Chatee ahora con Soporte
Chat con el soporte

Defender 6.6 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Push Notifications Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Managing user objects

You can use the properties of a user object in Active Directory to perform Defender-related tasks. For example, you can manage and view information about tokens assigned to the user and Security Policies and RADIUS payloads that apply to the user.

Managing tokens for a user

To manage tokens for a user

  1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
  2. In the left pane (console tree), expand the appropriate domain node to select the container that holds the user for whom you want manage tokens (typically, this is the Users container).
  3. In the right pane, double-click the user.
  4. In the dialog box that opens, click the Defender tab.
  5. Use the following areas to make changes or view information as necessary:
    • Tokens  This list allows you to manage tokens for the user. This list shows the tokens that are currently assigned to the user. For each token in the list, you can view the token type, serial number, and whether PIN is enabled. For more information, see Tokens list buttons.
    • Authentication Details  Allows you to specify a Defender ID for the user. Also you can view violation count, reset count, and last logon date and time for the user. Optionally, you can reset the violation count. For more information, see Authentication Details area elements.
  6. When you are finished, click OK to close the dialog box.

Tokens list buttons

 

Table 6:

Tokens list buttons

Button

Description

Program

Click to program a token for the user.

Recover

Click to recover the token selected in the list or reset the token’s passphrase. You may need to reset a token when it has reached its preset use limit or been invalidated because the user exceeded the preset number of bad PIN attempts.

Test

Allows you to verify that the token is programmed correctly and valid for the user.

After you click this button, use the Response text box to type the one-time password displayed on the token. If a PIN is enabled for the token, you can also test the PIN by entering it in the PIN (Optional) text box. Click Verify to run the test on the token.

If you use the Test button to test a token response, that token response cannot then be used for user authentication.

Helpdesk

Allows you to resynchronize the token selected in the list with the Defender Security Server or assign a temporary password to the token user.

After you click the Helpdesk button, a dialog box opens. This dialog box provides the following options:

  • Reset  Click this button to resynchronize the token with the Defender Security Server.

    The token generates a one-time password that is based on an internal time clock and DES keys. For successful authentication, the Defender Security Server must agree with the token's time clock and DES keys. The token's time clock can become out-of-sync with the Defender Security Server. If this value is out-of-sync, the user cannot use the token for authentication. If access is denied to the user, the token clock must be synchronized with the Defender Security Server clock.

    After resetting the token, instruct the user to use the token to generate a one-time password and use it for Defender authentication.

  • Expires  Allows you to select a validity period for the temporary password.
  • Allow response to be used multiple times  Select this check box to allow the temporary password to be used more than once for authentication. If you leave this check box cleared, the temporary password can only be used once.
  • Assign  Assigns the generated temporary password to the user.
  • Clear  Removes the temporary password from the user.
  • Response  Shows the generated temporary password.

Unassign

Removes the token selected in the list from the user. You can also use this option to delete the corresponding token object from Active Directory.

To remove the token from the user and keep the token object in Active Directory, in the confirmation message that appears after you click this button, click No. In this case, the token object does not get deleted from Active Directory and can be reassigned.

To remove the token from the user and delete the token object from Active Directory, in the confirmation message, click Yes.

Add

Allows you to search for and assign a token to the user. After you click this button, a new dialog box opens. In that dialog box, you can use the following elements:

  • Token Serial Number  Type the serial number of the token you want to assign to the user. If you do not know the serial number, leave this text box blank.
  • Show unassigned tokens only  Select this check box to search for the tokens that are not assigned to users. If you leave this check box cleared, the search results will include both assigned and not assigned tokens.
  • Token Type  Select the token type you want to search for.

Click OK to start your search. When the search completes, in the Select Defender Tokens dialog box, double-click the token you want to assign, and then click OK to assign the token to the user. The assigned token appears on the Defender tab in the Tokens list.

Set PIN

Allows you to set a new PIN for the token selected in the list. After you click the Set PIN button, a dialog box opens. This dialog box provides the following options:

  • Enable PINs  Enables PIN for the selected token.
  • New PIN  Type the new PIN you want to assign to the selected token.
  • Confirm PIN  Confirm the new PIN you want to assign.
  • Expire  Select this check box if you want the PIN to expire.

When you require users to enter a PIN set for a selected token, users should enter the PIN followed by the token response to access a resource protected by Defender. For example, if the PIN is 1234 and the response is 5678, users should enter 12345678 when prompted for authentication.

When users need to reset the PIN, they should enter the old and new PINs in the following format: <old PIN><new PIN><new PIN>. For example, if the old PIN is 1234 and the new PIN is 5678, users should enter the following: 123456785678.

Password

Allows you to specify the Defender password that the user must enter during the authentication process. The password is only required if Defender password is selected as the primary or secondary authentication method in the Defender Security Policy that applies to the user.

After you click the Password button, a new dialog box opens. In the dialog box, use the Password and Confirm text boxes to type the new Defender password you want to assign.

If you want the password to expire, select the Expire check box.

Authentication Details area elements

 

Table 7:

Authentication Details area elements

Element

Description

Defender ID

Use this text box to type the Defender ID you want the Defender Security Server to use to identify the user.

You only need to specify a Defender ID for a user if the Access Node of which the user is a member has been configured to identify users by Defender ID.

Violation Count

Displays the number of violations accumulated by this user. The violation count is incremented each time the user exceeds the specified number of failed logon attempts.

Reset Count

Displays the number of times the user account has been reset following an account lockout.

Last Logon

Displays the time and date of the last successful logon.

Reset

Resets the violation count to zero and increments the reset count.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación