Chat now with support
Chat with Support

Cloud Access Manager 8.1.4 - Configuration Guide

Configuring a front-end authentication method Adding a web application Configuring step-up authentication Managing your SSL certificate Changing the Cloud Access Manager service account password Reporting Customizing One Identity Cloud Access Manager

Configuring each application

Configuring step-up authentication for an application is a two stage procedure. The:

  • Front-end authenticator must be configured to support two factor authentication
  • Application must be configured for step-up authentication.

NOTE: If multiple front-end authenticators are configured, step-up authentication is only available for users who authenticate with front-end authenticators that have two-factor authentication configured.

To configure the front-end authenticator for step-up authentication

  1. Navigate to the Front-end Authentication page and click the name of the authenticator that you want to configure.
  2. Click the Two Factor Authentication tab.
  3. Select Use two factor authentication for specific applications.
  4. Configure the RADIUS connection settings if not already configured, please refer to Configuring a front-end authentication method for further information.

To configure the application for step-up authentication

  1. Navigate to the Applications page and click the name of the application that you want to configure.
  2. Click the Two Factor Authentication tab.
  3. From the list, select the users who will require two factor authentication to access the application. This will be either:

    • All users of this application require two factor authentication, or
    • Roles determine which users require two factor authentication.
  4. If you are configuring role based access, select the required roles from the Standard authentication roles list and click Add Role to add the role to the list of Two factor authentication roles.

Configuring for external users

Two factor authentication may also be applied only for external users. In this context, external users are defined as users whose IP addresses do not fall in the following ranges:

  • 10.0.0.0 - 10.255.255.255
  • 172.16.0.0 - 172.31.255.255
  • 192.168.0.0 - 192.168.255.255

Two factor authentication for external users may be configured either to apply to all applications, or it can be configured on a per application basis.

To configure two factor authentication for external users for all applications

  1. Navigate to the Front-end Authentication page and click on the name of the authenticator that you want to configure.
  2. Click the Two Factor Authentication tab.
  3. Select Use two factor authentication for all applications for external users only.
  4. Configure the RADIUS Connection Settings if not already configured, please refer to Configuring a front-end authentication method for further information.

To configure two factor authentication for external users for specific applications

  1. To configure the front-end authenticator follow the steps in To configure the front-end authenticator for step-up authentication.
  2. To configure the application follow the steps in To configure the application for step-up authentication.
  3. Select the Only use two factor authentication for external users check box on the application's Two Factor Authentication tab.

Joining Cloud Access Manager to One Identity Starling

Integrating Cloud Access Manager with One Identity Starling allows you to take advantage of companion features from Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence.

In order to use Starling 2FA with Cloud Access Manager, you first need to join Cloud Access Manager to Starling. This is done using the One Identity Starling section of the Features page. This section also includes the following links, which provide assistance with Starling:

  • Visit us online to learn more displays the Starling login page where you can create a new Starling account.
  • Trouble Joining displays the Starling support page with information on the requirements and process for joining with Starling.
Prerequisites

In order to join Cloud Access Manager with Starling, first configure the following:

  • A valid license for Cloud Access Manager with One Identity Hybrid included.
  • A Starling Organization Admin account or a Collaborator account associated with the One Identity Hybrid subscription. For more information on Starling, see the One Identity Starling User Guide.

To join Cloud Access Manager to One Identity Starling

  1. Navigate to the Settings section in the Cloud Access Manager Administration Console.
  2. Click Turn Features On/Off to open the Features page.
  3. In the One Identity Starling section, click Join to Starling.

    NOTE: The following additional information may be required:

    • If you do not have an existing session with Starling you will be prompted to authenticate.
    • If your Starling account belongs to multiple organizations you will be prompted to select which organization Cloud Access Manager will be joined with.
  4. Copy the Credential String and Token Endpoint values from the Starling Join dialog.
  5. Enter these values in the fields provided in Cloud Access Manager.
  6. Click Save.

To unjoin Cloud Access Manager from Starling 2FA

  1. Navigate to the Settings section in the Cloud Access Manager Administration Console.
  2. Click Turn Features On/Off to open the Features page.
  3. In the One Identity Starling section, click Unjoin Starling.

    Cloud Access Manager will no longer be joined to Starling. A Starling Organization Admin account or Collaborator account associated with the One Identity Hybrid subscription can rejoin Cloud Access Manager to Starling at any time.

Managing your SSL certificate

Topics:

When you install Cloud Access Manager, a temporary self-signed certificate is created for the proxy and stored in the database. This section describes how to replace the temporary certificate with a fully signed, trusted certificate.

Related Documents