Chatee ahora con Soporte
Chat con el soporte

Defender 6.6 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Push Notifications Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

PIN Settings tab

Use the PIN Settings tab to configure PIN settings for the tokens requested or registered via the Defender Self-Service Portal.

On this tab, you can use the following elements:

  • Require PIN for hardware tokens  Select this check box if you want all hardware tokens to require a PIN. When this check box is cleared, the hardware tokens do not require a PIN.
  • Require PIN for software tokens  Select this check box if you want all software tokens to require a PIN. When this check box is cleared, the software tokens do not require a PIN.
  • Minimum PIN length  Specify the minimum number of digits each PIN must contain.
  • Maximum PIN length  Specify the maximum number of digits each PIN can contain.

When you require users to enter a PIN set for a selected token, users should enter the PIN followed by the token response to access a resource protected by Defender. For example, if the PIN is 1234 and the response is 5678, users should enter 12345678 when prompted for authentication.

When users need to reset the PIN, they should enter the old and new PINs in the following format: <old PIN><new PIN><new PIN>. For example, if the old PIN is 1234 and the new PIN is 5678, users should enter the following: 123456785678.

Troubleshooting authentication issues

You can use the Defender Management Portal to troubleshoot authentication issues experienced by users in your Defender environment. You can search for a particular user, see if the user experiences any authentication issues, and resolve the authentication issues found.

To diagnose and resolve authentication issues, the user account with which you sign in to the Defender Management Portal must have an appropriate portal role assigned. For more information, see Portal roles.

To troubleshoot authentication issues

  1. Sign in to the Defender Management Portal.

    For more information, see Opening the portal.

  2. Click the Administer Defender option.
  3. In the left pane, click the Helpdesk tab.
  4. Use the right pane to search for the user for whom you want to troubleshoot authentication issues:
    1. In the Search by user name text box, type the complete user name or its part, and then click the Search button.
    2. If prompted, select the user from the search results.
  5. Use the below-listed tabs to diagnose and resolve authentication issues for the user.

These tabs only appear after you select a user. On these tabs, the values that cause authentication issues are marked in red.

  • User Details tab  Provides a summary for the user account, including user’s full name, sAMAccountName, and last successful authentication date and time.
  • Tokens tab  Provides information about the security tokens (if any) assigned to the user, including token type, token serial number, and whether the token requires a PIN. You can use this tab to manage tokens.
  • Authentication Routes tab  Displays the Defender Security Server, Access Node, and Defender Security Policy that apply to the user as configured in the Defender Administration Console.
  • Authentications tab  Lists the authentication attempts made by the user over a period of time. The columns in the table display the date, reason, Defender Security Server, Access Node, Defender Security Policy, and RADIUS payload related to the authentication attempt.

User Details tab

Provides a summary for the user account, including user’s full name, sAMAccountName, and last successful authentication date and time.

If an authentication issue is detected, the corresponding value on this tab is displayed in red. This can occur if, for example, the violation count is incremented or the account is locked or disabled. If you can take an action to resolve the issue, this tab provides a link to perform the action.

Tokens tab

Provides information about the security tokens (if any) assigned to the user, including token type, token serial number, and whether the token requires a PIN.

To view details for a token, in the Token column, click the token name.

To manage a token, click the Manage link provided next to the token. Depending on the token type, the page that opens may provide some or all of the following tabs:

  • Test  Allows you to run a test operation that checks if the token generates a valid response.
  • PIN  Allows you to assign a new PIN to the token. This is required if the authentication issue is related to an incorrect or forgotten PIN. On the page that opens, type the new PIN in the New PIN and Confirm PIN text boxes.

    If you want the user to change the PIN after the user logs on for the first time, select the User must change PIN at next authentication check box.

    When you are finished, click Set PIN to save the changes.

    To remove the PIN from the token, click Remove PIN.

  • Reset  Causes the token to resynchronize with the Defender Security Server. This is required if the authentication issue is related to a time drift on the token or, for event-based tokens, a number of token responses being used without user authentication taking place.
  • Temporary Response  Allows you to assign a temporary response to the token. You may need to assign a temporary response if the token does not function properly or if the user has lost the token but still needs access to the protected resources.

    Use the Expire temporary response in list to select a validity period for the temporary response.

    You can select the Response can be used multiple times check box, so that the user could use the temporary response multiple times before the response expires.

    Click Assign to assign a temporary response using the specified parameters.

    To remove the temporary response from the token, click Remove.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación