Smart Card / PKI / Certificate Authentication11 minutes to read
Since PAM360 serves as the vault for sensitive passwords, it is essential to have a strong authentication mechanism to grant access to the software. PAM360 provides various authentication options and users can choose the ones that suit their environment better. Apart from PAM360's local authentication, there is provision for leveraging the authentication of external identity stores such as Active Directory/LDAP. To bolster the security further, PAM360 offers Smart Card Authentication, which makes the authentication stronger because, to get access to PAM360, the user must possess the smart card and should know the personal identification number (PIN) as well. Smart Card authentication in PAM360 serves as the Primary Authentication and it should not be confused with the Two Factor Authentication. If you have a smart card authentication system in your environment, you can configure PAM360 to authenticate users with their smart cards, bypassing other first factor authentication methods like AD, LDAP or Local Authentication. Enabling Smart Card authentication involves the following steps:
1. How Does the Authentication Mechanism Work? (PAM360)When the user attempts to access PAM360 web-interface, he would be allowed to proceed further only if he had already completed the smart card authentication in the machine by presenting the smart card and subsequently entering the PIN. PAM360's web-interface supplements smart card technology with SSL communication. So, the user is prompted to specify their X.509 certificate for getting access. The users can choose to provide the certificate from the smart card or the local certificate store, in which case PAM360 performs the steps to authenticate the user with the certificate. The users can also choose to decline providing the certificate and PAM360 takes them to the usual login page for authentication. 2. Workflow2.1 Smartcard Authentication Workflow
2.2 Smart Card Authentication in PAM360
3. Importing the Root of CAIn case, you are using an already available internal certificate (your own certificate), you need to specify the root of the CA. This is the certificate authority issuing the X.509 user certificates to the PAM360 users. If you are using a certificate signed by third-party CA, you may skip this step. To import the root of the CA, Once you execute the above, the root of the CA will be recorded in PAM360. All the certificates signed by the particular CA will henceforth be automatically taken. 4. Mapping User Details (between smartcard certificate and PAM360 user store)The next step is to choose the mapping between the smartcard certificate and the PAM360 user database. That means, the attribute in the smartcard certificate that uniquely identifies the user should match with the corresponding value in the PAM360 user database. This mapping involves two things:
4.1 Specifying the certificate attribute
4.2 Specifying the matching PAM360 user nameAfter specifying the Certificate Attribute, you need to specify the mapping attribute in PAM360 user store. That means, you need to specify the particular attribute that uniquely identifies the user in PAM360 user store. This depends on how the user was added in PAM360 - whether by manual addition or imported from Active Directory / LDAP. 4.3 Users manually addedFor the users manually added into PAM360, username in PAM360 is probably the only attribute that could be taken up for comparison with the corresponding attribute in certificate. So, just leave this text field with the default value username. 4.4 Users imported from Active Directory / LDAPIn the case of the users imported from Active Directory/LDAP, normally the attribute userPrincipalName is used to uniquely identify the user. It is quite possible that in your environment, some other attribute like distinguishedName might uniquely identify the user. So, specify the attribute accordingly. 5. Configuring Status Check for User CertificatesDuring authentication, PAM360 checks for certificate revocation status against an Online Certificate Status Protocol (OCSP) server, with details available in the certificate itself. If some certificates do not have OCSP information, the information provided in the settings here will be used. This check can be disabled by changing the property ocsp.check to false in System Properties file found in conf directory of PAM360. Also, authentication through OCSP will require access to the internet. In enterprise network setup, you might need to go through a proxy server to access the internet. You may specify proxy server settings if you have not specified it already.
6. Comparing User Certificates for Verifying AuthenticationAnother step in the authentication process is comparison of the user certificates presented by the user and the ones stored in the system or Active Directory/LDAP. For the users who were added manually, the X.509 certificate stored in the PAM360 database will be compared with the one presented by the user.
7. Enabling Smart Card Authentication (PAM360)After carrying out the settings, you need to enable Smart Card Authentication. Before enabling this, you need to ensure that AD/LDAP authentication is disabled. 8. Restarting PAM360 Server & Web BrowserAfter completing aforesaid steps, restart PAM360 server and the web server once to give effect to the settings. Whenever you enable or disable Smart Card authentication in PAM360, you need to restart the server and the browser to give effect to the change.
9. Smart Card Authentication in High Availability ScenarioIf you have configured high availability and if you have enabled smart card authentication in Primary, the same has to be configured in the secondary server too. To do this,
10. Troubleshooting TipIn case, you do not get the pop-up that prompts you to select the client certificate during authentication, try again after restarting the browser. | |