions on how to configure Azure, the MFA server and the KEMP LoadMaster in order to provide multi-factor authentication.
This document uses an Exchange environment as an example scenario.
This document is intended to be used by anyone interested in finding out more about using Azure MFA with the KEMP LoadaMaster.
Follow the steps in the sections below to configure Azure multi-factor authentication and the KEMP LoadMaster.
Follow the steps below to create a new multi-factor authentication provider in Azure:
- Log in to the Azure portal (classic).
- Go to ACTIVE DIRECTORY.
Figure 2‑1: QUICK CREATE
- Select NEW.
- Select MULTI-FACTOR AUTH PROVIDER.
- Select QUICK CREATE.
Figure 2‑2: CREATE
- Enter a NAME for the authentication provider.
- Select the USAGE MODEL.
- Select SUBSCRIPTION.
- Leave DIRECTORY as the default value.
- Click CREATE.
Figure 2‑3: ACTIVE DIRECTORY
- Once created, select your multi-factor authentication provider and click MANAGE.
- Select CONFIGURE on the left.
Figure 2‑4: Configure Settings
- Various options can be configured on this screen, such as:
The phone number you would like to display when the “phone call” is used as the second factor
Figure 2‑5: Server
- Click Server underneath the DOWNLOADS section on the left.
- Download the Multi-Factor Authentication Server which will be run in your on-premises data center.
Do not click Generate Activation Credentials until you have installed the server on premises and are ready to activate the install. The Activation Credentials are only valid for 10 minutes, at which time you would be required to obtain new credentials.
The MFA server must be a member of the on-premises Active Directory domain. After downloading the MFA server, install it on premises. When prompted, generate the Activation Credentials and enter them in the provided field.
Follow the steps below:
- Launch the Multi-Factor Authentication Server console.
- Select Users.
- Click Import from Active Directory.
Figure 2‑6: Import
- Navigate to the Active Directory Organization Unit you want to import and click Import.
Figure 2‑7: Edit User
- Once imported, you can select a user to set authentication methods, etc.
Follow the steps below to add the LoadMaster as a RADIUS client:
- Select RADIUS Authentication within the Azure Multi-Factor Server.
Figure 2‑8: RADIUS Authentication
- Select the Enable RADIUS authentication check box.
- Click Add.
Figure 2‑9: Add RADIUS Client
- Enter the IP address of the LoadMaster in the IP address text box.
- Enter an Application name.
- Enter a new Shared secret password and confirm it in the text boxes provided.
- Select the Require Multi-Factor Authentication user match check box.
Follow the steps in the sub-sections below to configure the LoadMaster.
The L7 Authentication Timeout should be increased in order to provide enough time for the following actions to occur:
- The user enters their credentials
- Azure MFA communicates with the service in the cloud
- The service in the cloud sends the authentication to the user’s phone (via app or phone call)
To increase the L7 Authentication Timeout, follow the steps below:
- In the main menu of the LoadMaster WUI, go to System Configuration > Miscellaneous Options > L7 Configuration.
Figure 2‑10: L7 Authentication Timeout
- Enter the L7 Authentication Timeout and click Set Timeout.
KEMP recommends 300 seconds but this can be adjusted as needed to meet requirements.
Follow the steps below to create a new SSO domain:
- In the main menu of the LoadMaster WUI, go to Virtual Services > Manage SSO.
Figure 2‑11: Add new Client Side Configuration
- Enter a name in the Add new Client Side Configuration text box and click Add.
Figure 2‑12: Configure the domain
- Select RADIUS as the Authentication Protocol.
- Enter the IP address of the MFA Server in the RADIUS server(s) text box and click Set RADIUS Server(s). Multiple addresses can be entered in this text box, if required.
- Enter the RADIUS Shared Secret,which was created in the MFA configuration earlier, and click Set Shared Secret.
- Enter the Domain/Realm and click Set Domain/Realm Name.
Our example is based on using an Exchange environment. For this example scenario, the Edge Security Pack (ESP) Options for the OWA and Authentication Proxy SubVSs need to be configured. To do this, follow the steps below:
- In the main menu of the LoadMaster WUI, go to Virtual Services > View/Modify Services.
- Click Modify on the relevant Virtual Service.
- Expand the ESP Options section.
Figure 2‑13: ESP Options
- Select Form Based as the Client Authentication Mode.
- Select the SSO Domain that was created in the previous section.
- Configure any of the other settings as needed.You may want to configure a custom SSO Image Set to inform users that MFA will be required. For further information on doing this, please refer to the Custom Authentication Form, Technical Note.
- Repeat the steps above to configure the other SubVS.
For further information on configuring the LoadMaster to work with Exchange, refer to the relevant Exchange Deployment Guide. For further information on ESP, refer to the ESP, Feature Description.ESP, Feature Description Custom Authentication Form, Technical Note
Reason for Change
First draft of document