IDENTIKEY Authentication Server Product Guide
IDENTIKEY Authentication Server Product Guide
Product Guide
3.20
Disclaimer of Warranties and Limitations of Liabilities
Legal Notices
Copyright © 2008–2020 OneSpan North America, Inc. All rights reserved.
Trademarks
OneSpan™, DIGIPASS ® and CRONTO® are registered or unregistered trademarks of OneSpan North America Inc.,
OneSpan NV and/or OneSpan International GmbH (collectively "OneSpan") in the U.S. and other countries.
OneSpan reserves all rights to the trademarks, service marks and logos of OneSpan and its subsidiaries.
All other trademarks or trade names are the property of their respective owners.
Intellectual Property
OneSpan Software, documents and related materials (“Materials”) contain proprietary and confidential information.
All title, rights and interest in OneSpan Software and Materials, updates and upgrades thereof, including software
rights, copyrights, patent rights, industrial design rights, trade secret rights, sui generis database rights, and all other
intellectual and industrial property rights, vest exclusively in OneSpan or its licensors. No OneSpan Software or Mater-
ials may be downloaded, copied, transferred, disclosed, reproduced, redistributed, or transmitted in any form or by
any means, electronic, mechanical or otherwise, for any commercial or production purpose, except as otherwise
marked or when expressly permitted by OneSpan in writing.
Disclaimer
OneSpan accepts no liability for the accuracy, completeness, or timeliness of content, or for the reliability of links to
and content of external or third party websites.
OneSpan shall have no liability under any circumstances for any loss, damage, or expense incurred by you, your com-
pany, or any third party arising from the use or inability to use OneSpan Software or Materials, or any third party mater-
ial made available or downloadable. OneSpan will not be liable in relation to any loss/damage caused by
modification of these Legal Notices or content.
Reservation
OneSpan reserves the right to modify these Notices and the content at any time. OneSpan likewise reserves the right
to withdraw or revoke consent or otherwise prohibit use of the OneSpan Software or Materials if such use does not
conform to the terms of any written agreement between OneSpan and you, or other applicable terms that OneSpan
publishes from time to time.
Contact us
Visit our website: https://www.onespan.com
Resource center: https://www.onespan.com/resource-center
Technical support and knowledge base: https://www.onespan.com/support
If there is no solution in the knowledge base, contact the company that supplied you with the OneSpan product.
Table of Contents
1. Introduction 13
2. Overview 15
2.11. SOAP SSL 48
3. User Authentication 53
4. Signature Validation 96
7. EMV-CAP 135
9. Administration 144
16.3. Permissions Needed by IDENTIKEY Authentication Server for Active Directory 205
25. Upgrading IDENTIKEY Authentication Server and Migrating Server Data 245
25.1. Upgrading IDENTIKEY Authentication Server Software and Updating Static Server Configuration 245
25.2. Migrating from Software Security Module (SSM) to Hardware Security Module (HSM) 246
Illustration Index
Image 1: DIGIPASS 260 17
Image 4: DIGIPASS 560 17
Image 5: DIGIPASS 760 18
Image 6: DIGIPASS GO 215 18
Image 7: DIGIPASS 785 18
Image 8: DIGIPASS GO 3 19
Image 9: DIGIPASS GO 6 19
Image 23: RADIUS Server as Back-End Server (Users Log In with Both Password and OTP) 37
Image 28: Name resolution with ODBC database and Active Directory back end 58
Image 47: DIGIPASS Authentication for Windows Logon Online Authentication 129
Image 48: DIGIPASS Authentication for Windows Logon Offline Authentication 130
Image 50: SafeNet Cryptographic Keys Allocated by Token Name and Slot ID 141
Image 66: Multiple IDENTIKEY Authentication Server Using Single Database 216
Image 67: Replication between a Primary and Backup IDENTIKEY Authentication Server instance 217
Image 68: Replication between Primary, Backup, and Disaster Recovery in IDENTIKEY Authentication Server 218
Image 69: Replication between three IDENTIKEY Authentication Server instances 219
Table Index
Table 4: OTP Authentication for Scenarios Involving Multiple and Single DIGIPASS Applications 79
Table 8: Active Directory Users and Computers Extension vs Administration Web Interface 146
Table 10: Backup Virtual Mobile Authenticator Policy/ DIGIPASS Settings 173
1. Introduction
The IDENTIKEY Authentication Server Product Guide introduces the features and concepts of IDENTIKEY Authentic-
ation Server and explains various usage options. This book provides a comprehensive overview of IDENTIKEY
Authentication Server and its features.
Warning
Components or features described in this document may need to be configured to meet the standards of the Gen-
eral Data Protection Regulation (GDPR). If your organization is collecting or in any capacity processing data on cit-
izens of a European Union country, your organization is subject to the GDPR. For more information about GDPR
compliance, refer to the IDENTIKEY Authentication Server General Data Protection Regulation Compliance Guide.
n IDENTIKEY Authentication Server Product Guide: introduces the features and concepts of IDENTIKEY
Authentication Server and explains various usage options.
n IDENTIKEY Authentication Server Getting Started Guide: provides a walkthrough on deploying a standard
setup of IDENTIKEY Authentication Server and testing its key features.
n IDENTIKEY Authentication Server Installation Guide for Windows: provides comprehensive instructions
about installing IDENTIKEY Authentication Server on a Windows platform.
n IDENTIKEY Authentication Server Installation Guide for Linux: provides comprehensive instructions about
installing IDENTIKEY Authentication Server on a supported Linux distribution.
n IDENTIKEY Authentication Server Administrator Guide: in-depth information about the administration and
management of IDENTIKEY Authentication Server.
n IDENTIKEY Authentication Server Administrator Reference: detailed IDENTIKEY Authentication Server ref-
erences, including data attributes, utility commands, schema information, and other related information.
n IDENTIKEY Authentication Server Performance and Deployment Guide: information about common deploy-
ment models and performance statistics.
n IDENTIKEY Authentication Server Release Notes: latest information about corresponding IDENTIKEY
Authentication Server releases.
n IDENTIKEY Authentication Server General Data Protection Regulation Compliance Guide: provides general
information about the EU General Data Protection Regulation (GDPR), its implications on IDENTIKEY
Authentication Server, its components and side-products, and provides instructions to achieve GDPR com-
pliance where additional adaptations or procedures are required.
n IDENTIKEY Authentication Server Data Migration Guide: provides comprehensive information about the vari-
ous paths available when updating IDENTIKEY Authentication Server to a higher version.
n IDENTIKEY Authentication Server SDK Programmer's Guide: in-depth information required to develop using
the IDENTIKEY Authentication Server Software Development Kit (SDK), with dedicated guides for .NET,
Java, and SOAP:
n IDENTIKEY Authentication Server SDK Programmer's Guide for Java
n IDENTIKEY Authentication Server SDK Programmer's Guide for .NET
Comprehensive Help Files including context-sensitive assistance are available via IDENTIKEY Authentication Server
user interfaces. For more information, please visit http://www.vasco.com.
This guide is designed for system managers, administrators, and developers using IDENTIKEY Authentication
Server products. The reader should already be familiar with:
n Online authentication and authorization tools and protocols, including SOAP, RADIUS, WSDL, SSL, XML,
HTML and TCP/IP.
n Windows and Linux security software environments including IIS, Active Directory and ODBC.
n Administration tasks including user management, policy, scheduling, reports, and performance mon-
itoring.
n Password management and encryption techniques.
n EMV-CAP and other e-commerce transaction standards.
An understanding of programming languages, especially Java and ASP.NET, would also be helpful.
2. Overview
This section provides a high-level description of IDENTIKEY Authentication Server and its related technologies.
IDENTIKEY Authentication Server is a server product designed to support the deployment, use, and administration
of OneSpan DIGIPASS technology. IDENTIKEY Authentication Server can be easily integrated with existing applic-
ations using a Software Development Kit (SDK).
IDENTIKEY Authentication Server is designed to be easily usable with web applications, and also features an Admin-
istration Web Interface.
A DIGIPASS authenticator is a device for providing one-time passwords (OTPs) and Electronic Signatures to a user.
An organization can provide its users with DIGIPASS authenticators to ensure that the users log in to secure sys-
tems via strong authentication. The DIGIPASS authenticator provides the OTPs and the DIGIPASS users can use
these OTPs instead of or in addition to a static password for the login. With devices that support this functionality,
authentication transactions can be performed via the Secure Channel feature of IDENTIKEY Authentication Server
and DIGIPASS authenticators. For more information about Secure Channel, see 2.4.5. Secure Channel Feature.
In addition, a DIGIPASS authenticator can also be used to sign transaction data. Here, the user manually enters key
details of the transaction into the DIGIPASS authenticator or, with devices that support this functionality, scans an
image- in form of a QR code or a color QR code - provided on the transaction page, and receives a signature. The
user then enters that signature into a transaction confirmation page to confirm that the transaction is authorized.
Virtual Mobile Authenticator is a mechanism where an OTP is generated by the server and sent to the user's mobile
phone or email account. In this case, a physical DIGIPASS device is not needed.
A software DIGIPASS authenticator may be installed as a DIGIPASS Application onto an existing non-OneSpan plat-
form (such as a computer, smartphone, or other mobile device). It can be used to generate an OTP or a signature
in the same way as a physical DIGIPASS authenticator.
Each DIGIPASS authenticator is programmed with at least one DIGIPASS Application and a unique secret . The
DIGIPASS Application uses this unique secret when generating a one-time password (OTP) or an Electronic Sig-
nature.
Each type of DIGIPASS Application generates OTPs from different data, and in slightly different ways:
Response-Only
Creates an OTP based on the current date and time or on the number of uses (i.e. events).
Challenge/Response
Creates an OTP (also referred to as a response) based on a numerical challenge given on a login page. This
challenge may be either of two things:
Signature
Electronic Signature DIGIPASS Applications are typically used in online banking. The DIGIPASS authenticator
creates a unique code – i.e. an Electronic Signature – based on a number of transaction data fields entered
plus (optionally) the date and time or events.
Multi-Mode
A Multi-Mode DIGIPASS authenticator can be used on all of the above modes. This setting is used mainly for
DIGIPASS for Web (see 2.3.2.1. Software DIGIPASS Types).
n Response-Only
n Challenge/Response
n Signature
DIGIPASS 760 protects online banking services by allowing the bank to establish a secure optical communication
channel with the client. The device uses a unique visual challenge contained in a graphical cryptogram, a color QR
code, consisting of a matrix of colored dots. The user scans the color QR code with the device's built-in camera to
generate the signatures for activations and transactions.
Image 5: DIGIPASS 760
DIGIPASS GO 215 and DIGIPASS 785 protect online banking services by allowing the bank to establish a secure com-
munication channel with the client using Bluetooth low energy (BLE).
IDENTIKEY Authentication Server supports EMV-CAP compliant smart cards and card readers (see 7. EMV-CAP).
Software DIGIPASS authenticators are software versions of DIGIPASS that provide authentication and signature func-
tions for mobile devices and web browsers. They generate a one-time password or Electronic Signature for you in
the same way as a hardware DIGIPASS.
A software DIGIPASS authenticator may be installed as a DIGIPASS Application onto an existing non-OneSpan plat-
form (such as a computer, smartphone, or other mobile device). This effectively makes the device emulate a hard-
ware DIGIPASS. The user then accesses the installed DIGIPASS Application to obtain a one-time password (OTP) or
Electronic Signature. For more information about hardware DIGIPASS, refer to 2.3.1. Hardware
DIGIPASS authenticator. To be ready for use, each software DIGIPASS requires:
Once installed on a host device, software DIGIPASS will need to be activated via an activation code. Once activ-
ated, the device can then be used to generate one-time passwords and Electronic Signatures. Software delivery
and activation of the software DIGIPASS authenticator takes place in the course of the provisioning process - refer
to Chapter 5. Software DIGIPASS Provisioning for more information on this.
n Response-Only
n Challenge/Response
n Signature
The distribution of a software DIGIPASS authenticator is controlled by IDENTIKEY Authentication Server using pro-
visioning scenarios (see 5. Software DIGIPASS Provisioning).
Mobile Authenticator
The Mobile Authenticator is activated with a color QR code, and can be protected either with fingerprint recog-
nition or a PIN code, depending on the available mobile device functionalities. Mobile Authenticator can con-
tain multiple DIGIPASS instances and can be installed on several mobile devices, allowing the use of multiple
devices for the login process. For more detailed information, refer to the Mobile Authenticator Getting Started
Guide.
The Mobile Authenticator is used for push–notification-based authentication. For more information on this,
refer to 2.4.6. Push Notification via the Mobile Authenticator and 3.6.2.6. Push– Notification- Based
Authentication Process. For detailed information on the Push Notification feature, required components, and
the setup with IDENTIKEY Authentication Server and its components , refer to the Push Notification Getting
Started Guide.
2.3.3. DIGIPASS Nano
The DIGIPASS Nano consists of a thin film that users can place on top of any SIM card, turning the phone into a
mobile security device capable of generating an OTP or Electronic Signature.
DIGIPASS 110 is a hybrid DIGIPASS authenticator combining the security of a hardware device with the portability of
a software DIGIPASS authenticator. This authenticator consists of a secure USB stick used with a Java applet on
the user's computer. It contains the cryptographic information used to generate a one-time password (OTP) for the
user on demand.
The distribution of the Java applet used with DIGIPASS 110 is handled by IDENTIKEY Authentication Server using pro-
visioning scenarios similar to software DIGIPASS authenticators (see 5. Software DIGIPASS Provisioning).
Virtual Mobile Authenticator can be used instead of a hardware DIGIPASS authenticator, or as a backup mechanism
when users lose their hardware DIGIPASS authenticator.
Using Virtual Mobile Authenticator means that a user may receive a one-time password (OTP) via:
n Email
n SMS (over a mobile phone)
n Voice message (over a landline or mobile phone)
n Primary Virtual Mobile Authenticator. Treated by IDENTIKEY Authentication Server almost identically to hard-
ware and software DIGIPASS authenticator – a record of each Primary Virtual Mobile Authenticator must be
imported into the data store, and may then be assigned to a user automatically or manually. Users will typ-
ically log in with their user ID and static password, have an OTP sent to their phone or email account, and
then enter the received OTP in the second stage of their login.
n Backup Virtual Mobile Authenticator. This feature allows users to request an OTP sent to their phone or
email account if they do not have their usual DIGIPASS authenticator at hand. It may be limited by number
of uses or days of use, e.g. users may be limited to 2 days usage, after which they will again need to use
their usual DIGIPASS authenticator to log in.
The standard licensing model applies to models of the DIGIPASS authenticator that are pre-provisioned ex factory,
and software DIGIPASS using standard one-step activation.
The standard activation process involves generating an activation code and sending it to a software DIGIPASS sep-
arately or as part of the full activation data. Even though generating the activation data is part of the first-time activ-
ation process, you can also re-generate and re-send the activation data for already activated authenticators,
which may be required for security purposes.
Warning
Generating the activation data of or sending the activation data to an activated authenticator will invalidate the
current activation; in this case, the user will no longer be able to log in with their authenticator.
IDENTIKEY Authentication Server supports Multi-Device Licensing and Multi-Device Activation. This licensing and
activation model applies to the following models of the DIGIPASS authenticator:
Note
Certain Multi-Device Licensing, Multi-Device Activation functionalities and the Secure Channel feature are aimed
at the banking security market only. This implies that certain of these functionalities will not be available for
Warning
The Multi-Device Licensing and Multi-Device Activation functionality using the Secure Channel feature requires a
SOAP provisioning and / or SOAP signature license!
With the Multi-Device Licensing model and its one-to-one relationship between a user account and a DIGIPASS
serial number license, a user account can optionally be bound to several DIGIPASS instances. Multi-Device Activ-
ation, which is an activation process in two steps, guarantees that only the intended end user can perform the
device activation.
Note
Multi-Device Licensing and Multi-Device Activation are not supported, if IDENTIKEY Authentication Server is con-
figured to use Active Directory (AD) as data storage.
With the Multi-Device Licensing model, each DIGIPASS serial number corresponds to a unique DIGIPASS license;
consequently, for each DIGIPASS device compliant with the Multi-Device Licensing model, the corresponding .dpx
file contains one DIGIPASS master activation application for each DIGIPASS license. These DIGIPASS instances are
represented in IDENTIKEY Authentication Server as DIGIPASS with a single DIGIPASS master activation application.
One DIGIPASS license allows to instantiate several DIGIPASS instances bound to the same DIGIPASS license.
DIGIPASS instances are not different from DIGIPASS activated in the standard process with regard to the rep-
resentation of DIGIPASS applications. IDENTIKEY Authentication Server creates the DIGIPASS instance(s) for a par-
ticular license during the Multi-Device Activation process.
The number of instances that can be activated for each DIGIPASS license is limited to a predefined threshold which
is configured by OneSpan at the time of order. A maximum number of 99 instances can be configured, and each
DIGIPASS instance can have from 1 to 8 DIGIPASS authentication or e-signature application(s). These DIGIPASS
instances are represented in IDENTIKEY Authentication Server as DIGIPASS with the same base serial number as
the bound DIGIPASS license, appended with the instance sequence number.
In the Multi-Device Activation process, two separate activation messages are used for activating the device(s). This
serves to guarantee that only the intended end user, and not an adversary who has intercepted one of the mes-
sages, can perform the activation. Multi-Device Activation is a different process from the standard software
DIGIPASS activation and requires DIGIPASS devices and .dpx files compliant with the Multi-Device Licensing model.
When a compliant DIGIPASS device is activated, settings and secrets are written into the device.
Note
Both activation messages should be delivered to the end user via authentic channels. For instance, Activation
Message 1 should be delivered via a secure letter or e-mail and Activation Message 2 should be delivered via the
online banking application.
Activation Message 1 may be used several times to allow activation of multiple DIGIPASS instances (of one
DIGIPASS license) on multiple DIGIPASS devices, if necessary. The validity period for Activation Message 1 is con-
figurable in your IDENTIKEY Authentication Server policy. On the other hand, Activation Message 2 can be used for
effective activation for one DIGIPASS instance only.
Note
Each DIGIPASS license will be used several times for activation of several DIGIPASS instances (in several DIGIPASS
devices) for one user account; however, only one license will be consumed for the activation of the different
DIGIPASS instances for one user account.
Secure Channel is an optional feature applicable to DIGIPASS devices compliant with the Multi-Device Activation
process (in the context of Multi-Device Licensing). The optional use of the secure channel feature after activation
of a DIGIPASS instance allows protecting the messages that are exchanged between the server- and the client-
side.
Note
The secure channel will be usable only if the Secure Channel feature has been ordered from and configured by
OneSpan at the time of order.
The Secure Channel feature applies a new protocol that uses payload keys to protect the confidentiality and
authenticity of the message's payload. A single master payload key is shared among all DIGIPASS instances linked
to a certain DIGIPASS license, enabling the end user to transparently use multiple DIGIPASS devices to answer the
transaction request message.
The Secure Channel feature requires the mandatory provisioning of a payload key represented on the server-side
by a payload key BLOB. In this case, first a payload key will have to be generated once for each DIGIPASS license.
The different DIGIPASS instances activated from one DIGIPASS license must share the same payload key. After the
activation, the payload key will protect the request and deactivation messages for exchange between the server
and the client devices that have been activated using a particular DIGIPASS license (for a particular user account).
The parameters used to generate the request body for Secure Channel messages can be configured via the Secure
Channel tab in the policy properties page of the Administration Web Interface.
Note
The Secure Channel tab is not displayed for Active Directory storage-based deployments of IDENTIKEY Authentic-
ation Server.
If the Secure Channel feature has not been ordered, IDENTIKEY Authentication Server will not generate and pro-
vision any payload key.
IDENTIKEY Authentication Server supports authentications via Push Notification - this authentication method uses a
push mode to enable the Mobile Authenticator on a mobile device to authenticate the user. Refer to 3.6.2.6. Push–
Notification-Based Authentication Process for an overview of the push–notification-based authentication process.
For detailed information on the Mobile Authenticator, refer to the Mobile Authenticator and Mobile Authenticator
Studio product documents; for detailed information on the Push Notification feature and required components,
refer to the Push Notification Getting Started Guide , which is part of the IDENTIKEY Authentication Server doc-
umentation suite. For detailed information how to activate the Mobile Authenticator and the required steps to
upgrade the Mobile Authenticator to enable Push Notification, refer to the OneSpan User Websites Administrator
Guide.
The following diagram displays the basic structure of IDENTIKEY Authentication Server and the components it inter-
acts with, such as corporate and remote access clients, remote management applications, custom web applic-
ations, and back-end systems.
IDENTIKEY Authentication Server provides support for web applications through an SDK based on the standard
SOAP protocol. These applications may cover operational tasks such as authentication and signature validation,
provisioning of Software DIGIPASS or administration of DIGIPASS Authentication for Microsoft ADFS.
SOAP over HTTPS is supported, versions 1.1 and 1.2. 'Document Literal' binding is used. A variety of SOAP client
SDKs have been tested.
Some of the client components of IDENTIKEY Authentication Server also use the SOAP protocol for communication
like the DIGIPASS Authentication Modules and DIGIPASS Authentication for Windows Logon.
IDENTIKEY Authentication Server supports the RADIUS protocol (according to RFC 2865) for remote network access
authentication. Some applications are written using RADIUS as an authentication protocol, and these applications
will also be supported.
The SEAL protocol is a proprietary OneSpan protocol used by some of the OneSpan authentication modules; this
includes Citrix Web Interface and DIGIPASS Authentication for Windows Logon version 1.x.
The IDENTIKEY Authentication Server is a service which receives and processes requests from the various client
components. It may refer to a back-end system for a part of the processing tasks.
IDENTIKEY Authentication Server has a modular architecture incorporating the following key concepts:
Communicator Modules
IDENTIKEY Authentication Server provides a communicator module for each protocol for which it can receive
and handle requests. Each communicator module can be enabled or disabled as required, subject to support
in the server license.
Scenario Modules
For each major group of functionality in the IDENTIKEY Authentication Server, a Scenario module is present.
Each scenario can be enabled or disabled as preferred, subject to support in the license. The following scen-
arios are present:
Back-End Systems
A back-end system is used as an authority for user accounts and static passwords, before a user account is
created in IDENTIKEY Authentication Server and the user starts to use a DIGIPASS authenticator. A RADIUS
server may be used for both back-end authentication and returning RADIUS attributes. For more information,
see 3.7. Back-End Authentication.
n LDAP Synchronization Tool synchronizes user information on IDENTIKEY Authentication Server with
external LDAP databases. For more information, refer to the LDAP Synchronization Tool Guide.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that LDAP Syn-
chronization Tool is used to synchronize user information from any LDAP data store with any IDENTIKEY
Authentication Server data store. To be GDPR-compliant, the following requirements must be met:
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection
Regulation Compliance Guide.
n Password Synchronization Manager automatically updates the static password on IDENTIKEY Authentic-
ation Server when a user has changed the Windows password (see 6.6. Password Synchronization Man-
ager).
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), you need to secure
the communication between Password Synchronization Manager and IDENTIKEY Authentication Server
via SSL to be GDPR-compliant. Each IDENTIKEY Authentication Server configuration can be updated to
use encrypted communication via the Use SSL option in the password filter configuration of the PSM
Remote Configuration Manager.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection
Regulation Compliance Guide.
Data Store
IDENTIKEY Authentication Server can use Active Directory or a supported ODBC-compliant database to store
administration and configuration data.
An embedded MariaDB database is also included in the IDENTIKEY Authentication Server installation package.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), be aware that when
selecting the embedded MariaDB during installation, you will be prompted to choose whether or not to use
encryption. By selecting Yes, IDENTIKEY Authentication Server will use data-at-rest encryption for the data-
base, and use ODBC connection encryption by default.
When selecting the Advanced installation option and not opting for a MariaDB database, you are respons-
ible for protecting the database and the connections to it.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regu-
lation Compliance Guide.
Note
Hardware Security Module support is only available when IDENTIKEY Authentication Server is using an ODBC-com-
pliant database.
The OneSpan User Websites enable users to perform management and other tasks that are not available during
usual login, such as user registration, DIGIPASS assignment and activation, PIN change, and Virtual Mobile
Authenticator OTP (one-time password) requests. You can provide and restrict access to functionality as needed,
and customize any cosmetic part of OneSpan User Websites to meet your corporate design and text requirements.
If you want to use your own web pages with the OneSpan User Websites business logic, you can easily do so by
implementing the correct HTML POST forms with all the required input fields.
For more information, refer to the OneSpan User Websites Administrator Guide.
DIGIPASS Gateway is a service that allows IDENTIKEY Authentication Server to interact with compatible DIGIPASS
authenticators. It is used in the following processes:
n Multi-Device Activation: DIGIPASS Gateway is used for transmitting activation data to compliant DIGIPASS
authenticators.
For more information about Multi-Device Activation, see 2.4. DIGIPASS Licensing and Activation.
n Upgrading to Push Notification: This procedure is required after an upgrade of the Mobile Authenticator
from a version that does not support the Push Notification feature. For more information about the
upgrade procedure, refer to the IDENTIKEY Authentication Server Administrator Guide and the OneSpan
User Websites Administrator Guide.
n Authentication via Push Notification using the Mobile Authenticator (see 3.6.2.6. Push–Notification-Based
Authentication Process).
For more information about Push Notification and its required components, refer to the Push Notification Getting
Started Guide . For more information about integrating DIGIPASS Gateway, refer to the respective product doc-
umentation.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), ensure to run DIGIPASS Gate-
way on an encrypted disk. Currently, the DIGIPASS Gateway database does not provide encryption.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
IDENTIKEY Authentication Server can be used in a RADIUS environment in a number of ways, depending on your
company's requirements.
In the RADIUS protocol, attributes are used for authorization and configuration of the remote access session in
many cases. IDENTIKEY Authentication Server can return authorization attributes from the DIGIPASS user account;
alternatively, a separate RADIUS server can provide these attributes instead.
In many cases, a RADIUS Client may be a dial-up Network Access Server (NAS), firewall/VPN appliance, Wireless
Access Point, or another device that uses the RADIUS protocol for user authentication. Some software applications
can also use RADIUS for authentication, and can therefore also act as RADIUS Clients.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
n PAP
n CHAP
n MSCHAP
n MSCHAP2
Warning
When integrating IDENTIKEY Authentication Server into a RADIUS environment to provide authentication services,
DIGIPASS deployment should be done in accordance with only the following described scenarios. Deviating from
these advised scenarios may result in security vulnerabilities (e.g. brute force attacks).
In this scenario, IDENTIKEY Authentication Server retrieves RADIUS attributes from the DIGIPASS user account and
returns them with an Accept message to the RADIUS client.
This scenario can be implemented with the following supported password protocols:
n PAP
n CHAP
n MSCHAP
n MSCHAP2
This scenario is identical to 2.6.1. Stand-Alone: RADIUS Attributes from DIGIPASS User Account, except that it does
not use RADIUS attributes to authenticate users.
Using this method, the user only enters their OTP (and PIN, when required). IDENTIKEY Authentication Server has to
learn the static password for the user; as such, when the user gives the correct OTP, IDENTIKEY Authentication
Server can send the static password to the RADIUS server.
The Wireless RADIUS method can be used if one of the supported protocols is used. For a list of supported
RADIUS protocols, refer to 3.9. Supported RADIUS Protocols.
In this scenario, a RADIUS server acts as a proxy for authentication, effectively delegating the authentication pro-
cess to IDENTIKEY Authentication Server. The RADIUS server provides the authorization attributes after IDENTIKEY
Authentication Server has accepted the user credentials.
n The RADIUS server supports the proxying of authentication while returning attributes itself
n The RADIUS server can forward authentication request using one of the supported password protocols (as
listed in Supported password protocols).
n The RADIUS server supports an access-challenge response from IDENTIKEY Authentication Server, if
required. The access-challenge mechanism is used for challenge/response and Virtual Mobile Authentic-
ator, although it is still possible to use Virtual Mobile Authenticator without that mechanism.
If the RADIUS server is capable, this scenario allows IDENTIKEY Authentication Server to operate in an environment
that uses certificate-based EAP protocols such as PEAP and EAP-TTLS. To make this work, the RADIUS server
decrypts the user credentials into a simpler protocol before forwarding the request to IDENTIKEY Authentication
Server.
After validating the one-time password, IDENTIKEY Authentication Server forwards requests to a RADIUS server in
order to retrieve authorization attributes. It is necessary to provide a static password to the RADIUS server to
achieve this. There are two methods of implementing this scenario:
n One of the supported password protocols is used (as listed in Supported password protocols).
n The static passwords can be 'learnt' by IDENTIKEY Authentication Server.
If the password protocol PAP is used, IDENTIKEY Authentication Server has the ability to learn the static pass-
words automatically. The user then has to perform at least one login with their static password; if the RADIUS
server accepts the password, IDENTIKEY Authentication Server can learn it.
However, if one of the other password protocols is used, this process is not possible. In that case, there are a
few other ways in which the passwords can be learnt, through administrative data entry or using the OneSpan
User Websites.
Image 23: RADIUS Server as Back-End Server (Users Log In with Both Password and OTP)
This method can be used if the PAP password protocol is used. This is because IDENTIKEY Authentication
Server uses both CHAP and MSCHAP to hash the password and OTP together inseparably.
IDENTIKEY Authentication Server has a SOAP module that can be used to integrate IDENTIKEY Authentication Server
with web applications. The IDENTIKEY Authentication Server SOAP Interface allows the following IDENTIKEY
Authentication Server functions to be integrated into web applications:
n User Authentication
n Signature Validation
n Software DIGIPASS Provisioning
n Administration
n Reporting
DIGIPASS Authentication for IIS Basic is an add-on designed for use with Microsoft Internet Information Services
(IIS). It can be configured to intercept authentication requests and redirect them to IDENTIKEY Authentication
Server. DIGIPASS Authentication for IIS Basic verifies the credentials with IDENTIKEY Authentication Server first.
Normally, this means verifying the one-time password. If the OTP is valid, then IDENTIKEY Authentication Server
passes the static password back to IIS as if the user had entered it, and the normal website authentication process
completes the login.
To enable verification via IDENTIKEY Authentication Server, it is necessary to provide a static password (typically
the Windows password) to IIS. There are two methods of implementing this:
IDENTIKEY Authentication Server can automatically learn the static Windows passwords. The user has to per-
form at least one login with their static password – if this password is validated by Windows, IDENTIKEY
Authentication Server can learn it.
The same process can also be used if the static passwords are held in a RADIUS server. However, the
IDENTIKEY Authentication Server license must have RADIUS support activated for this to be enabled.
This process is not possible if the static passwords are not Windows or RADIUS passwords. Such passwords
will need to be manually entered.
This method may be necessary when the static passwords are not Windows passwords, e.g. NetIQ eDirectory
passwords. It also may be suitable if you do not want IDENTIKEY Authentication Server to store your users'
Windows passwords.
Note
IDENTIKEY Authentication Server strongly encrypts Windows passwords whenever it is configured to store them.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that to be GDPR-
compliant, the respective DIGIPASS Authentication Modules must have use SSL enabled in the DIGIPASS
Authentication Configuration Center.
If tracing or logging is used, ensure that the folder or disk containing the trace or log files is encrypted.
IDENTIKEY Authentication Server includes several administration components. These components are used for a
wide range of tasks, including (but not limited to) auditing, configuration, and reporting.
The Administration Web Interface is used to complete most of the administration tasks in the IDENTIKEY
Authentication Server environment.
Audit System
The IDENTIKEY Authentication Server Audit System tracks operations performed by IDENTIKEY Authentication
Server, including RADIUS accounting information where required. Each operation generates audit messages
that are written to either a text file or a database.
Audit information can be used to generate reports, for example, the number of failed authentications over a
certain period. IDENTIKEY Authentication Server system administrators can also use audit information to mon-
itor system performance, or suspicious activity.
IDENTIKEY Authentication Server also includes an Audit Viewer, which is used to view audit information. This
utility allows System administrators to filter audit information, making it easier to understand. The Audit
Viewer also allows you to view audit information from different sources.
Using the Audit Viewer to view audit information helps system administrators to troubleshoot effectively, and
helps them monitor significant events in the system.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), ensure that GDPR-compliance
is met when auditing with IDENTIKEY Authentication Server by:
For more information about GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regu-
lation Compliance Guide.
Reporting Module
The Reporting Module is part of the Administration Web Interface package. This module contains the tools
required to run a set of standard reports and to create and run custom reports.
Reports may be based on audit data, user account data or DIGIPASS. Formatting templates can be used to
convert the output into the preferred format, using XSLT.
The Tcl extension uses the IDENTIKEY Authentication Server to manage the data store. This extension uses
the SEAL protocol to communicate with the IDENTIKEY Authentication Server.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that the
dpadmincmd.xml configuration file must be configured to enable the SSL parameter.
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
IDENTIKEY Authentication Server also includes a Maintenance Wizard; this utility is used to carry out certain
maintenance tasks, e.g. changing the IP address of the server.
IDENTIKEY Authentication Server can use either of two types of data stores:
The data model will vary slightly depending on which data store is used. The following sections describe the types
of records stored in the IDENTIKEY Authentication Server data store.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), be aware that when selecting
the embedded MariaDB during installation, you will be prompted to choose whether or not to use encryption. By
selecting Yes, IDENTIKEY Authentication Server will use data-at-rest encryption for the database, and use ODBC
connection encryption by default.
When selecting the Advanced installation option and not opting for a MariaDB database, you are responsible for
protecting the database and the connections to it.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that if your organization
chooses to install IDENTIKEY Authentication Server with an Active Directory storage, it is the responsibility of your
organization to protect sensitive data within Active Directory, so that it is compliant with the GDPR.
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
A DIGIPASS record must exist in the data store for each DIGIPASS in use. This record contains:
Some of the information in this record is encrypted together in what is called the DIGIPASS BLOB. There is one
BLOB per DIGIPASS Application. Each time a one-time password is used (whether or not the authentication is suc-
cessful), IDENTIKEY Authentication Server updates the DIGIPASS BLOB to prevent the one-time password from
being reused.
Each user logging in via DIGIPASS authentication will require a DIGIPASS user account. The DIGIPASS user account
record contains information needed by IDENTIKEY Authentication Server (i.e. authentication settings). A DIGIPASS
must be assigned to a DIGIPASS user account before it can be used for authentication.
In addition, administrative privileges are assigned to DIGIPASS user account. As such, each administrator also
needs a DIGIPASS user account.
IDENTIKEY Authentication Server uses component records to determine which requests from which clients can be
processed. Component records also specify which policy should be used when processing requests (see 2.9.4.
Policy Records).
A policy record (or policy) specifies various settings that affect request handling processes. Each request is handled
according to a policy that is identified by the applicable component record.
A back-end server record is required when IDENTIKEY Authentication Server uses a RADIUS or LDAP server for
authentication. It is possible to create more than one back-end server record, for fail-over purposes. You can also
allocate different back-end servers for different user domains.
Domains form the basis for the organizational structure in an ODBC database. Where IDENTIKEY Authentication
Server uses Active Directory as its data store, the standard Active Directory domains are used instead.
Active Directory
IDENTIKEY Authentication Server operates within the pre-existing Active Directory domain and organizational
unit structure. Each DIGIPASS user and DIGIPASS must belong to a domain in Active Directory. User IDs must
be unique within a domain, but may be repeated between domains.
While DIGIPASS user account and DIGIPASS records can belong to any domain, a single domain is identified
during installation as the DIGIPASS Configuration Domain. This domain is used to store the following records:
n Component
n Policy
n Back-end server
When no domain is specified, the DIGIPASS configuration domain is also used as a default domain for user
lookup.
ODBC Database
With an ODBC database, domains perform the following functions:
Each DIGIPASS User and DIGIPASS must belong to a domain. One domain is identified as the Master Domain –
this will be the default domain when none is specified. In addition, administrators in the Master Domain can
be given rights to access data in all domains, while other administrators are limited to data in their own
domain.
User IDs must be unique within a domain, but may be repeated between domains. DIGIPASS serial numbers
must be unique in the database.
Like domains, IDENTIKEY Authentication Server handles organizational units differently depending on whether Act-
ive Directory or an ODBC database is used as its data store.
Active Directory
When IDENTIKEY Authentication Server uses Active Directory as its data store, the standard Active Directory
Organizational Units are used instead.
DIGIPASS user accounts and DIGIPASS records are normally stored in organizational units or the users con-
tainer. A special container called DIGIPASS-Pool is created during installation to hold unassigned DIGIPASS,
although they can be located in organizational units instead.
Administration duties may be assigned to administrators per organizational unit, in the same way that regular
user administration is delegated at that level.
ODBC Database
When IDENTIKEY Authentication Server uses an ODBC database as its data store, organizational units allow
further compartmentalization of DIGIPASS user accounts, DIGIPASS records, and administration duties. organ-
izational units are included to:
n Limit the activities of an administrator to their own organizational unit (i.e. delegated administration)
n Allocate unassigned DIGIPASS records to different organizational units; for example, to mirror the geo-
graphic location of the devices
DIGIPASS user accounts and DIGIPASS records may belong to an organizational unit, but this is not mandatory.
The following sections describe the different functions supported by various communicators within IDENTIKEY
Authentication Server. For technical details about integrating with IDENTIKEY Authentication Server, refer to the
IDENTIKEY Authentication Server SDK documentation.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), ensure that the communicator
interfaces are configured to use SSL. If an IDENTIKEY Authentication Server component does not support SSL, the
respective interface must be configured without SSL; however, to be GDPR-compliant, it is advised to set up an
encrypted VPN tunnel to secure the communication. Note that you should always set up an encrypted VPN tunnel
to secure the communication between RADIUS clients and IDENTIKEY Authentication Server.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
n User Authentication
n Signature Validation
n Software DIGIPASS Provisioning
n Administration
n Reporting
2.10.2. RADIUS
n PAP
n CHAP
n MSCHAP
n MSCHAP2
MPPE keys are generated for MSCHAP and MSCHAP2. IDENTIKEY Authentication Server can also handle accounting
requests and return RADIUS attributes for authorization. However, IDENTIKEY Authentication Server does not act as
an authorization server.
An existing RADIUS server may be used as a back-end system to allow any or all of the following:
There are a number of systems that can be used as IDENTIKEY Authentication Server back ends. These back ends
can be used as an authority on authentication data. For more information, refer to 3.7. Back-End Authentication.
You can write your own plug-in engine to attach IDENTIKEY Authentication Server to your own back end system.
This would be used primarily as an authority to permit dynamic creation of user accounts in IDENTIKEY Authentic-
ation Server and for verification of static passwords.
Note
For Linux installations, a custom back-end engine must have root:root ownership and permissions set to
0755 to allow IDENTIKEY Authentication Server to load it.
2.11. SOAP SSL
Secure Sockets Layer (SSL) is a cryptographic protocol that provides secure communications over the Internet for
e-mail, web browsing, and other types of web protocols. IDENTIKEY Authentication Server uses SSL to secure the
connection between two web-based applications via SOAP.
SSL is the method by which a client can obtain a secure connection to an SSL-enabled server. The SSL-enabled
server can identify itself to the client in a trusted manner before any information is passed between the client and
the SSL-enabled server.
Some of the terms used in describing the function of SSL are specific to SSL and cryptography. Listed below are
some of the terms used in this chapter, and what they mean:
Handshake
A procedure by which the client machine and the SSL-enabled server establish a trusted and secure con-
nection before passing any sensitive information to each other.
Certificate
A digitally signed document (either signed by a Certificate Authority or self-signed) used to establish the cre-
dentials of the subject to which the certificate was issued.
Certificate Authority
A trusted third party used to issue the certificates. Each browser will have a list of trusted Certificate Author-
ities it can use to check against the signature on a certificate.
Public Key
A key used to encrypt and decrypt information that is known to the SSL-enabled server and clients that use it.
Private Key
A key known only to the SSL-enabled server that is used to decrypt information.
Symmetrical Encryption
Encryption that uses only one key to encrypt and decrypt information.
Asymmetric Encryption
Encryption that uses one key to encrypt information, and another to decrypt it.
The server-side of SSL is mandatory in implementing SOAP interfaces for IDENTIKEY Authentication Server. The
SOAP client must utilize SSL to verify the server when attempting to connect.
When configuring the SOAP Communication Protocol in the Configuration Utility, you can specify whether the client
certificate is any of the following:
n Never
n Required
n Optional
n Required - Signed Address Only: The client certificate must include the IP address of the client. The server
will check the IP address from the client certificate against the client it is establishing a connection with,
and the handshake will fail if the two IP addresses don't match.
The Configuration Wizard can provide a self-signed SSL certificate. This self-signed SSL certificate is time-limited,
so it will expire after a period of time. When the test SSL certificate expires, you can recreate it from the Con-
figuration Wizard. Alternatively, you can also purchase an SSL certificate with a longer expiry period.
Note
The Configuration Wizard runs in two modes: Installation Wizard and Maintenance Wizard. For more information,
refer to 9.8. Configuration Wizard.
In the Configuration Utility, the SOAP Communication protocol page also contains a Re-Verify on Re-Negotiation
checkbox. Tick this box to force the connection between SOAP and the IDENTIKEY Authentication Server to be re-
verified each time a connection is established.
Warning
Enabling the Re-Verify on Re-Negotiation option may incur a performance penalty. As such, do not do so unless
absolutely necessary.
IDENTIKEY Authentication Server contains features which support the following PCI-DSS compliance requirements:
If maker–checker authorization is enabled, certain operations initiated by one administrator (maker) can only be
executed after approval and authorization by another administrator (checker).
The so-called maker–checker authorization is an optional feature that can be enabled/disabled in the IDENTIKEY
Authentication Server Administration Web Interface to provide an additional layer of authorization. By enabling this
feature, the setting is replicated system-wide over all IDENTIKEY Authentication Server instances.
The maker–checker feature introduces the four-eyes principle, in which the authorization process requires two dif-
ferent individuals to complete an administrative operation, when:
n Creating a user
n Deleting a user
n Assigning a DIGIPASS authenticator
n Unassigning a DIGIPASS authenticator
In the IDENTIKEY Authentication Server Administration Web Interface, the maker administrator selects the oper-
ation that needs approval and designates a checker administrator. The system sends a notification via e-mail (noti-
fication messages are customizable) to the checker administrator that there is a pending administrative operation.
In case of approval, the maker administrator receives notification that the operation has been authorized and is
ready for execution.
Note
Administrators, other than the designated checker, can approve/reject pending operations, if they either have
master administrator privileges with Access Data in All Domains assigned to them, or if they have administrative
privileges within their respective domains or organizational units.
Warning
An administrator can circumvent maker–checker authorization for unassigning a DIGIPASS authenticator, by just
deleting the device.
To prevent this, do not assign the Delete DIGIPASS privilege to administrators, who have also the Unassign
DIGIPASS privilege assigned and are supposed to unassign DIGIPASS authenticators in a controlled environment
with maker–checker authorization enabled.
The following section lists the limitations of the maker–checker authorization feature in IDENTIKEY Authentication
Server.
The following actions/tools are not supported when maker–checker authorization is enabled:
3. User Authentication
This section describes the different processes involved in the way IDENTIKEY Authentication Server authenticates
users.
n Local authentication: IDENTIKEY Authentication Server uses information from its own data store
n Back-end authentication: IDENTIKEY Authentication Server consults a back-end system to verify login
information
The exact authentication process used by IDENTIKEY Authentication Server will vary depending on the applicable
policy and the DIGIPASS user account.
The following process overview describes how IDENTIKEY Authentication Server authenticates DIGIPASS users:
1. Verify that a client component record for the client application sending the authentication request exists in
the data store (see 3.3. Identifying the Component Record).
2. Determine which policy applies for the client component record (see 3.4. Identifying a Policy).
3. Perform several user checks (see 3.5. Looking Up and Checking the DIGIPASS User Account):
n Windows username/domain resolution (if used)
n Existence of a DIGIPASS user account
n Status of DIGIPASS user account (disabled, locked, expired, possible unlock)
4. Local authentication: If local authentication is used, authentication can occur in two ways (see 3.6. Local
Authentication):
n With a DIGIPASS authenticator: Verify a one-time password (OTP), Challenge/Response, or Virtual
Mobile Authenticator login.
n Without a DIGIPASS authenticator: Verify a static password.
5. back-end authentication: Check the provided password with another back-end system (see 3.7. Back-
End Authentication).
6. (OPTIONAL) If a Challenge/Response or Virtual Mobile Authenticator login is needed, provide a challenge or
OTP.
7. Audit and return the authentication result.
During the last step of the authentication process, IDENTIKEY Authentication Server may perform relevant database
updates, e.g. DIGIPASS user account lock.
The following table illustrates the typical login process for the three basic login methods supported by IDENTIKEY
Authentication Server.
Component Type
A name provided by the SOAP application, or a fixed name such as RADIUS Client, Citrix Web Interface ,
Outlook Web Access or Administration Program.
Location
The source IP address of the request.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
The processes for looking up and verifying a component varies according to the type of component, as outlined in
3.3.1. RADIUS Client Component Check and 3.3.2. DIGIPASS Authentication Module Component Check.
Any RADIUS client which does not have an explicit component record will be handled using the default RADIUS cli-
ent component if it exists.
For a DIGIPASS Authentication Module component, IDENTIKEY Authentication Server checks whether a com-
ponent record for the DIGIPASS Authentication Module exists; if not, the request is discarded without respond-
ing:
Policies specify various settings that affect all request handling processes. Each request is handled according to a
policy, which is identified by the applicable client record. For more information, see 13. Policies.
Note
Policies can also be assigned to server components. However, this feature is not relevant for the authentication
process.
For a full listing of possible policy settings and the preloaded policies available with the IDENTIKEY Authentication
Server, refer to the IDENTIKEY Authentication Server Administrator Reference.
IDENTIKEY Authentication Server performs a number of checks before proceeding to local authentication.
To allow users to authenticate with user names in different formats, IDENTIKEY Authentication Server identifies
DIGIPASS user accounts via user ID and domain. User ID and domain resolution is processed differently, depending
on the data store IDENTIKEY Authentication Server uses; for illustrations of each process, refer to Image 27: Name
resolution with ODBC database, Image 28: Name resolution with ODBC database and Active Directory back end,
and Image 29: Name resolution with Active Directory storage.
Table 2: User name resolution in IDENTIKEY Authentication Server provides an overview of the user name res-
olution features; for a description of each user name resolution method and DIGIPASS user account identification,
refer to:
Image 28: Name resolution with ODBC database and Active Directory back end
When DIGIPASS user accounts correspond to Windows user accounts, the Windows User Name Resolution feature
can be used to support these login formats. Windows User Name Resolution should be used where IDENTIKEY
Authentication Server is installed on a Windows machine which is a member server of the Windows domain. Win-
dows User Name Resolution is always used with Active Directory as the data store.
With an ODBC database as the data store, using Windows User Name Resolution is optional. However, if the Win-
dows User Name Resolution process is enabled and fails, the login is rejected. Therefore, a login with a user ID
that does not correspond to a Windows user account will be rejected. A special case in this context are logins
where the user name does not contain a domain. In this case, Windows User Name Resolution is skipped, and the
default domain is used for this login attempt. For more information about default domains, see 3.5.1.5. Default
Domain
With Windows User Name Resolution enabled, Windows resolves the NT4-style and UPN user ID formats to the
SAM account name and the FQDN. You can enable Windows User Name Resolution in the back-end server settings
in IDENTIKEY Authentication Server Administration Web Interface.
n NT4- style domain qualification in front of the SAM account name: DOMAIN\userid
(This login format requires the creation of an alternative domain suffix in the Administration Web Interface.
For more information about domain suffixes, refer to 3.5.1.4. Alternative UPN Suffixes)
n User Principal Name (UPN) e.g. userid@domain
n UPN with domain suffix - e.g. [email protected].
(This login format requires the creation of an alternative domain suffix in the Administration Web Interface.
For more information about domain suffixes, refer to 3.5.1.4. Alternative UPN Suffixes)
When DIGIPASS user accounts correspond to Windows user accounts, the Active Directory User Name Resolution
feature can be used to support these login formats. This feature is a platform-independent alternative to Windows
User Name Resolution for Active Directory users; it may be used where the machine on which IDENTIKEY Authentic-
ation Server is installed is either not a member server of the Windows domain, or running a Linux operating sys-
tem.
UPN and SAM account name will be translated for Active Directory users. The following prerequisites for using this
feature apply:
If the user@domain format is used for the user ID, IDENTIKEY Authentication Server will look for a domain
record with the name given after the @. If the domain is found, the @domain part will be stripped from the user
ID before the authentication process continues.
If a domain is not found, the user ID will be left as user@domain, and no domain will be identified. In that case,
the Default Domain processing will be used, as described in 3.5.1.5. Default Domain.
This is an alternative to Windows User Name translation on Windows and is also supported on Linux. Alternative
UPN suffixes are not supported on IDENTIKEY Authentication Server configurations that use Active Directory as stor-
age.
n The default domain can be configured in the policy record. In this case, the default domain will be used
when no domain has been identified.
n When the policy has no default domain set, the Master Domain will be used.
IDENTIKEY Authentication Server can use specific Windows Groups for authentication when all users are Windows
accounts. This Windows Group Check feature is optional, and might be useful in the following scenarios:
n DIGIPASS is deployed in stages. Users are not required to log in using a DIGIPASS until they are put into a
Windows group. Users can be placed into the group in manageable stages.
n Two-factor authentication is needed only for access to sensitive data, and access is granted to a specific
group of users (eg. administrators). This group of users will require DIGIPASS, and will be authenticated by
IDENTIKEY Authentication Server. Other users will be authenticated by another authentication method.
n Most users will have DIGIPASS and be permitted to log in to the system, but some users should not be
authenticated under any circumstances.
n Authentication is needed for the live Audit Viewer connection to IDENTIKEY Authentication Server (i.e.
when using Active Directory as the data store). The Group Check can be used to limit which users are
allowed to connect, for example, to the Domain Admins group.
Nested Groups
IDENTIKEY Authentication Server supports nested groups for Windows Group Check in the context of Active Dir-
ectory. For more information on nested groups, refer to the Microsoft documentation.
Warning
Enabling Nested Groups may cause performance issues in IDENTIKEY Authentication Server, due to:
When Windows Group Check is active, users who are in one of the defined groups go through the full authen-
tication process. However, there are a few Group Check Modes that control the outcome for users who are not in
one of the groups. The Group Check Mode is defined in the policy.
One or more Windows Groups must be defined in the Windows Group List in the relevant policy. The list items can
be searched and edited , groups can be added and removed as required. Group membership is checked within the
user's own domain only; these groups must exist in each domain where there are users who need to be included
in a group.
Note
When Windows Group Check is used, the login will fail if the group check fails. This will occur for a user who is
unknown to Windows.
In effect, this means that such users do not need DIGIPASS user accounts, and they do not need to use a DIGIPASS
to log on. As soon as the group check indicates that the user is not to be handled, IDENTIKEY Authentication Server
stops authentication processing stops and returns a not handled result.
Pass back mode is suitable for staged deployment of DIGIPASS, and for cases where only certain users need strong
(DIGIPASS) authentication.
This mode is suitable for restricting which users are permitted to log in.
In this mode, IDENTIKEY Authentication Server will only use back-end authentication for users who are not in any
defined/listed groups.
Example
If RADIUS back-end authentication is used, the job of authenticating users not in the defined/listed groups is del-
egated to the RADIUS server. No lookup will be carried out for the DIGIPASS user account, and no further local
authentication will be carried out.
back-end authentication will be used for the out-of-group users, even if the policy setting for back-end authen-
tication is set to None. With such a policy setting, the in-group users would be authenticated only by local authen-
tication, while the out-of-group users would be authenticated only by back-end authentication. However, it is
necessary to define the Back-End Protocol Policy setting.
This mode is suitable for staged deployment of DIGIPASS, and for cases where only certain users need strong
(DIGIPASS) authentication.
If configured, only users who are member of an accepted domain are allowed to log in. Accepted domains are
defined on the component policy (see 3.3. Identifying the Component Record). The user domain is compared to
the defined accepted domain, and if they do not match access is denied. This can be used in conjunction with the
default domain (see 3.5.1.5. Default Domain).
For more information about how domains are resolved, see 3.5.1. User ID and domain resolution.
IDENTIKEY Authentication Server verifies that a DIGIPASS user account for the user attempting to log in exists in the
data store. The user ID and domain resolution performed earlier determines the search criteria to look up the
DIGIPASS user account.
If a DIGIPASS user account is found, the account status is verified (see 3.5.6. Verify DIGIPASS User Account Status).
If no DIGIPASS user account is found, then policy settings will determine whether IDENTIKEY Authentication Server
continues processing the authentication request or rejects it:
n If local authentication is required, a DIGIPASS user account must exist. It is only possible to proceed if the
Dynamic User Registration feature is enabled (see 3.5.5. Dynamic User Registration).
n If local authentication is not required, authentication processing can proceed without a DIGIPASS user
account.
If the Local Authentication Policy setting is None, local authentication is not required. If it is set to DIGIPASS/Pass-
word during Grace Period, DIGIPASS or Password, or Digipass Only, local authentication is required.
Dynamic User Registration (DUR) allows to create a DIGIPASS user account automatically when the user credentials
are validated using back-end authentication. The correct static password is sufficient to permit a DIGIPASS user
account to be created. DUR saves the administrative work of manually creating or importing DIGIPASS user
accounts.
n Auto-Assignment, where IDENTIKEY Authentication Server will select a random DIGIPASS authenticator and
assign it to the new DIGIPASS user account as it is created, or
n Self-Assignment, which will allow the new user to assign a DIGIPASS to their account as part of their login
process.
Note
When maker–checker authorization is enabled, assigning a DIGIPASS authenticator requires the approval of a
checker administrator. In that case, Auto-Assignment is not available.
For more information about DIGIPASS assignment features, see 11. DIGIPASS.
In order to control the creation of new accounts, DUR can be used with the following features:
n Windows Name Resolution (mandatory for Active Directory)- this will prevent more than one DIGIPASS user
account being created for the same Windows user account, when they use different user ID formats to log
in.
n Windows Group Check , so that a staged creation of DIGIPASS user accounts and assignment of
DIGIPASS authenticator is achieved.
A typical DUR process using Auto-Assignment and Windows Group Check is illustrated below.
IDENTIKEY Authentication Server verifies the status of the DIGIPASS user account found for the user attempting to
log in.
2. If the DIGIPASS user account has expired because a specified expiration date has passed, the authen-
tication request is rejected.
3. If the DIGIPASS user account has been suspended due to inactivity, the authentication request is rejected.
IDENTIKEY Authentication Server can be configured to force a DIGIPASS user account to be suspended if it
is not used for a specified amount of time. The number of days that a DIGIPASS user account can remain
unused before being suspended can be configured in the policy used to log in. This value will be checked
and the number of days since the last login will be calculated. If the DIGIPASS user account has been
unused for too long, login will be denied.
4. If the DIGIPASS user account is locked, IDENTIKEY Authentication Server verifies whether a user auto-
unlock attempt is possible (see 10.5. DIGIPASS User Account Auto-Unlock).
If any unlock retries are left and the calculated lock duration since the last authentication request has
elapsed, IDENTIKEY Authentication Server assumes a possible user auto-unlock attempt and allows the
authentication request.
Local authentication is a term used to describe the IDENTIKEY Authentication Server authenticating a user based
on information in its data store. Typically the DIGIPASS one-time password is required, but in other cases a static
password may be sufficient.
The Local Authentication Policy setting indicates whether to perform local authentication, and if so, whether a
static password is permitted. This setting is overridden by the same setting in the DIGIPASS user account, unless
that has the value Default. However, this setting in the DIGIPASS user account would typically be used only for rare
special case users.
Note
The Local Authentication policy setting is relevant in the context of software DIGIPASS provisioning. For more
information, see 5. Software DIGIPASS Provisioning.
Using the Windows Group Check in Back-End mode, this setting can be overridden. If a user is not in the list of
groups, no local authentication will be performed.
The possible values for the local authentication setting are as follows:
Default
Local authentication is handled as configured in settings inherited from the parent policy. For more inform-
ation about policies, refer to 13. Policies.
None
No local authentication will take place.
DIGIPASS or Password
This authentication mode allows users to permanently use their static password or their
DIGIPASS authenticator, even after the grace period has expired and/or they have previously already used
their authenticator for authentication. In the context of the authentication scenario, use of this authentication
mode is subject to licensing. For provisioning, this authentication mode is license-free.
DIGIPASS Only
A DIGIPASS one-time password must be verified. Users without DIGIPASS will not be able to log in. However,
Self-Assignment is still possible, as an OTP is used as part of the process.
Note
It is also possible to configure user-specific policy settings local authentication. These settings will override those
set by the parent policy. For more information, refer to 13.2. User-Specific Authentication Policy Overrides.
The first step of local authentication is to search for DIGIPASS records applicable to the login. Normally, this is a
simple search for all DIGIPASS assigned to the DIGIPASS user account. However, there are exceptions:
Application Names
This refer to a list of named applications. Only DIGIPASS that have one or more of the named applications will
be usable.
Application Type
This can be either Response-Only, Challenge/Response or Multi-Mode. If application Type is set to Response-
Only or Challenge/Response, only DIGIPASS with that application type will be usable. With Multi-Mode, all
application types will match.
DIGIPASS Type
This is a list of models, such as DPGO3, DIGIPASS 260. Only DIGIPASS from the listed models will be
usable. For a more extensive list of DIGIPASS models, refer to 2.3.1. Hardware DIGIPASS authenticator.
Therefore, it is possible that a DIGIPASS user account that has a DIGIPASS assigned will not be able to use that
DIGIPASS to log in, when a certain policy applies. Such a user will be regarded as without a DIGIPASS in that case.
In a different kind of login, a different policy may apply, with no restrictions. In that case, the same user would be
regarded as with a DIGIPASS.
Example
A company has GO 3 DIGIPASS (DPGO3) and Primary Virtual Mobile Authenticator (DPVTL). The Outlook Web
Access login permits both, so its policy does not restrict DIGIPASS Types. However the RADIUS VPN login requires
the Go 3, so its policy specifies DIGIPASS Type = DPGO3.
When an authenticating DIGIPASS user account is linked to another, the search for DIGIPASS will be done for the
other account.
Note
The linked DIGIPASS user account feature supports Response-Only and Challenge/Response authentication,
Authentication Signature, Push Notification Authentication, and Push Notification Transaction Data Signing.
Example
DIGIPASS user account 2 is linked to DIGIPASS user account 1. The DIGIPASS is assigned to DIGIPASS user account
1. When DIGIPASS user account 1 logs in, the DIGIPASS search is for that account. When DIGIPASS user account 2
logs in however, the DIGIPASS search is for DIGIPASS user account 1.
When the DIGIPASS lookup returns at least one DIGIPASS record, authentication processing requires a valid one-
time password to succeed, unless:
In some cases a new Server PIN may need to be set. A user's Server PIN can be reset either manually by an
IDENTIKEY Authentication Server administrator, or in the course of assigning a DIGIPASS authenticator. When using
the DIGIPASS Self-Assignment or Auto-Assignment feature of IDENTIKEY Authentication Server, the user can reset
their Server PIN. When the Assignment Mode is set to Self-Assignment-Pin-Reset or Auto-Assignment-Pin-Reset,
the user's Server PIN is automatically reset. This is an optional feature and does not require any administrator
action, once the option has been enabled in the DIGIPASS properties and/or the relevant policy settings have been
set accordingly.
Server PIN run-time information is provided through the Administration Web Interface by selecting a specific
DIGIPASS record (see Table 3: Server Settings Regulating Server PINs).
Server PIN States
The following diagram illustrates the different Server PIN states and which user/administrator actions result in each
one:
When a server is in the PIN SET CHANGE FORCED state, its corresponding user is forced to change PINs upon login.
Once the user changes the PIN (user action <PIN><OTP><NewPIN><NewPIN>), the server state changes to PIN
SET.
For more information on other user and administrator actions that affect Server PIN states, refer to Section 11.3.
DIGIPASS Record Functions.
The grace period does not apply when the Local Authentication mode in a policy is set to Digipass Only. When local
authentication in the relevant policy is set to DIGIPASS/Password during Grace Period, the user can authenticate
with their static password until the grace period has expired; after that they can only authenticate with their
DIGIPASS authenticator. When local authentication is set to DIGIPASS or Password, users can choose to use either
their static password or their DIGIPASS authenticator, even if they have already used their DIGIPASS authenticator,
independent of grace period restrictions.
The grace period can be set during manual administrative assignment of DIGIPASS records as well as during Auto-
Assignment. The grace period does not apply to Self- Assignment , because the user must use the
DIGIPASS authenticator to complete the Self-Assignment process.
Example
The company has set up policies which require a Response-Only login via the local area network, and a Chal-
lenge/Response login via the internet; limited to certain employees. The local authentication mode is set to
DIGIPASS/Password during Grace Period.
Jane has two DIGIPASS authenticators assigned to her – a DIGIPASS 300 with the Challenge/Response applic-
ation enabled, and a DIGIPASS GO 3 with a Response-Only application. The DIGIPASS authenticators are both
assigned to her on Tuesday. Jane receives her DIGIPASS GO 3 on Friday, and immediately uses an OTP to login.
The grace period for her DIGIPASS GO 3 authenticator ends at that time – as of now she must use the DIGIPASS
GO 3 when logging into the intranet from the LAN.
Over the weekend, Jane needs to access the company intranet from home. Because a Challenge/Response
login is required via the internet and she does not yet have her DIGIPASS 300 authenticator, she uses only her
user ID and static password to log in. As she is still within the grace period for her DIGIPASS 300, the login is valid.
During the grace period, if OTP validation fails, the static password is checked. For more information on the static
password check during an authentication attempt, see Section 3.7. Back-End Authentication If the static password
is valid, local authentication succeeds. However, the overall login can still fail if back-end authentication is
enabled.
The password is compared against the DIGIPASS user account's password value. However, if the DIGIPASS user
account does not have a password set, the password has to be verified with back-end authentication. With back-
end authentication disabled and without a password in the DIGIPASS user account, grace period password logins
will not work.
If the passwords do not match and back-end authenticationis enabled, the password will be verified with back-
end authentication.
2-Step Challenge/Response
n This mode can be used for Web authentication, where Challenge/Response is supported. In this mode,
the authentication process takes place in two steps.
First, the user requests a challenge to be generated for them. The following policy settings define how this request
should be made:
n Request Method
n Request Keyword.
The challenge is generated specifically for their DIGIPASS and in accordance to the specified settings. For more
information about these settings, refer to 3.6.2.9. Request Method and Keyword.
Assuming that the request for the challenge is accepted and a challenge is returned, the user submits a second
step login with the response to the challenge as their OTP. This second step goes through the whole authen-
tication process again to verify the response.
1-Step Challenge/Response
This mode is also possible for Web authentication, where Challenge/Response is supported. In this mode, the user
sees only one logon step. This mode is suitable for time-based Challenge/Response, but is less secure for non-
time-based Challenge/Response. If an attacker manages to capture some valid responses, they can repeatedly
request new challenges until one they know comes up again.
In this mode, a random challenge is requested automatically by the Web application and presented to the user on
the login page. A general-purpose challenge is generated, without reference to any particular DIGIPASS' pro-
gramming. The user logs in with their response to the challenge as their OTP.
upon the Get Secure Challenge and Get Signing Request commands, and is bound to the
DIGIPASS authenticator selected for the relevant transaction. The client application then generates either a QR
code or a color QR code, which represents this request message, and delivers it to the end user, who scans this
image, using a DIGIPASS authenticator that is compliant with the Secure Channel feature. The
DIGIPASS authenticator generates a response for this request message which the end user enters into the client
application; IDENTIKEY Authentication Server validates this response and returns the result to the client application
which completes the signature authentication process.
For a typical user authentication process via Push Notification, the user initiates the authentication process by
providing their user ID/domain and a keyword, and enter their static password. The following policy settings spe-
cify how this request should be defined:
n Request Method
n Request Keyword
After receiving the corresponding request from the application server, IDENTIKEY Authentication Server generates
the required push notification message, and communicates this to the Message Delivery Component (MDC). The
MDC sends the Push Notification request to the OneSpan Notification Gateway. The Mobile Authenticator retrieves
the push notification details from DIGIPASS Gateway and requests the user to confirm if they wish to log on to the
specified client application. When the user confirms this and accepts the push–notification-based authentication,
the Mobile Authenticator authenticates against IDENTIKEY Authentication Server via the DIGIPASS Gateway.
IDENTIKEY Authentication Server processes this request, and in case of success returns the authentication to the cli-
ent application; the user is informed via the client application that their authentication has succeeded.
For more information on this feature, refer to the DIGIPASS Push Notification - Getting Started Guide. For more
information on the DIGIPASS Gateway, refer to the DIGIPASS Gateway product documentation; for more information
on the Mobile Authenticator, refer to the Mobile Authenticator and Mobile Authenticator Studio product doc-
umentation.
First, the user requests an OTP to be generated and delivered to them. The following policy settings define how
this request should be made:
n Request Method
n Request Keyword
n Delivery method (SMS, Email, and/or Voice)
The OTP is then sent to the user's mobile phone number or email address recorded in the DIGIPASS user account.
For more information about Request Method and Request Keyword settings, refer to 3.6.2.9. Request Method and
Keyword.
Backup Virtual Mobile Authenticator have additional available restrictions on usage, to minimize the cost of usage.
These are verified before an OTP will be generated. The restrictions are described in 11. DIGIPASS.
Assuming that the request for the OTP is accepted and an OTP is generated and delivered successfully, the user
submits a second step login with the OTP. This second step goes through the whole authentication process again
to verify the OTP.
2-step Login
Two login prompts are used to provide an easy-to-use login interface for users with Virtual Mobile Authentic-
ator. The first prompt is used to request an OTP, and the second is for entering the received OTP. This can be
used with applications which support 2-step logins eg. Citrix Web Interface, RADIUS with support for Chal-
lenge/Response
For more information on the OTP Request Site, refer to the IDENTIKEY Authentication Server Websites Admin-
istrator Guide.
Note
If password is set for the Request Method, and a user's DIGIPASS is still within the grace period, IDENTIKEY
Authentication Server may process the authentication with the password only and not as a 2- Step Chal-
lenge/Response or Virtual Mobile Authenticator login.
The static password in the request method is compared against the DIGIPASS user account's password value.
However, if the DIGIPASS user account does not have a password set, the password has to be verified with back-
end authentication. If there is no back-end authentication and no password in the DIGIPASS user account, the
request methods that use a password will not work.
If the passwords do not match and back-end authentication is enabled, the password will be verified with back-
end authentication.
The methods of requesting these three login processes can be the same. When it recognizes a request, the
IDENTIKEY Authentication Server will verify that there is a DIGIPASS capable of that login process. If there is not, it
will ignore the request.
For example, say that the request methods for Primary and Backup Virtual Mobile Authenticator are both defined
as keyword otp. A user has a Go 3 with Backup Virtual Mobile Authenticator enabled. When they login with the
keyword otp , the IDENTIKEY Authentication Server will produce a Backup Virtual Mobile Authenticator OTP,
because the user does not have a Primary Virtual Mobile Authenticator.
The following diagram illustrates an example of how DIGIPASS authenticators and applications can be assigned.
You can configure whether to allow the use of multiple DIGIPASS applications per user. By default, this setting is
enabled.
Note
As of version 3.7, IDENTIKEY Authentication Server also supports the DIGIPASS Multi-Device Licensing and Activ-
ation model.
One DIGIPASS license allows to instantiate several DIGIPASS instances bound to the same DIGIPASS license.
DIGIPASS instances are not different from DIGIPASS activated in the standard process with regard to the rep-
resentation of DIGIPASS applications. IDENTIKEY Authentication Server creates the DIGIPASS instance(s) for a par-
ticular license during the Multi-Device Activation process.
For more information on Multi-Device Licensing and Activation, refer to Section 2.4. DIGIPASS Licensing and Activ-
ation.
Aside from configuring whether multiple DIGIPASS applications per user is allowed, you can also restrict which
DIGIPASS Application is allowed for a specific policy. With this kind of restriction, IDENTIKEY Authentication Server
will only verify OTP against that type of DIGIPASS Application. So if a policy restricts allowed DIGIPASS Applications
to Response-Only, then IDENTIKEY Authentication Server will verify all OTP only against RO applications assigned to
a user.
When considering whether to allow multiple DIGIPASS Applications per user and/or which DIGIPASS Applications to
allow, consider the following table. This table explains how IDENTIKEY Authentication Server authenticates OTP
from each DIGIPASS user account, given the following possible scenarios:
Table 4: OTP Authentication for Scenarios Involving Multiple and Single DIGIPASS Applications
Scenario DIGIPASS user account 1 DIGIPASS user account 2 DIGIPASS user account 3
Multiple DIGIPASS Applic- OTP is authenticated against all OTP is authenticated against all OTP is authenticated against
ations allowed, no policy DIGIPASS Applications from assigned DIGIPASS Applications from assigned the DIGIPASS Application from
restrictions on DIGIPASS DIGIPASS authenticators. DIGIPASS authenticators. assigned DIGIPASS authen-
Applications. ticators.
Multiple DIGIPASS Applic- OTP is authenticated only against OTP is authenticated only against OTP is authenticated against
ations allowed, only RO application1 of both assigned application 1 of assigned application 1 of
applications allowed. DIGIPASS authenticators. DIGIPASS authenticators. assigned DIGIPASS authen-
ticators.
Single DIGIPASS Applic- IDENTIKEY Authentication Server IDENTIKEY Authentication Server OTP is authenticated against
ations allowed, no policy detects multiple DIGIPASS Applications detects multiple DIGIPASS Applications DIGIPASS Application from
restrictions on DIGIPASS assigned and immediately fails the login assigned and immediately fails the assigned DIGIPASS authen-
Applications. attempt. login attempt. ticators.
Single DIGIPASS Applic- IDENTIKEY Authentication Server IDENTIKEY Authentication Server OTP is authenticated against
ations allowed, only RO detects multiple RO DIGIPASS Applic- detects one RO assigned, and authen- DIGIPASS Application from
applications allowed. ations assigned and immediately fails ticates OTP against this application. assigned DIGIPASS authen-
the login attempt. ticators.
For information on grace periods with multiple DIGIPASS authenticators, refer to Section 3.6.2.2. Grace Period.
Both, the DIGIPASS start time and the DIGIPASS expiration time can be defined when a DIGIPASS authenticator is
assigned to a user.
If the current date and time is not within the start and expiration time of a DIGIPASS authenticator, that
DIGIPASS authenticator cannot be used for authentication.
When the DIGIPASS lookup does not return a DIGIPASS record, authentication processing requires a static password
check to succeed. In addition, Self- Assignment is possible when the DIGIPASS lookup does not return any
DIGIPASS.
Note
In this scenario, back-end authentication (if used) can still subsequently cause the overall login to fail.
However, if the DIGIPASS user account does not have a password set, the password has to be verified with back-
end authentication. If back-end authentication is disabled and there is no password in the DIGIPASS user account,
authentication without DIGIPASS cannot work. Similarly, during Dynamic User Registration (where there is no
DIGIPASS user account yet) the password has to be verified with back-end authentication.
If the passwords do not match and back-end authentication is enabled, the password will be verified with back-
end authentication.
If the Local Authentication setting is Digipass Only, static password verification on its own is not permitted. An OTP
must be used during login. This is possible using Self-Assignment.
3.6.3.2. Self-Assignment
A user can assign a DIGIPASS to their DIGIPASS user account using the Self-Assignment mechanism, when per-
mitted by the policy settings. The Assignment Mode setting must be Self-Assignment.
The Self-Assignment process is possible during Dynamic User Registration. It is also possible when the Local
Authentication setting is Digipass Only.
When using the DIGIPASS Self-Assignment or Auto-Assignment feature of IDENTIKEY Authentication Server, the
user can reset their Server PIN. When the Assignment Mode is set to Self-Assignment-Pin-Reset or Auto-Assign-
ment-Pin-Reset, the user's Server PIN is automatically reset. This is an optional feature and does not require any
administrator action, once the option has been enabled in the DIGIPASS properties and/or the relevant policy set-
tings have been set accordingly.
For a DIGIPASS that supports Response-Only the user needs to enter the following in the password login field,
depending on whether a Server PIN is needed or not:
For a DIGIPASS that supports only Challenge/Response this process requires two steps. In the first step, the static
password and serial number are given. This results in a challenge being returned. If the correct response is given
to the challenge, the self-assignment is successful.
n Step 1: SERIALNUMBERpassword
n Step 2: OTP
The SERIALNUMBER may be entered in one of two formats, depending on the Serial No. Separator Policy set-
ting:
n No separator specified – the full 10 digit serial number must be entered, with no dashes (-) or spaces; e.g.
0097123456.
n Separator value specified – the serial number can be entered as written on the back of the DIGIPASS; e.g.
9-712345-6.
User attributes are used by IDENTIKEY Authentication Server to return specific information to a Client Component.
There are two types of user attributes available in IDENTIKEY Authentication Server:
n RADIUS attributes can be returned when handling authentication requests from a RADIUS Client.
n Custom user attributes can be returned to DIGIPASS Authentication Modules, DIGIPASS Plug-Ins and cus-
tom Web applications
User attributes may be set for each DIGIPASS user individually, or to a group of DIGIPASS users. For instructions on
adding user attributes to one or more DIGIPASS user account, refer to the online help in the Administration Web
Interface.
Acceptable RADIUS attribute names for use with IDENTIKEY Authentication Server are contained in a text file. The
default dictionary file provided with IDENTIKEY Authentication Server is named radius.dct and located in either
<install_dir>\bin (Windows) or /etc/vasco/ias (Linux). It may be edited or replaced, if required, to allow more or
less RADIUS attributes to be used.
Acceptable RADIUS attribute names for use with IDENTIKEY Authentication Server can be uploaded via the Con-
figuration Tool. For more information, refer to the IDENTIKEY Authentication Server Administrator Guide.
Attribute Group
For RADIUS attributes, one or more attribute groups are specified in the policy used for the specific client.
When multiple client components require RADIUS reply attributes, the specified attribute group ensures that
only attributes required by the specific RADIUS client are sent.
Name
The name of the RADIUS attribute. This must conform to a RADIUS attribute name specified in the RADIUS dic-
tionary in use. If an attribute is to be returned multiple times in one transaction with different values, it needs
to be added to the attribute group the required number of times.
Value
The required value of the RADIUS attribute.
Attribute Group
An attribute group is specified by the client component as a parameter in the authentication request. When
multiple client components are using custom user attributes, the specified attribute group ensures that only
attributes required by the specific client are returned.
Name
A name for the attribute as expected by the client component.
Usage
n Basic indicates that the attribute is for use by DIGIPASS Authentication for IIS Basic for Basic
Authentication.
n Return indicates an SBR return attribute
n Check indicates an SBR check attribute
Value
The required value of the named attribute.
Back-end authentication describes the process of checking user credentials with another system. It is used primar-
ily for:
n Enabling automatic management features such as Dynamic User Registration and Self-Assignment
n Static password verification for users who do not have a DIGIPASS and for Virtual Mobile Authenticator
n Retrieval of RADIUS attributes from a RADIUS server
n Password replacement to allow the user to log in with just a one-time password, in an environment where
the Windows password is required (e.g. Outlook Web Access)
IDENTIKEY Authentication Server supports back-end authentication with the following systems:
n RADIUS
n Windows back-end authentication
n Microsoft Active Directory (via LDAP)
n NetIQ eDirectory (via LDAP)
n IBM Security Directory Server (via LDAP)
n Custom solution (requires SDK)
The back-end authentication setting indicates whether to perform back-end authentication, and if so, when to do
it. This setting is overridden by the same setting in the DIGIPASS user account, unless that has the value Default.
However, this setting in the DIGIPASS user account would typically be used only for rare special case users.
Using the Windows Group Check in Back-End Mode, this setting can be overridden. If a user is not in the list of
groups, back-end authentication will be performed whether it is enabled or not.
The Back-End Protocol setting indicates which type of back-end authentication should be used. The possible val-
ues for the back-end authentication setting are as follows:
None
The IDENTIKEY Authentication Server will not utilize back-end authentication.
Always
The IDENTIKEY Authentication Server will use back-end authentication for every authentication request.
This setting is required, if you want to use offline authentication for DIGIPASS Authentication for Windows
Logon.
If Needed
back-end authentication will only be used in situations where local authentication is not sufficient and to sup-
port certain features:
Note
When a static password is used it is first verified with the stored static password, if one is used. If the static pass-
word matches the stored static password, no back-end authentication is carried out.
If the static password does not match the stored static password, or the stored static password is not available,
then back-end authentication will be performed.
The DIGIPASS user account has a Stored Static Password field. When back-end authentication is used, this field
can be used to:
n Store the static password required for back-end authentication. This means that the user does not need to
type in the static password at each login; they only need enter the OTP. The IDENTIKEY Authentication
Server can retrieve the stored static password from the DIGIPASS user account and use it for back-end
authentication.
n Support password replacement. Back-end authentication is used to learn the static password so that it
can be replayed to the host system (eg. Outlook Web Access) when a successful OTP is given.
When the Stored Password Proxy setting is enabled in the policy, the IDENTIKEY Authentication Server will retrieve
the stored static password from the DIGIPASS user account. If back-end authentication is required for a login, the
stored static password will be used. If there is a host system (eg. Outlook Web Access), the stored static password
will be returned to it, for it to complete its login process.
However, if the user enters a static password in front of their OTP, the static password they enter will take pre-
cedence over the stored static password. In that case, the stored static password will not be used at all for that
login.
When the Stored Password Proxy setting is not enabled in the policy, the stored static password will not be used
for back-end authentication. If back-end authentication is required for a login, the user will have to enter the static
password. This is done in front of the OTP if an OTP is also used. Similarly, if there is a host system that requires a
static password to be returned, the user will have to enter the static password.
When the Password Autolearn setting is enabled in the policy, the IDENTIKEY Authentication Server will auto-
matically store the static password when it is verified by back-end authentication. This can happen at any time
from Dynamic User Registration onwards.
If the user's static password has changed in the back-end authentication system, they will need to provide the
new static password during their next login. This is done in front of the OTP if an OTP is used. When the IDENTIKEY
Authentication Server sees that the user has entered a static password, if it does not match the stored static pass-
word already, back-end authentication will occur to verify the new password. If it is verified, the stored static pass-
word will be updated.
A back-end server record is required when IDENTIKEY Authentication Server uses a RADIUS or LDAP server for
authentication. It is possible to create more than one back-end server record, for fail-over purposes. You can also
allocate different back-end servers for different user domains.
A back-end server record contains connection information for the system to be used. Typically, only one back-end
server record will be required for LDAP back-end authentication, whereas RADIUS back-end authentication will
require a record per RADIUS server to be used.
If the IDENTIKEY Authentication Server repeatedly fails to get a response from a back-end server, it will ignore it for
some minutes before trying it again. Therefore, a temporary slow response will not prevent the IDENTIKEY
Authentication Server from using a back-end server. But a consistent availability problem will cause it to stop using
the back-end server for a while, when it has an alternative.
When the IDENTIKEY Authentication Server has to choose a back-end server, it will search for those records in the
domain identified by the user ID and name resolution process. If any are found, it will only use those back-end serv-
ers for that domain. If none are found, it will use the back-end servers that are not assigned to a domain.
IDENTIKEY Authentication Server can pass RADIUS return attributes from the back-end server to the client. Back-
end authentication is supported with the following protocols:
n PAP
n CHAP
n MSCHAP
n MSCHAP2 with MPPE key generation
IDENTIKEY Authentication Server can be configured to query Active Directory via an LDAP connection for back-end
authentication. This is typically used where a supported Windows operating system is not available on the
IDENTIKEY Authentication Server machine.
IDENTIKEY Authentication Server also supports site awareness for Global Catalog-based Active Directory domain
controller lookup. IDENTIKEY Authentication Server queries the Global Catalog for all domain controllers serving the
user currently in process of back-end authentication and contacts the relevant domain controllers according to
their priority in the Global Catalog. In this context, IDENTIKEY Authentication Server identifies the network site to
which the machine that is running IDENTIKEY Authentication Server belongs. Those domain controllers that share
the same site with IDENTIKEY Authentication Server during back-end authentication take precedence over others.
For information on Active Directory User Name Resolution, refer to 3.5.1.2. Active Directory User Name Resolution.
1. Identify the Active Directory server based on the Active Directory Back-End entries in IDENTIKEY Authentic-
ation Server. If no Active Directory back-end entries have been defined in IDENTIKEY Authentication Server
then an attempt will be made to identify the Active Directory domain controller using the Global Catalog.
2. Bind to Active Directory using the security principal ID and password defined for the Active Directory back-
end if principal details specified. You can use the DN or sAM account name format for the Security Principal
ID.
3. Bind to Active Directory using the security principal ID and password defined for the Active Directory back-
end if principal details specified. The format for the Security Principal ID depends on whether the con-
nection is encrypted or not.
a. If this is an encrypted connection, the format of the security principal ID will be the DN; for
example,
cn=Administrator, cn=User, dc=vasco, dc=com.
b. If this is not an encrypted connection, the format of the security principal ID is either the sAM
account name, for example, administrator, or the DN, as exemplified above.
4. Search Active Directory for the attributes of the user that has to be authenticated. For ANY group that uses
back-end authentication via LDAP and Active Directory, the permission List contents must be granted in
the Active Directory Users and Computers Extension.
5. IDENTIKEY Authentication Server will bind to the directory server that handles the authentication request. It
will use the user ID and the password specified in the authentication request received by the IDENTIKEY
Authentication Server. If the bind succeeds, the user authentication is deemed to be successful. If the bind
fails, the authentication is deemed to have failed.
If authentication fails, the attributes retrieved during the search will be used to determine the cause of the failure.
Note
IDENTIKEY Authentication Server only supports SASL.Digest-MD5 binding as the client authentication mechanism
for binding with the supported back-end authentication servers.
Be aware that when using SASL.Digest-MD5 in the following circumstances, the Active Directory password must
be reset:
n when using accounts migrated from a workgroup to a domain for any of the supported Active Directory
versions
n when using accounts migrated from a Windows 2000 Active Directory domain to a domain for any of the
supported Active Directory versions
Note
When upgrading Active Directory domain controllers, the following rule must be followed:
n If a server with Windows group users is promoted to an Active Directory domain controller, you must
reset the Active Directory password for any user that existed on the server before it was promoted.
Note
For instructions on setting up a back-end server record for an Active Directory server, refer to the Administration
1. Identify the NetIQ eDirectory server based on the NetIQ eDirectory back-end server records in IDENTIKEY
Authentication Server.
2. Bind to NetIQ eDirectory using the security principal DN and password defined for the NetIQ eDirectory
back-end server record, if principal details specified.
3. Search NetIQ eDirectory for the FQDN and attributes of the user that has to be authenticated (starting from
the Base Search DN).
4. Try to authenticate with NetIQ eDirectory using a bind with the FQDN and password of the user to be
authenticated.
If authentication fails, the attributes retrieved during the search will be used to determine the cause of the failure.
After enabling back-end authentication for NetIQ eDirectory, you will need to set up a back-end server record for it
(i.e. register it as a back-end server for IDENTIKEY Authentication Server via the Administration Web Interface). For
more information, refer to the Web Administration Service Help.
Note
IDENTIKEY Authentication Server only supports SASL Digest-MD5 binding as the client authentication mechanism
for binding with the supported back-end authentication servers.
Note
For more information about setting up a back-end server record for NetIQ eDirectory, refer to the Administration
3.7.8. IBM Security Directory Server Back-End Authentication Using LDAP Protocol
1. Identify the IBM Security Directory Server server based on the IBM Security Directory Server back end
records in IDENTIKEY Authentication Server.
2. Bind to IBM Security Directory Server using the security principal DN and password defined for the IBM
Security Directory Server back end record, if principal details specified.
3. Search the IBM Security Directory Server back-end server for the user to be authenticated based on the
User Object Class Name and the User ID Attribute Name defined on setup.
4. Try to authenticate with IBM Security Directory Server using a bind with the user ID and password of the
user to be authenticated.
If authentication fails, the attributes retrieved during the search will be used to determine the cause of the failure.
Note
When registering a IBM Security Directory Server back end for IDENTIKEY Authentication Server, ensure that the
location entered in the IBM Security Directory Server back end record (in the Administration Web Interface) is the
same as that shown on the Tivoli Web Administration > View Edit > Issued To > cn=<serverid>.
Note
IDENTIKEY Authentication Server only supports Simple binding with SSL as the client authentication mechanism
for binding with the supported instances of IBM Security Directory Server.
If the Client Component requests a Host Code and the DIGIPASS is capable of generating one, then IDENTIKEY
Authentication Server will generate a Host Code and the application will display it to the user. The user generates a
Host Code on their DIGIPASS and checks that it is the same as the one on the screen.
1. The DIGIPASS device generates a one-time password, and splits it into two parts. The first part is used for
end user authentication. The second part is the Host Code and is used for server authentication.
2. The end user sends the first part to the server as proof of identity and keeps the second part secret.
3. The server verifies the one-time password for end user authentication. If valid, the end user is authen-
ticated to the server. The server then computes the second part of the one-time password, i.e. the Host
Code.
4. The server sends the Host Code to the end user, who verifies (visually) whether it matches the Host Code
generated by the DIGIPASS device.
Host Code generation is passed as a parameter in the authentication request. This parameter has two options:
n PAP
n CHAP
n MSCHAP with MPPE (Microsoft Point-to-Point Encryption)
n MSCHAP2 with MPPE
n EAP-TTLSv0/PAP
n EAP-TTLSv0/CHAP
n EAP-TTLSv0/MSCHAP
n EAP-TTLSv0/MSCHAP2
n EAP-TTLSv0/EAP-MSCHAP2
n EAP-TTLSv0/EAP-GTC
n PEAPv0/EAP-MSCHAP2
n PEAPv0/EAP-GTC
n PEAPv1/EAP-MSCHAP2
n PEAPv1/EAP-GTC
Some protocols do not support all authentication features of IDENTIKEY Authentication Server. Refer to 3.10. Lim-
itations of RADIUS Support in IDENTIKEY Authentication Server and the Login Permutations section of the IDENTIKEY
Authentication Server Administrator Reference for more information.
The following sections describe the caveats and limitations of IDENTIKEY Authentication Server in RADIUS support.
Some IDENTIKEY Authentication Server features are not supported with CHAP or MSCHAP. These protocols hash
login data together; this prevents separation of various entries.
n EAP-TTLSv0/CHAP
n EAP-TTLSv0/MSCHAP
n EAP-TTLSv0/MSCHAP2
n EAP-TTLSv0/EAP-MSCHAP2
n PEAPv0/EAP-MSCHAP2
n PEAPv1/EAP-MSCHAP2
The OneSpan User Websites, when utilized, can circumvent many of these problems by allowing users to manage
their account and DIGIPASS authenticators. Users can:
n Perform Self-Assignment
n Change their Server PIN
n Change their own Stored Static Password
A number of IDENTIKEY Authentication Server components provide international character support, and some lim-
itations apply:
Database
International character support in the database is dependent on the individual database driver. Refer to the
Encoding and Case Sensitivity topic in the IDENTIKEY Authentication Server Administrator Guide for more
information.
RADIUS
International character support in the IDENTIKEY Authentication Server using the RADIUS protocol is depend-
ent on the RADIUS Client(s) being used. If a RADIUS Client uses UTF-8 encoding, international characters will
be fully supported. If a RADIUS Client uses a localized encoding (eg. ISO-8859-13), the same locale setting
must be configured on each machine.
Web
DIGIPASS Authentication for OWA, both Forms and Basic Authentication options, limit international character
support to a single configured encoding.
DPADMINCMD
DPADMINCMD supports international characters, but your console window must be able to support the char-
acters or they will not display correctly.
In IDENTIKEY Authentication Server, the HTTP Basic Authentication mechanism does not support a 2-step login pro-
cess. In addition, Challenge/Response is also unsupported.
4. Signature Validation
IDENTIKEY Authentication Server will allow you to sign transaction data using Electronic Signatures generated via
two methods:
An Electronic Signature is based on transaction details entered into the DIGIPASS authenticator. The
DIGIPASS authenticator uses the transaction details and an embedded secret to generate and display an Electronic
Signature. With Virtual Signature Generation , the user supplies the transaction details directly to IDENTIKEY
Authentication Server, which will then generate the Electronic Signature, i.e. the virtual signature. Virtual sig-
natures are delivered to the user via the Message Delivery Component.
Once a user receives the Electronic Signature, they can then use it to sign a transaction, typically through a con-
firmation page (e.g. for finalizing a transaction). This signature will be validated by IDENTIKEY Authentication
Server; if the signature is incorrect or invalid, then the transaction will not be permitted to proceed.
If a signature is generated with a DIGIPASS authenticator, the signature validation process occurs as follows:
If signature generation is done via IDENTIKEY Authentication Server (i.e. virtual signature generation), the signature
validation process typically occurs as follows:
1. The user initiates the transaction as normal via a client program (e.g. money transfer via online banking
application). The client program then requests an Electronic Signature from the user in order to sign the
transaction.
2. At the same time, the client program submits the required transaction details to IDENTIKEY Authentication
Server, requesting a virtual signature.
3. IDENTIKEY Authentication Server then generates a virtual signature based on the transaction details sup-
plied.
4. IDENTIKEY Authentication Server delivers the virtual signature to the user via e-mail, voice, SMS, or any
supported combination thereof (depending on how Message Delivery Component is configured).
5. The user receives the virtual signature and enters it into the transaction (as requested by the client pro-
gram).
Once the transaction is signed, it can then be sent to IDENTIKEY Authentication Server for validation. The signature
validation process from this point onwards is identical for transactions signed by either normal Electronic Sig-
natures (generated via DIGIPASS) or virtual signatures (generated via IDENTIKEY Authentication Server).
As of IDENTIKEY Authentication Server 3.7, signatures can also be validated using the Secure Channel feature with
DIGIPASS authenticator compliant with this feature. Signature validation with the Secure Channel feature is used
for validating transactions such as e.g. online banking but is also used to add devices, activate DIGIPASS licenses
and instances in a Multi-Device Licensing and Activation Scenario. For more information on this, refer to Section
2.4. DIGIPASS Licensing and Activation.
1. The user logs in to the client application and enters the required transaction details.
2. After entering the transaction details, the user scans either a QR code or a color QR code, which are
provided by the client application.
3. The DIGIPASS authenticator displays the transaction signature and the user enters this in the client applic-
ation to complete the transaction.
Real-Time Signature Validation is generally used to provide security for transactions that require quick responses.
It is typically used by online banking applications.
With Real-Time Signature Validation, a user creates a transaction. The transaction normally requires a signature,
so the user enters the relevant details into their DIGIPASS. The DIGIPASS produces a signature and the user enters
this into the website, which then submits the transaction.
The transaction details and signature are verified by IDENTIKEY Authentication Server, and a status message is
returned straight to the web page the user is on. The user knows within the time it takes to process a normal trans-
action whether or not the submitted transaction has been verified.
Deferred Signature Validation is signature validation that is not performed in real-time. In typical cases that use
this validation, a user submits a transaction online with the signature generated by the DIGIPASS. The transaction
will then enter a queue to be verified. The user receives a message that the transaction has gone into a queue. A
batch job picks up the transaction and verifies it against the policies and details of the DIGIPASS. The user may not
know until minutes or hours later that the transaction has been signed and verified.
It is important in this case for the user to keep a record of the time the transaction was submitted, as this may be
important if the transaction is challenged.
A signature application may be time-based. This means that the DIGIPASS will generate a different signature for
the same input data at different times.
The signature validation procedure relies on the time on the DIGIPASS and the time on IDENTIKEY Authentication
Server being synchronized to within an acceptable tolerance. Each time a one-time password or a signature is gen-
erated, the IDENTIKEY Authentication Server records the time difference between the DIGIPASS and itself.
The time-based signature validation procedure also uses Time Steps to verify signatures. A Time Step is a setting
which specifies the number of seconds between generations of a one- time password on a DIGIPASS. The
IDENTIKEY Authentication Server will use the time step and the known difference in time between itself and the
DIGIPASS to verify signatures.
Use the Signature Time Window policy setting to set the tolerance allowable for signature verification.
Time based signatures can be real-time or deferred. If deferred time-based signatures are used, they may be re-
verified at a later date by comparing the input details against the signature produced by the DIGIPASS, as long as
the time the transaction was performed is known.
A signature application may also be event-based. This means that it contains a numeric counter that increases
every time a signature is generated.
The signature process relies on an event counter to enable each signature to be unique. The DIGIPASS and
IDENTIKEY Authentication Server need to have synchronized event counters. The tolerance for the difference
between the event counters can be set by using the Event Window policy setting.
During Real-Time Signature Validation the event counter on IDENTIKEY Authentication Server is updated with the
value used by the DIGIPASS, to keep the two event counter values synchronized.
During Deferred Time Signature Validation the event counters for transactions generated on the DIGIPASS may get
out of step with the event counter held on IDENTIKEY Authentication Server. The Event Window policy setting can
enable signed transactions to be processed in any order without causing a verification error.
These signatures are generated using neither time or event counter. They will always produce the same signature
for the same input. There is no difference between real-time and deferred time with these signatures.
Electronic Signatures are verified by IDENTIKEY Authentication Server using a number of specific checks, in the fol-
lowing sequence:
1. Component checks
2. Policy checks
3. User account lookup and checks
4. Signature validation
5. Finalization
IDENTIKEY Authentication Server will try to identify the application from which the request for registration came.
There must be a component record on the data store for that application. A client component record must exist for
the Signature Verification application and location from which it connects to the server. The component type is set
as a parameter by the application; the location is the source IP address of the SOAP address.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
IDENTIKEY Authentication Server identifies the policy to use in the signature authentication from the Client Com-
ponent record and checks the validity of the policy.
If the DIGIPASS user account is locked, IDENTIKEY Authentication Server verifies whether a user auto-
unlock attempt is possible (see 10.5. DIGIPASS User Account Auto-Unlock).
Dynamic User Registration is NOT possible. If the user account does not exist, then the check will fail.
A search is performed for a DIGIPASS that is assigned to the user that fulfils the signature policy limits. If more than
one DIGIPASS is found, the list is filtered using the serial number for the DIGIPASS. This serial number will be
passed to the signature process as a parameter.
Note
When designing a web page that will allow transactions to be signed, ensure that users with multiple DIGIPASS
can enter a serial number to identify which DIGIPASS is being used.
When the correct DIGIPASS is identified, the DIGIPASS type is checked. The DIGIPASS type must be either SG (Sig-
nature) or MM (Multi Mode) to allow signatures. The signature is then verified and a response is produced.
4.3.5. Finalization
The relevant parts of the Data Store are updated after the signature validation has been carried out successfully. A
response is produced. The audit data is updated with the transactions that took place and the result of those trans-
actions.
If the Web Application requests a confirmation code and the DIGIPASS is capable of generating one, then
IDENTIKEY Authentication Server will generate a confirmation code and the application will display it to the user.
The user generates a Confirmation Code on their DIGIPASS and checks that it is the same as the one on the screen.
Confirmation code generation is passed as a parameter in the authentication request. There are two options:
n Event Window: the allowable difference between the DIGIPASS event counter and IDENTIKEY Authentic-
ation Server event counter.
n Online Signature Level: specifies how signatures will be verified.
n Signature Time Window: Shows the acceptable difference in time between the time set on the DIGIPASS
and the time set on IDENTIKEY Authentication Server for signatures. The lowest value is 2, the highest is
500.
For more information on these settings, refer to the Policy Properties section in the Field Listings section of the
IDENTIKEY Authentication Server Administrator Reference.
Note
For signature validation processes with the Secure Channel feature, IDENTIKEY Authentication Server provides
the default policy IDENTIKEY Signature Validation with Secure Channel.
In IDENTIKEY Authentication Server, the term Provisioning refers to delivery, registration, and activation of the soft-
ware. The following sections describe each of these steps in detail.
You are free to deliver the software to your customers in any way you choose. You can either deliver software to
users, or allow them to download the software from a secure site. An Activation Code is required to activate the
software DIGIPASS authenticator or authenticators such as DP110. This code may be delivered via two methods:
Online Delivery
With this method, the activation code is delivered directly to the application that is going to use it. If the activation
code is delivered in this way, the user will never see it. This option is available for DIGIPASS for Web, DP110, Mobile
Authenticator Studio, and the Mobile Authenticator.
Offline Delivery
With offline delivery, available for DIGIPASS for Web and Mobile Authenticator Studio , the activation code is
delivered via a mechanism such as email, text message, or fax.
In DIGIPASS for Web the activation code will typically be delivered in an email containing a link. The applet reads
the activation code from the link.
The DIGIPASS records must be imported from a *.dpx file before registration can occur.
Each software DIGIPASS user requires a DIGIPASS user account on IDENTIKEY Authentication Server. The user
accounts can either be imported into IDENTIKEY Authentication Server, created individually, or created dynamically
during registration if Dynamic User Registration is available.
For software DIGIPASS to work, a DIGIPASS record needs to be allocated to the user account. This can be done in
two ways:
Each software DIGIPASS needs to be activated before it can be used. This means that IDENTIKEY Authentication
Server is informed that all the components are in place for the software DIGIPASS and you are ready to use it.
The DIGIPASS start time defines a particular date and time when an activated (software) DIGIPASS authenticator
can effectively be used for authentication. If defined in the effective policy, the start time can be automatically cal-
culated based on a delayed activation period when assigning/registering the DIGIPASS authenticator to a user.
Although the software DIGIPASS authenticator has already been activated, IDENTIKEY Authentication Server will not
allow it to be used for authentication, until the start time has been reached. This is called delayed activation.
If defined in the effective policy, two separate notification messages are sent to the respective user to indicate
delayed activation:
a. The activation delayed notification is sent when the DIGIPASS authenticator is assigned/registered to the
user.
b. The activation completed notification is sent when the start time has been reached, i.e. when the
DIGIPASS authenticator can effectively be used.
The notification messages are sent using Message Delivery Component (MDC) and handled independently of each
other: if defined, either both, none, or either one is sent.
There are two required components and one optional component required to implement provisioning:
Back-End System
The back-end system can be used by IDENTIKEY Authentication Server for Dynamic User Registration and/or static
password verification. For more information, refer to 3.7. Back-End Authentication.
The user authentication method during a software DIGIPASS provisioning process depends on two factors: the local
authentication method set in the relevant policy, as well as on whether the user already has an activated DIGIPASS
authenticator.
The possible local authentication settings and their implications on the provisioning process are:
n If Local Authentication is set to DIGIPASS/ Password during Grace Period, the user must use their static
password when activating their first DIGIPASS authenticator. Upon successful completion of the DIGIPASS
activation the grace period ends, and any future provisioning operations will require the user to authen-
ticate with a one-time password.
n If Local Authentication is set to DIGIPASS or Password, the user must use their static password when activ-
ating their first DIGIPASS authenticator. After this, the user can authenticate with their static password or
their DIGIPASS authenticator during any future provisioning operations.
Warning
If the local authentication method is DIGIPASS Only, a user who is activating their first DIGIPASS authenticator will
be unable to complete the activation because they are not allowed to authenticate with their static password.
For more information about local authentication methods, see 3.6. Local Authentication.
The following scenarios show how provisioning will work for different DIGIPASS authenticators in different situ-
ations.
The user authentication method during the provisioning process may vary depending on the local authentication
policy setting, and on whether the user already has an activated DIGIPASS authenticator. For more information,
see 5.1.6. User Authentication during Provisioning.
In a scenario involving Mobile Authenticator Studio, activation codes are encrypted with pre-loaded static pass-
words.
Pre-Conditions
n The user account has been created on IDENTIKEY Authentication Server
n The user knows their static password (in case of first-time software DIGIPASS provisioning)
n The static password has been imported into IDENTIKEY Authentication Server
n The provisioning policy has been defined with the following settings
n Local authentication (DIGIPASS/Password during Grace Period or DIGIPASS or Password)
n No back-end authentication (None)
n DIGIPASS type is the appropriate type for the version of Mobile Authenticator Studio being used.
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
5.1.6. User Authentication during Provisioning.
There is a choice of activation options for Mobile Authenticator Studio 4.x DIGIPASS provisioning, and the choice of
activation option affects how the Mobile Authenticator Studio authenticator is provisioned:
If a bind is required, the administrator has to manually bind the device using the Administration Web Interface or
the Active Directory Users and Computers Extension.
The entire mobile phone, with activated Mobile Authenticator Studio application is then distributed to the user.
download the Mobile Authenticator Studio package. The registration identifier and activation password are then
displayed on the provisioning Web site. The user must then download the Mobile Authenticator Studio package,
and enter the registration identifier and activation password into the Mobile Authenticator Studio application on the
phone.
When the user has entered the registration identifier and activation password, the mobile phone sends a request
to the provisioning Web site for the activation data. The provisioning Web site sends the activation data back to the
mobile phone, which will then automatically activate the Mobile Authenticator Studio application. After this, if a
bind is required, the Mobile Authenticator Studio application will request the bind data and will bind DIGIPASS.
The user then receives a response on the mobile device indicating whether the activation has been successful.
The DSAPP protocol can be used for activation, providing it has been enabled on IDENTIKEY Authentication Server.
If the DSAPP protocol is to be used, the user has to enter a user ID, domain and password into the
DSAPP registration page of the provisioning Web site. The provisioning Web site verifies with IDENTIKEY Authentic-
ation Server that the user is valid and then assigns a Mobile Authenticator Studio DIGIPASS and sends an SMS with
the URL to be used to download the Mobile Authenticator Studio package. The registration identifier and activation
password are then displayed on the provisioning Web site. The user must then download the Mobile Authenticator
Studio package, and enter the registration identifier and activation password into the Mobile Authenticator Studio
application on the phone.
When the user has entered the registration identifier and activation password, the mobile phone sends a request
to the provisioning Web site for the activation data. The provisioning Web site sends the activation data back to the
mobile phone, which will then automatically activate the Mobile Authenticator Studio application. After this, if a
bind is required, the Mobile Authenticator Studio application will request the bind data and will bind DIGIPASS.
The user then receives a response on the mobile device indicating whether the activation has been successful.
This section describes the post-deployment DIGIPASS provisioning using the Multi-Device Licensing and Activation
feature of IDENTIKEY Authentication Server. For more information on Multi-Device Licensing and Activation, refer to
Section 2.4. DIGIPASS Licensing and Activation.
Note
A DIGIPASS authenticator compliant with Multi-Device Licensing is required to perform Multi-Device Activation, for
During the provisioning procedures as described below a DIGIPASS instance is loaded into a DIGIPASS device.
These procedures are executed each time a new DIGIPASS instance needs to be loaded into a DIGIPASS device.
n The user account has not been created on IDENTIKEY Authentication Server
n The user knows their static password (in case of first-time software DIGIPASS provisioning)
n The provisioning policy has been defined with the following settings:
n Local Authentication (DIGIPASS/Password during Grace Period or DIGIPASS or Password)
n Back-end Authentication (Always or If Needed)
n Back-end Protocol (Windows, RADIUS, LDAP Back-End Authentication, or custom name)
n Dynamic User Registration is enabled
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
5.1.6. User Authentication during Provisioning.
The first step in the provisioning procedure is to register with the system to start the post-deployment provisioning
of a new DIGIPASS device.
1. Start a provisioning registration operation to provide the user credentials to IDENTIKEY Authentication
Server.
2. IDENTIKEY Authentication Server checks that a user account is available, validates the user credentials,
and queries for DIGIPASS licenses assigned to your user. The system then generates Activation Message 1
and includes it in the response envelope.
3. The client application provides Activation Message 1 in form of an image - scan this image with the
DIGIPASS authenticator that supports the Multi-Device Licensing model.
4. The DIGIPASS device generates and displays a device code.
Note
If no DIGIPASS license is assigned to the user, IDENTIKEY Authentication Server checks if Auto-Assignment has
been set in the policy used, and will search a random available DIGIPASS license which it assigns to the end user.
When Auto-Assignment has not been enabled in the policy, the provisioning operation fails.
When IDENTIKEY Authentication Server queries for DIGIPASS licenses assigned to the user but there are no activ-
ations left for this particular DIGIPASS license, the system will return an error message explaining that the activ-
ation threshold for this license has been reached.
After you have registered a DIGIPASS license, the second step in the Multi-Device Activation process is to register a
device.
1. The client application starts a provisioning DIGIPASS authenticator registration operation and provides the
end user's registration identifier and the device code to IDENTIKEY Authentication Server.
2. The server retrieves the registration context (e.g. the DIGIPASS serial number used in the previous step),
validates the device code, and generates a new DIGIPASS instance using the DIGIPASS license.
3. The server then generates Activation Message 2 for the DIGIPASS license and includes it in the response
envelope.
4. The client application provides Activation Message 2 in form of an image - scan this image with the
DIGIPASS authenticator that supports the Multi-Device Licensing model.
5. The DIGIPASS authenticator generates and displays a signature.
After registering the device, the end user activates a new DIGIPASS instance. Based on Activation Message 2, a sig-
nature generated with the DIGIPASS instance is validated. With this, the new DIGIPASS instance is activated.
5.2.2.1. Banking Scenario: Self-Provisioning and Administrating of DIGIPASS Authenticators in Multi-Device Activ-
ation
This section describes DIGIPASS self-provisioning and administrating in a banking context using the Multi-Device
Licensing and Activation feature of IDENTIKEY Authentication Server, with compliant DIGIPASS authenticators. This
includes generation and administration of an activation letter for the end user who then activates a new DIGIPASS.
Note
If no DIGIPASS license is available for assignment, the provisioning operation fails, and the client application noti-
fies the end user to contact their bank.
Also, for this operation to succeed, the policy specified in the client record in IDENTIKEY Authentication Server for
the client application must allow Auto-Assignment.
Alternatively, the user administrator can also initiate sending activation letter to end users by connecting to the cli-
ent application, entering the IDENTIKEY Authentication Server credentials, and uploading a .dpx file to the client
application. The system creates a DIGIPASS record to process all .dpx files. The user administrator also uploads a
user .csv file that aligns the DIGIPASS licenses with the user IDs for assignment. The system then generates Activ-
ation Message 1 and returns it to the client application which generates a color QR code on the basis of this mes-
sage, and prints an end user-specific activation letter which includes the serial number of the DIGIPASS license and
the color QR code. The activation letters are sent to the end users by post.
The client application generates a color QR code that represents Activation Message 2 - the end user scans this
image with the same DIGIPASS device that was used to scan the color QR code from the activation letter. With this,
the DIGIPASS device creates a new DIGIPASS instance based on Activation Message 2, and displays an activation
signature to be entered into the client application by the end user. The system validates the activation signature,
returns the result to the client application which displays this result to the end user who then disconnects from the
client application.
There are three scenarios that can be employed when activating DIGIPASS for Web, and each one has different
pre-conditions. Which scenario is employed will depend on how IDENTIKEY Authentication Server is implemented.
5.2.3.1. Scenario 1: Activation Codes are Encrypted with Pre-Loaded Static Passwords
Pre-Conditions
n The user account has been created on IDENTIKEY Authentication Server
n The user knows their static password
n The static password has been imported into IDENTIKEY Authentication Server
n The provisioning policy has been defined with the following settings:
n No local authentication (None)
n No back-end authentication (None)
Process
The user enters their user ID, email address and PIN on the website. If registration is successful, the DIGIPASS for
Web is provided with the serial number of the DIGIPASS that is to be activated and an encrypted activation code.
Note
In this case, the PIN is not sent to the server; rather, it is used locally by the DIGIPASS for Web applet.
The user will have to re-enter their user ID, PIN and password to decrypt the activation code and complete activ-
ation. The applet decrypts the activation code, activates itself and sends a one-time password to the server.
The user then receives a response indicating whether the activation has been successful.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
Pre-Conditions
n The user account has been created on IDENTIKEY Authentication Server
n The user knows their static password
n The static password has been imported into IDENTIKEY Authentication Server
n The provisioning policy has been defined with the following settings:
n Local authentication (Digipass Only or DIGIPASS/Password during Grace Period)
n No authentication (None)
Process
The user enters their user ID, email address, static password and PIN on the registration website. If registration is
successful, the serial number of the DIGIPASS that is to be activated and an activation code are delivered to the
DIGIPASS for Web applet.
The user re-enters the user ID and PIN. DIGIPASS for Web generates a one-time password and then submits this
with the serial number to the server. Activation then takes place.
The user will then receive a response indicating whether the activation has been successful.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
Pre-Conditions
n The user account has not been created on IDENTIKEY Authentication Server
n The user knows their static password for their account in the back-end system
n The provisioning policy has been defined with the following settings:
n Local authentication ( Digipass Only or DIGIPASS/Password during Grace Period)
n Back-end authentication (Always or If Needed)
n Back-end protocol (Windows, RADIUS, LDAP Back-End authentication, or custom name)
n Dynamic User Registration enabled
Process
The procedure for this scenario is very similar to that of 5.2.3.2. Scenario 2: Pre-Loaded User Accounts and Static
Passwords; the difference for the IDENTIKEY Authentication Server is that the back-end system is used to verify the
user ID and password. If both are OK, the account is created automatically in IDENTIKEY Authentication Server.
Both scenario 2 and 3 are identical from the user's perspective.
Options
To make sure that the user changes their static password, extra fields can be added to the second page in this
scenario. Fields can be added to the input page so that the user can enter a new static password, and then enter it
again for confirmation. The user needs to do this so that the original password can only be used once, for activ-
ation. The new password can be used for re-activation.
The DIGIPASS 110 is a hardware/software combination DIGIPASS. It does not require any software to be installed
on the client-side to enable it to run, but it does require the correct policy settings to be provided, followed by activ-
ation.
There are two scenarios that can be employed when activating a DIGIPASS 110. They both have different pre-con-
ditions. Which scenario is used will depend on how IDENTIKEY Authentication Server is implemented.
Pre-Conditions
n The user account has been created
n The user knows their historical secret
n Historical Secret imported in IDENTIKEY Authentication Server (as static password)
n The provisioning policy has been defined with the following settings:
n Local authentication
n No back-end authentication
n DIGIPASS type is DIGIPASS 110
Process
The user opens the browser on their computer, and goes to the registration page of the DIGIPASS 110 provisioning
website. The DIGIPASS 110 provisioning website generates a challenge which will be used to encrypt the new
Server PIN. The user enters their user ID, static password, new Server PIN, confirmation of new Server PIN, and
DIGIPASS 110 serial number on the registration website. The DIGIPASS 110 Applet generates a Challenge Encrypted
Static Password (CESPR) using the generated challenge and the new Server PIN.
On the server-side, the CESPR is verified. If verification is successful the DIGIPASS 110 is assigned to the user, and
the initial PIN is set. The DIGIPASS grace period is set according to pre-defined parameters. The activation page is
returned if the provisioning is successful, or an error message will be returned if the provisioning is not successful.
Pre-Conditions
n The user account has NOT been created
n The user knows historical secret to allow authentication by a legacy back-end system
n The provisioning policy has been defined with the following settings:
n NO local authentication (None)
n Back-end authentication (Always)
n DIGIPASS type is DIGIPASS 110
Process
The user enters their user ID, static password, challenge, CESPR, and DIGIPASS 110 serial number on the regis-
tration website. On the server-side, the user is authenticated on the back end. If the back-end authentication is
successful the user is then registered to using Dynamic User Registration. The DIGIPASS 110 is then assigned to
the user, and the initial PIN is set. The DIGIPASS grace period is set according to pre-defined parameters.
A response will be received indicating whether the activation has been successful.
Identify Component
IDENTIKEY Authentication Server will try to identify the application from which the request for registration
came. A client component record must exist for the provisioning application and location from which it con-
nects to the server. The component type is set as a parameter by the application; the location is the source IP
address of the SOAP request.
Note
A client component with an IP address range (IPv4 CIDR notation) as component location will be used to handle
requests from any client within that IP address range. If two (or more) matching client components with over-
lapping IP address ranges are found, the client component with the smaller IP address range (more specific)
takes precedence and will be used to serve the request.
Identify Policy
IDENTIKEY Authentication Server identifies the policy to use in the registration from the client component
record and checks the validity of the policy. The following settings of the policy will not be used as they are
not relevant to provisioning.
n Ensure that the user account and domain have been defined
If the DIGIPASS user account is locked, IDENTIKEY Authentication Server verifies whether a user auto-
unlock attempt is possible (see 10.5. DIGIPASS User Account Auto-Unlock).
Local Authentication
A static password or one-time password must be entered. For more information about local authentication
options and their implications on the user authentication process during software DIGIPASS provisioning, see
5.1.6. User Authentication during Provisioning
If back-end authentication is enabled, then the back-end system will verify the static password. If the pass-
word is verified but there is no user account in IDENTIKEY Authentication Server, an account will be created.
Dynamic User Registration must be enabled for this to succeed.
Note
User authentication during software DIGIPASS provisioning may vary depending on the local authentication policy
settings, and on whether the user already has an activated DIGIPASS authenticator. For more information, see
Back-End Authentication
Back-end authentication is an optional step in software DIGIPASS registration. If enabled, the static password
will be authenticated by the back-end system. If the back-end system does not verify the credentials, regis-
tration will fail.
DIGIPASS Assignment
The registration process will perform the following steps:
n Search for an applicable DIGIPASS according to the criteria on the policy associated with the user account
that is capable of activation.
n If no DIGIPASS authenticator was found, the first applicable and available DIGIPASS record is assigned to
the user account.
The activation code is generated using the first capable application in the DIGIPASS. The activation code may
be encrypted with the user's password if the password was not verified by local and back-end authentication.
If defined in the effective policy, the DIGIPASS start time is calculated and set based on the delayed activation
period. If defined, notifications are scheduled to be sent to the respective user when (a) the delayed activ-
ation begins and (b) the DIGIPASS start time has been reached and the DIGIPASS authenticator becomes act-
ive.
Finalization
In the finalization step the created users and assignment are confirmed to the data store. Records are written
to the audit system to record the actions that have taken place, and the results. A response is sent to the user
to confirm registration or to show an error message if activation failed.
Note
For information specific to the registration process in the Multi-Device Licensing and Activation Mode, refer
to Section 5.2.2. Multi-Device Activation .
The following diagram summarizes the activation process for Software DIGIPASS:
Identify component, policy and DIGIPASS user account lookup and checks
The activation process performs the same Identify Policy and DIGIPASS user account lookup and checks as
the registration process, except that the user account must already exist.
Activation
The DIGIPASS is set to ACTIVE in the data store and the grace period will end, if one was set.The grace period
automatically expires the first time an OTP is used to log in, i.e. after the OTP has been successfully validated
(if it has not been set manually to expire prior to that in the relevant policy).
Finalization
In the Finalization step the activation is confirmed to the data store. Records are written to the audit system
to record the actions that have taken place, and the results. A response is sent to the user to confirm activ-
ation or show an error message if activation failed.
Note
For information specific to the registration process in the Multi-Device Licensing and Activation Mode, refer
From time to time software DIGIPASS will have to be reactivated. This may occur rarely for Mobile Authenticator Stu-
dio, such as when the user buys a new mobile phone, or it may occur more often for DIGIPASS for Web, such as
when the user clears the cookies in their browser.
Reactivation is carried out in the same way as the original activation, but the user account will already exist with a
capable DIGIPASS assigned. The registration process will use the assigned DIGIPASS to generate the activation
code.
The following limits can be enabled via IDENTIKEY Authentication Server Configuration Utility:
n Activation Limit: limits the number of activations that can be performed on one Software DIGIPASS.
n Minimum Interval: sets the minimum time interval between reactivations.
n Maximum Locations: sets the maximum number of locations a from which a Software DIGIPASS can be
activated, such as home, office, laptop. This only applies to DIGIPASS for Web.
Note
The activation limits apply to all activation attempts. If an activation fails in the second stage this will still count
as an activation, and will count against the activation limits.
n User ID
n Password
n one-time password generated by a DIGIPASS authenticator
n Server PIN
The credentials used by DIGIPASS Authentication for Windows Logon are either validated directly by IDENTIKEY
Authentication Server (online authentication) or using offline authentication data generated by IDENTIKEY Authentic-
ation Server (offline authentication). Whether DIGIPASS Authentication for Windows Logon performs an online or an
offline authentication depends on the availability of the IDENTIKEY Authentication Server instance and is com-
pletely transparent to the user.
The DIGIPASS Authentication for Windows Logon consists of a client software package, which is installed on the cli-
ent computer, and server-side functionality, which is part of IDENTIKEY Authentication Server. DIGIPASS Authentic-
ation for Windows Logon requires a valid license to enable it on IDENTIKEY Authentication Server.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
Online authentication occurs when a user authenticates to Microsoft Windows using DIGIPASS Authentication for
Windows Logon while the client computer is connected to the network and can establish a connection to
IDENTIKEY Authentication Server. Authentication is performed using IDENTIKEY Authentication Server in real time.
The user ID, password (optional), and one-time password (OTP) are sent to IDENTIKEY Authentication Server to be
verified. If the OTP credentials are valid, DIGIPASS Authentication for Windows Logon receives the static Windows
user password from IDENTIKEY Authentication Server and uses it to authenticate to Microsoft Windows.
If offline authentication is enabled, IDENTIKEY Authentication Server also sends (encrypted) offline authentication
data to DIGIPASS Authentication for Windows Logon. Offline authentication data is used for offline authentication
when no connection to IDENTIKEY Authentication Server can be established.
DIGIPASS Authentication for Windows Logon and IDENTIKEY Authentication Server communicate via SOAP using
HTTPS.
Offline authentication occurs when a user authenticates to Microsoft Windows using DIGIPASS Authentication for
Windows Logon while the client computer is not connected to the network or cannot establish a connection to
IDENTIKEY Authentication Server. Authentication is performed using (locally stored and encrypted) offline authen-
tication data.
The offline authentication data is generated by IDENTIKEY Authentication Server during successful online authen-
tication. Offline authentication data is either limited to a specific time span (time-based) or a number of authen-
tications (event-based), thus requiring the client to perform online authentication regularly.
Offline authentication needs to be enabled via the IDENTIKEY Authentication Server configuration.
The user ID, password (optional), and one-time password (OTP) are authenticated using the offline authentication
data. The authentication result is then sent back to DIGIPASS Authentication for Windows Logon on the client com-
puter. The offline authentication data can be used a limited number of times, and that limit can be configured
using the Administration Web Interface.
n Offline authentication data is available for the user. Offline authentication data is generated after a suc-
cessful online authentication when offline authentication is enabled in the relevant DIGIPASS Authentic-
ation for Windows Logon client component policy.
n This offline authentication data is still valid. Offline authentication data is valid for a limited time for time-
based data, or a limited number of logons for event-based data. The time or event limit is defined in the
relevant DIGIPASS Authentication for Windows Logon client component policy.
Note
Although a user can have more than one DIGIPASS authenticator assigned, only the first one ever used with
DIGIPASS Authentication for Windows Logon has offline authentication data assigned. If the user attempts an off-
line authentication using another DIGIPASS authenticator with no offline authentication data assigned, DIGIPASS
Authentication for Windows Logon will display an authentication error.
If you need to switch offline authentication data support to another DIGIPASS authenticator, reset the offline
authentication data for the currently used DIGIPASS authenticator in the Administration Web Interface and per-
form an online authentication using the other DIGIPASS authenticator immediately afterward.
Note
It is also possible to configure user-specific policy settings for offline authentication. These settings will override
those set by the parent policy. For more information, refer to 13.2. User-Specific Authentication Policy Overrides.
n Disabling offline authentication for a user means that IDENTIKEY Authentication Server will not send any
new encrypted offline logon data to the client computer.
n Disabling offline authentication for a user means that the user will still be able to use offline authen-
tication from the time that it is disabled until the encrypted offline logon data expires OR until the user per-
forms the next online authentication.
You can enforce static password verification during offline authentication via DIGIPASS Authentication for Windows
Logon, by disabling Stored Password Proxy and setting Back-End Authentication to Always.
A user may be forced to log on either online or offline using OTP by configuring DIGIPASS Authentication for Win-
dows Logon accordingly. For more information, refer to the DIGIPASS Authentication for Windows Logon User
Guide, Section "Enforcing DIGIPASS authentication".
6.3.4. Backup Offline Authentication for DIGIPASS Authentication for Windows Logon
You can use Primary Virtual Mobile Authenticator as a backup solution for DIGIPASS Authentication for Windows
Logon offline authentication. This extends the OTP delivery features of Message Delivery Component to DIGIPASS
Authentication for Windows Logon.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center, and the SEAL protocol used for com-
munication with IDENTIKEY Authentication Server must be SSL enabled in the Message Delivery Component Con-
figuration Utility.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
Backup offline authentication is intended as a temporary backup login solution. If offline authentication is enabled
in the used IDENTIKEY Authentication Server policy, IDENTIKEY Authentication Server sends encrypted offline
authentication data (for offline authentication with the primary DIGIPASS authenticator) and backup offline
authentication data (for backup offline authentication with Primary Virtual Mobile Authenticator) to the DIGIPASS
Authentication for Windows Logon client during successful online authentication; during backup offline authen-
tication, the DIGIPASS Authentication for Windows Logon client verifies OTPs against the backup offline authen-
tication data.
Backup offline authentication requires that users have assigned both a DIGIPASS authenticator for online and off-
line authentication, and Primary Virtual Mobile Authenticator for backup offline authentication. To generate
(backup) offline authentication data, users must successfully complete at least one online authentication pro-
cedure using DIGIPASS Authentication for Windows Logon.
Warning
Backup offline authentication will not work with Backup Virtual Mobile Authenticator.
Dynamic Component Registration (DCR) is used by DIGIPASS Authentication for Windows Logon 1.x to register a
component for use when logging on to Microsoft Windows using a one-time password (OTP). DIGIPASS Authentic-
ation for Windows Logon requires a client component to be registered for a user at the IP address used. DCR
checks to see if a client component for that IP address exists for a user, and if not it creates one.
Note
Dynamic Component Registration (DCR) is only supported for DIGIPASS Authentication for Windows Logon 1.x.
n Client machine hostname: If a DNS-based reverse lookup of an IP address is being used with the DNS suf-
fix not set on the client machine.
n Fully qualified domain name (FQDN): If a DNS-based reverse lookup of an IP address is being used with
the DNS suffix set.
Using Windows Group Check, IDENTIKEY Authentication Server can test for Microsoft Windows groups of client com-
puters on a network. These groups can be used to define which computers on a network can use DIGIPASS
Authentication for Windows Logon, thus allowing a gradual and controlled implementation.
For more information about Dynamic Component Registration, refer to the DIGIPASS Authentication for Windows
Logon Product Guide.
DIGIPASS Authentication for Windows Logon can be configured to provide password randomization. With password
randomization, the Windows logon password is generated in the background, with a randomized password format-
ted according to strict formatting rules.
With password randomization, the user logs on by entering only the user ID, OTP, and (optionally) a Server PIN,
with the password generated in the background. Using password randomization prevents a user from logging on
to Windows using a client computer which does not have DIGIPASS Authentication for Windows Logon installed.
After a successful authentication towards the IDENTIKEY Authentication Server, password randomization replaces
the static password used to authenticate the Windows client to the Windows domain with a randomly-generated
static password. This randomly-generated password is no longer known to the user, thereby forcing the user to
use DIGIPASS OTP authentication.
Note
For Active Directory deployments with password randomization enabled, a new random password will be gen-
erated again once Active Directory indicates that the password is about to expire.
The randomly-generated password remains constant in the IDENTIKEY Authentication Server user account record,
and a corresponding attribute is added to trace randomization status.
Note
If the Password Randomization feature of IDENTIKEY Authentication Server is used, the policy used in IDENTIKEY
Authentication Server must not apply password proxying for the changeBackendPassword SOAP com-
mand because this would lead to a user with a randomized password being able to change their password.
Password Synchronization Manager (PSM) is a product that is installed on the domain controller which allows a
change of the Windows password to be automatically updated on IDENTIKEY Authentication Server. The new Win-
dows password will be reflected as the static password on IDENTIKEY Authentication Server.
When the Windows password is changed, it is updated on the domain controller. PSM checks for the availability of
IDENTIKEY Authentication Server before sending the new password to IDENTIKEY Authentication Server so that the
data store can be updated.
If the user is not defined on IDENTIKEY Authentication Server, only the password on the domain controller will be
changed.
For more information, refer to the Password Synchronization Manager User Guide.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), you need to secure the
communication between Password Synchronization Manager and IDENTIKEY Authentication Server via SSL to be
GDPR-compliant. Each IDENTIKEY Authentication Server configuration can be updated to use encrypted com-
munication via the Use SSL option in the password filter configuration of the PSM Remote Configuration
Manager.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
7. EMV-CAP
EMV-CAP is the Chip Authentication Program (CAP) developed by credit card leaders Europay, Mastercard, and Visa
(EMV). OneSpan provides a range of smart card readers, which are EMV-CAP–compliant.
A Hardware Security Module is highly recommended for use with EMV-CAP smart card readers (see 8.2. Licensing
and Configuration).
The EMV-CAP scenario must be enabled in the configuration of each IDENTIKEY Authentication Server before EMV-
CAP functionality is available. For more information, refer to the Configuration Utility Help or the IDENTIKEY
Authentication Server Administrator Reference, Section "Configuration".
7.3. Licensing
These licensing options must be included for each IDENTIKEY Authentication Server:
n HSM
n EMV-CAP
The following standard features of IDENTIKEY Authentication Server are not supported with EMV-CAP:
n Auto-Assignment
n Self-Assignment
Whenever Primary Account Number (PAN) fields are displayed on the Administration Web Interface or the Con-
figuration Utility, they will be masked. Certain administrators will have an additional administrative permission
which will enable them to see PANs in clear text.
PANs will be stored as encrypted numbers on the data store. When the numbers are displayed they are decrypted
and then masked.
7.6. EMV-CAP modes
IDENTIKEY Authentication Server supports three EMV-CAP–compliant DIGIPASS applications, or modes. All modes
provide a secure code as output, but differ in the type of input data:
IDENTIKEY Authentication Server supports the following Hardware Security Module models:
The Thales nShield Connect and Thales nShield Solo HSMs are supported with IDENTIKEY Authentication Server run-
ning on a 64-bit (x86_64) version of Red Hat Enterprise Linux 6. For more information about using either HSM, see
8.9. Thales nShield HSM.
If you plan to integrate IDENTIKEY Authentication Server with a supported Hardware Security Module, this HSM
must be installed and functioning correctly prior to IDENTIKEY Authentication Server installation.
To use HSMs, all instances of IDENTIKEY Authentication Server involved must be licensed for Hardware Security
Modules.
Connection and encryption settings for IDENTIKEY Authentication Server to use with the Hardware Security Module
(s) are configured during installation.
To use either a SafeNet or Thales nShield Hardware Security Module with IDENTIKEY Authentication Server, the
appropriate VACMAN Controller HSM module must be installed. OneSpan provides the corresponding modules
required by both supported HSM brands.
For information about installing the appropriate VACMAN Controller HSM module, refer to the IDENTIKEY Authentic-
ation Server Administrator Guide, Chapter "Hardware Security Module (HSM)".
The HSM module for SafeNet ProtectServer is also referred to as functionality module (FM) as it serves as a third-
party module extending functionality in the HSM.
The HSM module for Thales nShield is also referred to as SEE Module. For more information, see 8.9.3. SEE Mod-
ule.
In the course of upgrading IDENTIKEY Authentication Server, it is possible to migrate from an SSM to an HSM install-
ation, and to migrate encrypted keys to the HSM. The Configuration Wizard will display the HSM Migration page
with options to select if an HSM is to be used and to specify the HSM type. If migration of the HSM is selected, the
pages to configure the HSM library and keys will be displayed. Once the connection to the HSM library is estab-
lished, the keys can be configured in IDENTIKEY Authentication Server. To effectively migrate to HSM, start rotation
from SSM to HSM keys in the IDENTIKEY Authentication Server Administration Web Interface. Only when the rota-
tion is finished, will the migration from SSM to HSM be completed.
For more information, refer to the IDENTIKEY Authentication Server Installation Guide for Linux or Installation Guide
for Windows (as applicable), Section "Configuring IDENTIKEY Authentication Server (Upgrade)".
Note
Migrating to an HSM installation is only possible if an SSM has been configured, and if the storage used is an
ODBC storage.
When using HSMs with IDENTIKEY Authentication Server, certain standard features are not supported and certain
limitations apply.
n OATH-based authenticators
n Offline Data Generation (for Windows Logon)
n Active Directory Storage
n CHAP
n MSCHAP
n MSCHAP2
IDENTIKEY Authentication Server provides load-balancing and failover between Hardware Security Module slots.
When the VASCO IDENTIKEY Authentication Server service or daemon is started, IDENTIKEY Authentication Server
will automatically create a Session Pool for use in accessing each HSM. HSM slots with an attribute matching the
IDENTIKEY Authentication Server configuration setting slotSelectionAttribute will be added to the Session Pool – up
to the value of the slotsExpected configuration setting.
When IDENTIKEY Authentication Server needs to access data protected by the HSM(s), it takes a random session
from the pool. Where multiple HSMs are available, this spreads the load across all slots.
If a session does not receive a response from a slot, the HSM is blacklisted and slots on the other HSM(s) will be
used, where available.
When using Thales nShield HSMs, load-balancing and failover are managed by the hardserver. For more inform-
ation, refer to 8.9. Thales nShield HSM
IDENTIKEY Authentication Server will stop and re-initialize all HSMs in the Session Pool when:
A Hardware Security Module can be used to protect and manage your high-value cryptographic keys. HSMs provide
stronger authentication for server applications. For more information on Hardware Security Modules, refer to Sec-
tion 8. Hardware Security Module . Cryptographic keys are used to encrypt four types of data:
n Storage data
n Sensitive data
n Transport keys
n Audit data (when Secure Auditing is enabled)
Storage data cryptographic keys are used for securing DIGIPASS BLOBs. Each DIGIPASS Application for each
DIGIPASS device has its own BLOB. This BLOB contains DIGIPASS configuration and other important information
about the device.
Audit data cryptographic keys are used for encrypting audit entries when secure auditing is enabled. For more
information, refer to 23.3. Secure Auditing.
Sensitive data keys are used for all other types of data.
Transport keys are used to decrypt DIGIPASS import files (.dpx files). Such files are protected by double-DPX encryp-
tion, which provides extra security to DIGIPASS records prior to importing.
Note
If you are using a Thales nShield HSM with IDENTIKEY Authentication Server, the protection type for all Sensitive
Data Keys, Storage Data Keys, and Secure Auditing Keys must be set to module (as opposed to softcard or
token). When using the generatekey command, this is accomplished by using the protect=module
parameter.
Access to sensitive data, storage data, and audit data can be protected by the keys, which can be rotated at reg-
ular intervals, providing even greater security. To rotate the keys a job must be initiated from the Administration
Web Interface. The job can be scheduled or run immediately.
Note
When copying, migrating, or backing up encrypted database files, ensure that the encryption key (and/or the
optional password key) is also backed up. Otherwise, you will not be able to read the data, as it will be encryp-
ted.
The key rotation process involves decrypting data with an old encryption key, then re-keying the data with a new
encryption key. Rotating one sensitive data key affects all other sensitive data keys, while rotating a storage data
key affects all other storage data keys.
Cryptographic key rotation can take some time. You can schedule a key rotation to run at a convenient time, then
cancel it if not finished when system resources are needed again. If you restart the key rotation later, processed
data does not need to be re-processed.
With SafeNet HSMs, each slot contains a token. Multiple cryptographic keys can be stored in each token, as illus-
trated below:
Image 50: SafeNet Cryptographic Keys Allocated by Token Name and Slot ID
In order to set up SafeNet HSMs to work with IDENTIKEY Authentication Server, you need to set up the following
components:
Software
The following software must be installed on the HSM:
Administrator Account
The setup process requires administration privileges in at least one administration token and one user token
on the Hardware Security Module.
IDENTIKEY Authentication Servernow supports the Thales nShield Solo and Thales nShield Connect, both of which
are Thales nShield Hardware Security Modules. At present, Thales nShield hardware security modules are sup-
ported with IDENTIKEY Authentication Server running on a 64-bit (x86_64) version of Red Hat Enterprise Linux 6.
Using a Thales nShield HSM with IDENTIKEY Authentication Server will require the following:
n Security World
n SEE Module
n Hardserver
n When using a Thales nShield HSM, the EMV-CAP feature of IDENTIKEY Authentication Server is not sup-
ported.
Security World is a Thales nShield-specific term that refers to the framework that controls access to and usage of
valuable cryptographic keys. A client application must first connect to a specific HSM belonging to a Security World
in order to connect to that Security World. In turn, access control to a Security World is configured in each HSM
within that Security World.
n Thales nShieldHSMs
n Cryptographic keys: in the Security World, these keys are stored in an external file system. These keys are
all encrypted by a Security World Master Key, which is only stored in the HSM itself.
n Operator Card Set (OCS): this is a set of smart cards used to control access to Thales nShield HSM applic-
ation keys. When using an Thales nShield HSM with IDENTIKEY Authentication Server, the OCS is only
required for the initial setup of the Security World.
For information on the creation and usage of an OCS, refer to the Managing card sets and soft cards chapter in the
nShield Connect and netHSM User Guide.
For information on how to set up a Security World, refer to the Creating and managing a security world chapter of
the nShield Connect and netHSM User Guide. This guide is available in PDF format, packaged with your Thales
nShield HSM.
Note
IDENTIKEY Authentication Server supports both FIPS level 2 and FIPS level 3; however, we recommend the use of
FIPS level 3 when setting up a Security World. When configuring a Security World to use FIPS level 3 with
IDENTIKEY Authentication Server, an OCS card should be permanently inserted into each HSM integrated with
IDENTIKEY Authentication Server.
OneSpan provides a Secure Execution Engine (SEE) Module to be used with Thales nShield HSMs. The SEE Module
contains custom firmware which allows Thales nShield HSMs to load and manage keys provided and used by
VACMAN Controller.
For instructions on how to install the SEE Module , refer to the Thales nShield HSMs section of the IDENTIKEY
Authentication Server Linux Installation Guide.
8.9.4. Hardserver
The hardserver (also known as nFastServer) is a Thales nShield client daemon that mediates communication
between the HSMs inside the Security World and IDENTIKEY Authentication Server. This daemon facilitates the fol-
lowing HSM tasks:
When using supported Thales nShield HSMs with IDENTIKEY Authentication Server, the hardserver must be con-
figured to automatically:
n Connect to each Thales nShield HSM used with IDENTIKEY Authentication Server
n Load the SEE Module provided by IDENTIKEY Authentication Server into each HSM
In some cases, the server hosting the hardserver may also need to be configured to load the hardserver upon star-
tup.
For instruction on how to configure the hardserver to work with IDENTIKEY Authentication Server, refer to the
IDENTIKEY Authentication Server Linux Installation Guide.
9. Administration
This chapter provides a high-level overview of administration user accounts and all available administrative inter-
faces in IDENTIKEY Authentication Server.
n First administrator
Administrative account created during the installation of IDENTIKEY Authentication Server; has the full set
of administrative privileges of available scopes.
n Global administrator
After IDENTIKEY Authentication Server has been installed, the first administrator can assign privileges to
global administrators who are not restricted by domain, and can read and/or write data regardless of the
domain to which they belong. Global administrator accounts are created in the master domain, but the
administrative privileges assigned to them apply throughout all domains.
n Delegated administrator
Administrators created on domains other than Master. Their administration privileges only extend to their
respective domain scopes.
n Upgrade administrator
Upgrade administrators are assigned the new administrative privilege introduced with the new IDENTIKEY
Authentication Server version of the upgrade.
n Service user
Service users are a set of specific users required in the context of automated IDENTIKEY Authentication
Server administration workflows.
n Master Domain
n All Domains including Master Domain
n Single domain
n Multiple domains excluding Master Domain
n Organizational unit
IDENTIKEY Authentication Server provides a range of interfaces to make administration tasks rapid and easy. The
following interfaces are readily available from the main IDENTIKEY Authentication Server menu:
n Configuration Utility
n Maintenance Wizard
n Administration Web Interface
n Active Directory Users and Computers Extension (Active Directory only)
n MDC Configuration Utility
n User CGI Configuration
n Audit Viewer
n Tomcat Monitor
n Tcl Command-Line Administration
The best administration interface to use in any particular situation will depend on the tasks required, and the data
store used by IDENTIKEY Authentication Server.
System Administration
The main tools you will use for system administration are:
n Configuration Utility
n Audit Viewer
n Maintenance Wizard
With an ODBC database data store (including the embedded MariaDB database), the Administration Web Interface
will be the main interface for most administrative functions. With an Active Directory data store, the Active Dir-
ectory Users and Computers Extension is used for managing DIGIPASS user account and DIGIPASS records, with
other tasks largely administered via the Active Directory Users and Computers Extension.
The following table outlines the different administrative tasks available for both interfaces, depending on the data
store used.
Table 8: Active Directory Users and Computers Extension vs Administration Web Interface
Data Store Active Directory Users and Computers Extension Administration Web Interface
ODBC N/A DIGIPASS users
DIGIPASS
Policies
Clients
Back-End Servers
Organization
Reports
Systems
Active Directory DIGIPASS users Policies
Clients
DIGIPASS Back-End Servers
Reports
Systems
The Administration Web Interface is a web-based administration tool used for managing IDENTIKEY Authentication
Server. It can be opened in a browser window with an IDENTIKEY Authentication Server administrator user ID and
password. Click any of its top-level tabs to view and edit data, configure system settings, run reports, and more.
Note
Only Administrators should have access to the Administration Web Interface.
The homepage of the Administration Web Interface provides quick links to managing the DIGIPASS and user set-
tings, and provides information on the IDENTIKEY Authentication Server status. This information also includes the
time, date, and location (i.e. the IP address) of the last successful administrative log-on of the administrator cur-
rently logged in.
If IDENTIKEY Authentication Server uses an ODBC database—including the embedded MariaDB database—
as its data store, the Administration Web Interface can be used for a number of different administration tasks.
Note
DIGIPASS instances that have been generated from a DIGIPASS license cannot be assigned to or unassigned from
the user. For more information about DIGIPASS instances and licenses and the Multi-Device Licensing and Multi-
Device Activation features of IDENTIKEY Authentication Server, see 2.4. DIGIPASS Licensing and Activation.
n Policy records (new policy records can also be created using a wizard)
n Client records
n Back-end server records; the Administration Web Interface can also be used to configure general back-
end authentication settings
n Domains or organizational units
In addition, the Administration Web Interface can also be used to perform the following major administrative
tasks:
n Run existing reports and to create new reports (see 14. Reporting).
n From the Servers tab, you can manage various scheduled tasks including cryptographic data rotation,
migrate data after an IDENTIKEY Authentication Server upgrade, and manage and list administrative ses-
sions.
n The System tab allows you to administer the system. From here, you can add or remove IDENTIKEY
Authentication Server instances, administer the license, and configure the IDENTIKEY Authentication
Server.
The Active Directory Users and Computers Extension allows administration of DIGIPASS user account and records
within the Active Directory Users and Computers interface.
Note
The Active Directory Users and Computers Extension is only available where Active Directory is utilized as the
data store.
The extension adds context menu options, user property sheet tabs and a property sheet for the DIGIPASS records,
as outlined in the following sections.
Connection
No logon screen is presented by the extension; an implicit logon to Active Directory will be carried out using
your current Windows user context. It will connect to the same domain controller as the Active Directory Users
and Computers connection.
The extension will make its own LDAP connection to Active Directory. Administration does not take place via
the IDENTIKEY Authentication Server. Your administrative permissions will depend on the permissions that
your Active Directory user account has within Active Directory.
The Active Directory Users and Computers Extension adds OneSpan-specific context menu options on the following
containers in the tree pane:
The Active Directory Users and Computers Extension also adds the following tabs to the property sheet of a user
record:
n DIGIPASS user account tab: contains extra information about the DIGIPASS user account required by
IDENTIKEY Authentication Server. This includes settings such as authentication policy overrides, and the
date and time that a DIGIPASS user account was created.
n DIGIPASS Assignment tab contains information on all DIGIPASS assigned to the DIGIPASS user. These
DIGIPASS can be administered from this tab, including unassignment or enabling Backup Virtual Mobile
Authenticator. DIGIPASS may also be assigned to the DIGIPASS user from this tab.
n Provisioning tab contains features related to the distribution and special administration of software
DIGIPASS and DIGIPASS 110.
DIGIPASS information may be viewed via the property sheet of its assigned user, or by turning on Advanced
Features. Provided that you have the required permissions, enabling Advanced Features will allow you to see
DIGIPASS records wherever they are located in Active Directory (typically in the DIGIPASS-Pool container if unas-
signed), view properties and use a number of context menu actions.
The context menu of the DIGIPASS record contains options for bulk management. The property sheet for the
DIGIPASS record shows full details of the DIGIPASS and all its Applications and enables all administration tasks for
the record.
Tcl Command- Line Administration allows interactive command- line and scripted administration of DIGIPASS
related data. It has a number of possible uses:
It is an extension of the Tcl scripting language, and administrators will require a basic competence in Tcl in order to
use the command-line utility.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that the
dpadmincmd.xml configuration file must be configured to enable the SSL parameter.
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
DPADMINCMD
This is a command-line program that can be used interactively or called from within a batch file, script or
other program. This provides a command shell based on the Tcl interpreter.
Tcl Runtime
The IDENTIKEY Authentication Server installation program also installs the Tcl runtime environment, which is
necessary to run DPADMINCMD.
Tip
Windows command-line functions may be run from within the Tcl Command-Line Administration. A new Win-
dows command-line console may also be opened.
IDENTIKEY Authentication Server uses a local XML text file for various configuration settings. This can be admin-
istered using a graphical user interface, referred to as Configuration Utility.
Note
Some settings within the IDENTIKEY Authentication Server XML configuration file can also be changed via the
Administration Web Interface.
Start > Programs > VASCO > IDENTIKEY Authentication Server > IAS Configuration Utility
To run the Configuration Utility on Linux, open a terminal window and run ikconfigutilgui.
Note
You need root privileges to run the Configuration Utility. Running the Configuration Utility without root privileges
will fail with a "Permission denied" message.
Whenever you use the Configuration Utility to change any settings, IDENTIKEY Authentication Server needs to be
restarted before the new settings take effect. The Configuration Utility will perform the restart when you exit.
Warning
The Configuration Utility of IDENTIKEY Authentication Server contains settings relevant to the GDPR.
For more information on a GDPR-compliant setup of IDENTIKEY Authentication Server, refer to the IDENTIKEY
Authentication Server General Data Protection Regulation Compliance Guide.
For more information on these setting groups, refer to the IDENTIKEY Authentication Server Configuration Settings
section of the IDENTIKEY Authentication Server Administrator Reference.
Installation Wizard
The Configuration Wizard runs in the Installation Wizard mode when launched during the installation or
upgrade process. When the IDENTIKEY Authentication Server Setup Utility finishes installing all the necessary
components, it will display the Select Components screen. If you want to configure IDENTIKEY Authentication
Server immediately (recommended), click Run Installation Wizard to launch the Installation Wizard .
The Installation Wizard configures all the necessary settings to get the IDENTIKEY Authentication Server oper-
ational as easily and as intuitively as possible. The Configuration Wizard uses this mode if the IDENTIKEY
Authentication Server configuration file (identikeyconfig.xml) does not exist or is not valid for the current ver-
sion (as during an upgrade).
Maintenance Wizard
If the IDENTIKEY Authentication Server configuration file is present and valid for the current version, the Con-
figuration Wizard will run in the Maintenance Wizard mode.
This mode allows you to perform a couple of maintenance tasks that are not available in the day-to-day
administration tools:
For more information about the particular tasks, refer to the IDENTIKEY Authentication Server Administrator Guide,
Section "IDENTIKEY Authentication Server Configuration".
Audit Viewer
Use the Audit Viewer to view Audit Messages. Audit messages consist of warnings and errors generated by
IDENTIKEY Authentication Server.
n The list of IDENTIKEY Authentication Server instances which may be administered from the Administration
Web Interface
n SSL certificates for the Administration Web Interface and OneSpan User Websites
n The selection which product is configured: the Administration Web Interface, User Self-Management Web-
site, or Virtual Mobile Authenticator OTP Request Website.
Tomcat Monitor
The Apache Tomcat Monitor can be used to view and edit Tomcat settings, including:
n logon accounts
n log paths
n Java settings
n startup and shutdown details
IDENTIKEY Authentication Server allows you to schedule selected tasks to run at specific times. Certain tasks can
be scheduled to run either immediately, or on a specified time and date. You can also schedule recurring tasks for
running reports. These can be scheduled to recur on a daily or monthly basis.
The configuration wizards in the Administration Web Interface feature a Schedule Task page. This page allows you
to define this schedule for each task and to set a task schedule as a recurring event.
For each scheduled task, you can set the required time and date; details for scheduled tasks are kept in the data
store. The tasks will run at the scheduled date and time, and audit messages are generated for the relevant start,
end, and result transactions. You can also configure your preferred notification method: IDENTIKEY Authentication
Server can send you a text message or an e-mail notification when the scheduled task is completed.
The Task Scheduling page in the Administration Web Interface lists all scheduled tasks. To view and edit sched-
uled tasks, you need the View Task administrative privilege.
In environments with multiple IDENTIKEY Authentication Server instances, administrative tasks such as user and
DIGIPASS import or reporting can be handled in two different ways, depending on the database and replication
setup of your system.
If you are using an ODBC-compliant database as the data store and commercial replication between database serv-
ers is configured, any IDENTIKEY Authentication Server instance can handle administrative tasks, with admin-
istration requests being spread between the server instances via a load balancer. No dedicated administration
server is required.
With Active Directory as the data store, and/or with IDENTIKEY Authentication Server replication enabled, you need
to set up a dedicated IDENTIKEY Authentication Server instance for administrative purposes, to reduce load on the
server instance(s) processing authentication requests.
For an overview of deployment models with multiple IDENTIKEY Authentication Server instances, refer to the
IDENTIKEY Authentication Server Performance and Deployment Guide.
When working with custom integrations using the IDENTIKEY Authentication Server SDK, you can automate certain
administration workflows by creating automated IDENTIKEY Authentication Server services. This may be relevant if
you want to perform frequent administrative tasks on a large scale and you want to avoid creating and keeping
track of multiple active administrative sessions.
To achieve this, automated IDENTIKEY Authentication Server services require a special user for performing admin-
istrative requests, i.e. the service user. Service users do not log on interactively to components such as Admin-
istration Web Interface, but authorize each administrative operation individually via the API key generated by
IDENTIKEY Authentication Server. This API key can be provided either within the the sessionID SOAP field, or
the HTTP Authorization header.
To automate administrative tasks, you need to first create a service user and generate an API key in the Admin-
istration Web Interface.For details on the service user and API key authorization, refer to the IDENTIKEY Authentic-
ation Server Administrator Guide.
Once the service user is in place, you need to add the service user's credentials to the sessionID SOAP field for
each command, or to the HTTP Authorization header. For more information, refer to the IDENTIKEY Authentication
Server SDK Programmer's Guide for Java or the IDENTIKEY Authentication Server SDK Programmer's Guide for .NET.
User accounts can be created, managed, and searched for using the Administration Web Interface.
A DIGIPASS user account can be created using the Administration Web Interface in the following ways:
n Importing users from a file, single records or in bulk. For more information, refer to the Administration Web
Interface Help, "How To Import Users".
n Manually creating user records using Create User in the Administration Web Interface. For more inform-
ation, refer to the Administration Web Interface Help, "How To Create a User".
n Dynamically during authentication processing (if Dynamic User Registration is enabled).
n Via LDAP synchronization. User information on IDENTIKEY Authentication Server can be synchronized with
external LDAP databases by using the LDAP Synchronization Tool. For more information, refer to the LDAP
Synchronization Tool Guide.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that LDAP Syn-
chronization Tool is used to synchronize user information from any LDAP data store with any IDENTIKEY
Authentication Server data store. To be GDPR-compliant, the following requirements must be met:
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection
Regulation Compliance Guide.
10.1.1. Creating a DIGIPASS User Account Using Dynamic User Registration (DUR)
When IDENTIKEY Authentication Server receives an authentication request for a user without a DIGIPASS user
account, it can check the credentials with the back-end server (e.g. Windows ). If back-end authentication is suc-
cessful, IDENTIKEY Authentication Server can create a DIGIPASS user account automatically for the user. This pro-
cess is called Dynamic User Registration (DUR) and can be enabled via policy.
DUR is commonly used together with Auto-Assignment; with this combination, new accounts are immediately
assigned to a DIGIPASS. For more information about Auto-Assignment, see 11.2.2. Auto-Assignment.
By default, DUR user information synchronization is disabled. To enable and configure it, you need to change
the applicable policy accordingly.
To avoid this:
n if the underlying user accounts are Windows user accounts, enable Windows Name Resolution in the Con-
figuration Utility. For more information, refer to the IDENTIKEY Authentication Server Administrator Guide,
Section "Domains and Organizational Units". This is highly recommended.
n Alternatively, you can also configure the IDENTIKEY Authentication Server to convert all user IDs and
domains to upper or lower case. For more information, refer to the IDENTIKEY Authentication Server Admin-
istrator Guide, Section "Encoding and Case-Sensitivity".
LDAP user synchronization supports automatic creation and updating of user accounts on the IDENTIKEY Appliance
from records stored on one or more LDAP servers. Synchronization needs to be configured in the Configuration
Tool, by defining a synchronization profile for your specific LDAP server(s).
If Stored Password Proxy is enabled, any changes to a user's password on a back-end system need to be com-
municated to the IDENTIKEY Authentication Server. This can be done using Password Autolearn.
If Password Autolearn is enabled, a user may directly log in with their new static password in front of their OTP. If it
does not match the static password stored by the IDENTIKEY Authentication Server, it can be verified with the
back-end authenticator. If correct, the IDENTIKEY Authentication Server will store the new static password for
future use and authenticate the user. For more information, refer to 3.7.3. Password Autolearn.
You can customize password strength rules to enhance password security. These rules control the required format-
ting of passwords. Password strength rules are configurable in the policy associated with the IDENTIKEY Authentic-
ation Server component. The password strength rules can be configured via the User tab in the Administration Web
Interface policy administration page. Different password complexity rules can be applied for administrators and
users.
n Administrators. IDENTIKEY Authentication Server supports password complexity rules through the server
policy. There is a client component entry per server in the database, which has a policy assigned. The
effective policy values for password complexity rules are applied for administrator users.
n Users. When applying password complexity rules to users (i.e. no administrative privileges assigned), only
the values defined in the base policy of the server policy are applied, instead of the effective settings.
By default, password complexity rules are only defined in the base policy, i.e. a default installation of IDENTIKEY
Authentication Server will have to be adapted accordingly.
Note
The user password strength rules for administrative programs or clients that will connect to IDENTIKEY Authentic-
ation Server are defined in the server policy. Password policies only apply to static passwords when they need to
be created or updated. They do not apply to the passwords used by the following:
n First administrator
n SSL certificates
n Security configuration for the initial SNMPv3 user
Note
IDENTIKEY Authentication Server supports Unicode in passwords, however support of characters can be
limited by the back-end server, should one have been configured to be used in the respective context.
For more information, refer to the IDENTIKEY Authentication Server Administrator Reference, Section "Policy Prop-
erties" .
The default password strength rules will be applied to the first administrator password. The default password
strength rules are:
Password strength rules are NOT enforced for users in Active Directory installations.
For back-end authentication with ODBC, the password policy of both IDENTIKEY Authentication Server and back
end should be identical. If there are multiple back ends with each one having different password policies, the
IDENTIKEY Authentication Server should be either less strict or just as strict as the least strict password policy
among all the back ends.
Another factor contributing to password strength is the expiration of the static password as this ensures that end
users change their static password at adequate intervals. In IDENTIKEY Authentication Server the end user's local
static password continuously expires at the interval that has been specified, and if the local authentication mode
DIGIPASS or Password has been selected in the effective policy. For more information about this authentication
mode, see 3.6. Local Authentication.
Note that this type of password expiration applies to the static password locally stored in IDENTIKEY Authentication
Server. If you change the local static password, it is not synchronized with the static password in a possible back-
end system. That means that if you are using back-end authentication, the local static password and the back-end
password will be different, for example, after changing the local password via the Administration Web Interface.
Note
You should not use local static password expiration when using back-end authentication, but rely on the back-
end system to enforce password expiration (see 10.3.4. Static Password Expiration (Back-End Password)).
If Days to Notify before Expiration has been set in the effective policy, the user will receive a notification in
IDENTIKEY Authentication Server and/or OneSpan User Websites that the static password is about to expire with
the exact expiration date indicated.
Web Administration Service allows users to set their passwords when they are notified and have the respective
administrative privileges (Set User Password).
Usually you can configure your back-end passwords to expire to force users to change their back-end passwords
regularly. This is preferred to using local password expiration (see 10.3.3. Static Password Expiration (Local Pass-
word)).
If you configure your static back-end passwords to expire after a certain time, you can allow users who log on to
the Administration Web Interface to change their password right from the login page. This means that whenever a
user attempts to log on to the Administration Web Interface and the back-end password has expired or has been
set to be changed at next logon, the user is automatically redirected to a change password page.
In order to set a new back-end password, the user needs to authenticate first using either the current back-end
password or a one-time password (OTP) generated by an authenticator assigned to the user. In the former case,
the user is automatically logged on after successfully setting a new back-end password; in the latter case, the
user is redirected to the login page again.
Changing expired back-end passwords at the login page requires the following:
n If you have enabled Stored Password Proxy in the policy to use the stored password for back-end authen-
tication, you must enable Password Autolearn as well. Otherwise, the stored password and the effective
back-end password will differ after changing an expired back-end password and logon will no longer
work.
Administration of data in an ODBC database is performed through IDENTIKEY Authentication Server to control the
administrator's access to data.
The domain and organizational unit in which the administrator account is located will determine their range of
administration access:
n If the account belongs to an organizational unit, the administrator will be able to administer user accounts
and DIGIPASS records belonging to that organizational unit.
n If the account does not belong to an organizational unit, the administrator will be able to administer all
DIGIPASS records and user accounts in the domain to which they belong.
n If the account belongs to the Master Domain, the administrator may be able to administer all DIGIPASS
records and user accounts in the database. This depends on the Access Data in All Domains privilege,
which is only available to administrators in the Master Domain.
For ODBC deployments, you can configure a user's Administration Privileges via the Administration Web Interface.
For Active Directory deployments, you can configure Administration privileges via the Active Directory Users and
Computers Extension .
Administrators may also be limited to assigning only privileges which they possess themselves .
For more information, refer to the IDENTIKEY Authentication Server Administration Privileges section of the
IDENTIKEY Authentication Server Administrator Reference.
For security purposes, user IDs with administration privileges may be restricted from performing certain non-admin-
istrative tasks, such as authentication or signing transactions. These restrictions can be configured on the Users
section in the Policy tab of the Administration Web Interface.
n Allow the user ID to continue into the non-administrative transaction, where the usual rules will then apply
to determine success or failure
n Prevent the User ID from progressing to any non-administrative processing.
These restrictions protect user IDs with administration privileges from being locked out due to too many failed
authentications.
Warning
If the privileges of an administrator are changed while that administrator is logged in to the Administration Web
Interface, the updated privileges will not affect that administrator's current session. Rather, the updated priv-
ileges will take effect on that administrator's next login.
You can copy administrative privileges from one user to any number of users in one transaction via the Copy Admin
Privileges From wizard. This wizard makes the administrative privileges of two users identical; this means that if a
recipient user has privileges that the source user does not have, then the recipient user will lose those privileges.
Note
Copy Admin Privileges From does not copy the domain scope along with the Administrative Privileges. Domain
scope values must be set per administrator.
A DIGIPASS user account can become locked after a specified number of unsuccessful authentication attempts.
Unlocking a locked DIGIPASS user account usually requires assistance from an administrator.
To ease unlock effort and reduce support incidents, you can allow users to unlock a locked DIGIPASS user account
themselves without administrative assistance using user auto-unlock.
The user auto-unlock mechanism allows a user to implicitly unlock a locked DIGIPASS user account during regular
authentication or signature validation. It is enabled and configured using policies.
Note
For security reasons user auto-unlock works only, if the DIGIPASS user account has been locked after too many
consecutively failed authentication attempts. A DIGIPASS user account that has been explicitly locked by an
administrator cannot be unlocked by the user auto-unlock mechanism.
When a DIGIPASS user account becomes locked, it remains locked for a specified time span, i.e. the lock duration.
After that time span the user may try to authenticate again. If authentication succeeds the DIGIPASS user account
is unlocked at the same time. If authentication fails the DIGIPASS user account remains locked. The number of
maximum unlock attempts is limited; if no more unlock attempts are left, the DIGIPASS user account remains
locked and can only be unlocked by an administrator.
After each unsuccessful unlock attempt the effective lock duration is increased by a specified multiplier, thus
increasing the time span before the user may try to unlock the DIGIPASS user account again. Note that the effective
lock duration is considered to begin from the last authentication request. Attempting to unlock by authenticating
(even with a valid password or OTP) before the lock duration has elapsed does not count as unlock attempt (and
does not unlock the DIGIPASS user account). However, since it is considered an (unsuccessful) authentication
request, the last authentication request time is updated, meaning that the lock duration begins again.
10.5.2. Configuration
By default, user auto-unlock is disabled. To enable and configure it, you need to change the applicable policy
accordingly. A default policy prepared to support user auto-unlock is included in the set of pre-loaded policies, i.e.
IDENTIKEY Local Authentication with Auto-Unlock . For more information, refer to the IDENTIKEY Authentication
Server Administrator Guide, section "DIGIPASS User Account Locking".
11. DIGIPASS
This chapter provides more details on the deployment and administration of DIGIPASS users, accounts, and
devices.
Note
The user can perform many DIGIPASS functions that are unavailable during a usual login for different reasons on
the User Self-Management Website and the Virtual Mobile Authenticator OTP Request Website. For more inform-
ation, refer to the OneSpan User Websites Administrator Guide.
DIGIPASS records may be imported into IDENTIKEY Authentication Server via the Administration Web Interface .
DIGIPASS can be imported either individually or in bulk.
The DIGIPASS Import Wizard guides you through the steps of importing DIGIPASS from the .dpx file. You can specify
the applications that will be available with the imported DIGIPASS, and whether the imported DIGIPASS will be set
as Active or Inactive on import. You can also specify if existing DIGIPASS will be updated with the data from the
.dpx import file.
DIGIPASS may be assigned to users in a number of ways, depending on the requirements of your company. For
example, a company with only a few user accounts may use Manual Assignment. A larger company needing to dis-
tribute large numbers of DIGIPASS may find it easier to simply distribute the DIGIPASS and require each user to go
through Self-Assignment.
For both assignment modes, a grace period is typically set, which allows a number of days in which the user may
still log in using only their static password. After the grace period has expired, depending on the Local Authentic-
ation settings in the relevant policy, users can then either continue to use both their static password or their
DIGIPASS authenticator (DIGIPASS or Password), or must only use the authenticator (DIGIPASS/Password during
Grace Period or Digipass Only) to log in. The grace period automatically expires the first time an OTP is used to log
in, i.e. after the OTP has been successfully validated (if it has not been set manually to expire prior to that in the rel-
evant policy). Refer to Sections 3.6. Local Authentication and 3.6.2.2. Grace Period for more information.
Note
DIGIPASS records must be imported into the data store before being assigned to users.
Resetting the Server PIN is also possible during DIGIPASS assignment. When using the DIGIPASS Self-Assignment or
Auto-Assignment feature of IDENTIKEY Authentication Server, the user can reset their Server PIN. When the Assign-
ment Mode is set to Self-Assignment-Pin-Reset or Auto-Assignment-Pin-Reset, the user's Server PIN is auto-
matically reset. This is an optional feature and does not require any administrator action, once the option has been
enabled in the DIGIPASS properties and/or the relevant policy settings have been set accordingly.
11.2.1. Self-Assignment
Users can assign a DIGIPASS device themselves via Self-Assignment. With this process, the user must log in and
include the serial number, static password, and one-time password. This informs the IDENTIKEY Authentication
Server of the assignment; provided that the user enters the details correctly, IDENTIKEY Authentication Server will
link the DIGIPASS record and the user account. A grace period is not used for this method.
11.2.2. Auto-Assignment
With Dynamic User Registration, IDENTIKEY Authentication Server performs Auto-Assignment, where IDENTIKEY
Authentication Server will select a random DIGIPASS authenticator and assign it to the new DIGIPASS user account
as it is created. The DIGIPASS authenticator will then be delivered to the user.
Note
When maker–checker authorization is enabled, assigning a DIGIPASS authenticator requires the approval of a
checker administrator. In that case, Auto-Assignment is not available.
1. DIGIPASS user account is created automatically by IDENTIKEY Authentication Server during Dynamic User
Registration.
2. IDENTIKEY Authentication Server selects a random available DIGIPASS authenticator to prevent collisions
during parallel assignment of DIGIPASS authenticators.
3. IDENTIKEY Authentication Server assigns this DIGIPASS authenticator.
4. IDENTIKEY Authentication Server sets a grace period.
5. DIGIPASS is sent to the user.
6. User logs in with the static password during the grace period.
With Manual Assignment, selected DIGIPASS devices are manually assigned to specific DIGIPASS user accounts.
The DIGIPASS must then be sent to the users.
A number of functions are available to administer DIGIPASS records. These are typically required for
maintenance; for example, if a user has forgotten their Server PIN, or if a DIGIPASS has been locked.
A DIGIPASS Application may need to be reset if the time difference between the application and the server
needs to be recalculated. This would typically be for time-based Response-Only DIGIPASS after a very long
period of inactivity. The 'reset' widens the allowable time window for the next login, allowing the user to log
in and the IDENTIKEY Authentication Server to calculate the current time shift.
If the event count for an event-based application has become unsynchronized between the DIGIPASS and the
server, this function can be used to set the server event count to the event count on the DIGIPASS.
An administrator may enable or disable use of a Server PIN with a specific DIGIPASS authenticator, or with mul-
tiple authenticators. If Server PIN is enabled, the user must include their Server PIN when logging in. If Server
PIN is disabled, the user must not include a Server PIN.
If a user’s Server PIN needs to be changed – usually because the user has forgotten it – then it can be reset,
and the user can create a new Server PIN when they next log in. This may be done when unassigning or re-
assigning a DIGIPASS.
This function can be used when an administrator wants a user to change their Server PIN on their next login.
This may be desirable as a security measure.
A user’s Server PIN can be set to a specific value and communicated to the user.
If a user incorrectly enters their DIGIPASS PIN into their DIGIPASS a predetermined number of times, the
DIGIPASS will become locked. Once locked, the assistance of an administrator will be required to unlock it.
This function allows an administrator to provide the user with an Unlock Code to enter into their
DIGIPASS.
If a user has attempted to log in with incorrect details too many times, the DIGIPASS Application used may be
locked, depending on policy settings. This function can be used to reset the record status for the DIGIPASS
Application to the unlocked status. This differs from user locking, as the user may still log in with a different
DIGIPASS.
Use this function to reset the Last Activation Date/Time, the Activation Location, and Activation Counter for a
DIGIPASS.
IDENTIKEY Authentication Server comes with a wide variety of pre-set reports useful for managing and analyzing
DIGIPASS activity. These reports are available via the Administration Web Interface, and can track the following stat-
istics (among others):
This section enumerates the different DIGIPASS settings that can affect common administrative tasks.
n An initial PIN can be set for a DIGIPASS device. This PIN must then be sent to the user of the DIGIPASS, typ-
ically separate from the DIGIPASS delivery.
n First Use PIN Modification requires a PIN change from the user upon the first use of the DIGIPASS device.
n PIN Change allows a user to change their PIN as desired.
n The PIN length can be set for a DIGIPASS device.
n DIGIPASS Lock sets the number of consecutive faulty PIN entries allowed before the DIGIPASS device is
locked.
Note
The DIGIPASS client PIN is not possible with one-button models (i.e. the DIGIPASS GO range models). The Server
PIN is an alternative solution for two-factor authentication only available with one-button DIGIPASS models. Refer
to Section 3.6.2.1. Server PIN for more information on the server PIN.
Also, each DIGIPASS authenticator may be given a grace period when it is assigned to a DIGIPASS user account. For
more information on this, refer to Section 3.6.2.2. Grace Period.
The following table describes the time-based and event-based modes of different DIGIPASS Applications.
A Signature DIGIPASS Application can also be neither time- nor event-based. Such DIGIPASS Applications will
always produce the same signature for the same input. There is no difference between real-time and deferred
time with such signatures.
This setting refers to the length of the one-time password generated by the DIGIPASS for Response-Only and Chal-
lenge/Response DIGIPASS Application.
Check Digit
A check digit may be added to each OTP. This is generated from the response and allows for faster inval-
idation of incorrect OTPs.
This setting refers to the length of the challenge which should be expected by the DIGIPASS. This is used by the
Challenge/Response DIGIPASS Application.
Check Digit
A check digit may be expected with each challenge. This is generated by the server from the challenge and
allows the DIGIPASS to reject most invalid challenges.
These settings are kept in the record for a DIGIPASS Application, and affect which OTP is expected by the
IDENTIKEY Authentication Server.
Example
Time window may be 5 steps in either direction.
This means that 11 OTPs would be considered valid – the exact OTP for that time, and the OTPs for the 5
time steps either side of the exact time. If the OTP given is for a different time step, the time shift for that
DIGIPASS will be recorded. The next time the user logs in, the expected OTP will be calculated based on that
time shift.
The purpose of this setting is similar to that of Last Time Shift setting: it allows IDENTIKEY Authentication
Server to track any shifts between the event count recorded by itself and the DIGIPASS.
Several settings dictate how a user can use the Backup Virtual Mobile Authenticator feature. These settings are:
n Enable or disable Backup Virtual Mobile Authenticator and enable method (i.e. Required).
n Time limit/expiry (applies to Time Limited enable only)
n Maximum number of times a user may make use of the Backup Virtual Mobile Authenticator.
The above settings may be set both at the policy level and at the DIGIPASS record level. Individual settings override
policy settings for an individual DIGIPASS, but some policy settings (see below) may be used to automatically set
DIGIPASS settings which are blank when the Backup Virtual Mobile Authenticator is first utilized by the user.
The following table lists Backup Virtual Mobile Authenticator policy settings and DIGIPASS settings relating to time
limits and maximum users:
If Backup Virtual Mobile Authenticator is enabled for a DIGIPASS and set to Time Limited, and the Enabled Until
field in the DIGIPASS property sheet is blank on their first use of the Backup Virtual Mobile Authenticator, the time
limit will begin counting on the user's first usage of the feature. The expiry date (today’s date + time limit) will
then be displayed in the Enabled Until field.
If a Max. Uses/User is set for the relevant policy and a DIGIPASS record's Uses Remaining field in their user property
sheet is blank on their first use of the Backup Virtual Mobile Authenticator, a number (Max Uses/User) will be auto-
matically entered into the user's Uses Remaining field and immediately decremented by 1.
Note
If a user has Backup Virtual Mobile Authenticator enabled with Enabled Until date set and their Uses Remaining
has been set (automatically or manually), whichever of these expires first will disable Backup Virtual Mobile
Authenticator for the user.
Example
Backup Virtual Mobile Authenticator is enabled for a user as Time Limited, and the server Time Limit setting is 3
days. The Max. Uses/User policy setting is 5. When the user first makes use of the Backup Virtual Mobile
Authenticator, his Enabled Until is set to a date 3 days hence and their Uses Remaining to 4.
Although the user’s time limit does not run out for another 24 hours, their Uses Remaining is now 0, thereby dis-
abling Backup Virtual Mobile Authenticator .
Server PIN refers to a PIN that the user enters into the login password field in front of the OTP displayed on the
DIGIPASS. This PIN is checked by the authenticating server. The DIGIPASS PIN, on the other hand, indicates a PIN
entered into a keypad on the DIGIPASS. This PIN is checked by the device itself, and is never transmitted to the
server.
The following is a list of factors to consider when planning to integrate Virtual Mobile Authenticator into an authen-
tication service.
11.6.4.2. Cost
Your company will probably need to pay an amount for each text message sent. In some countries, mobile phone
owners might need to pay an amount for each text message received on their mobile phone. This will need to be
taken into consideration when deciding how to implement Virtual Mobile Authenticator functionality.
11.6.4.3. Security
The level of security provided by hardware DIGIPASS devices is higher than that of Virtual Mobile Authenticator. This
needs to be weighed against other considerations before deciding whether your company will implement Virtual
Mobile Authenticator, and if so, how it will be implemented.
11.6.4.4. Convenience
Virtual Mobile Authenticator is more convenient than a hardware DIGIPASS for many users. Virtual Mobile Authentic-
ator uses ordinary mobile phones (of which most users already own); there are no extra devices required. users
who do not habitually carry their mobile phone with them, though, are likely to find a DIGIPASS GO3 or DIGIPASS
GO1 easier to transport.
For users with Backup Virtual Mobile Authenticator enabled, it might be the difference between going to work to
pick up a forgotten DIGIPASS and getting important work done at home.
The simplest method for the user is to allow a 2-step login process, where the user enters their user ID and pass-
word only, triggering an OTP request, and are redirected to a second login page to enter the OTP sent to them. To
use this method, though, your system must be set up to allow 2-step logins. Check with your system administrator
if unsure.
Alternatives to the 2-step login are a sequence of two 1-step logins or the use of a specific web page to request an
OTP, separate from the login page screen.
For more information, refer to the Login Permutations section of the IDENTIKEY Authentication Server Administrator
Reference.
When a user reaches his limit of Virtual Mobile Authenticator use, an administrator must reset that user's limit. A
user’s Primary Virtual Mobile Authenticator usage cannot be limited.
The Backup Virtual Mobile Authenticator feature may be enabled as an emergency backup for users who have left
their primary DIGIPASS at home, or for other reasons do not have access to their primary DIGIPASS. Use of this fea-
ture can be limited for each DIGIPASS by:
Time period
User access to Backup Virtual Mobile Authenticator can be set during a specific time period. After this period
expires, any Virtual Mobile Authenticator requests from the user will be rejected. If the user is still unable to
use their DIGIPASS, the time period must then be extended by an administrator. Once a user starts using his
DIGIPASS again, the administrator must reset the time period if the user is to be allowed to use Backup Virtual
Mobile Authenticator again.
Number of Uses
Set a maximum number of times a user may request an OTP using the Backup Virtual Mobile Authenticator
feature. When the user has reached this number of uses, any further OTP requests from the user will be rejec-
ted. This must be reset by an administrator if further use of the Backup Virtual Mobile Authenticator is
required for the user.
Global options are defined in the policy that controls authentication. As such, using multiple policies provides
you with additional flexibility.
12. Components
IDENTIKEY Authentication Server uses component records to determine which requests from which clients can be
processed. Component records also specify which policy should be used when processing requests. IDENTIKEY
Authentication Server uses server component records to represent IDENTIKEY Authentication Server instances.
SOAP client programs are not called 'SOAP clients'. The program itself specifies the type as a parameter to each
request. A client component record must exist for this type at the location (IP address) where the application runs.
The policy in the component record will be used for all processing of requests from this client.
Creating a component record for a OneSpan administration program (e.g. Administration Web Interface or Audit
Viewer) allows a policy to be set for connections from that program.
A component record must exist for each Administration Web Interface or any other administration program using
SOAP and SEAL.
For the IDENTIKEY Authentication Server SEAL interface of the Tcl Command-Line Administration and the Audit
Viewer, the SEAL Require Administration Client Component Registration configuration setting determines whether
an administration program component must be provided or not.
IDENTIKEY User Websites is a pre-defined SOAP-based client component used for OneSpan User Websites clients.
The client component record will be checked whenever the OneSpan User Websites client sends request to
IDENTIKEY Authentication Server.
One client component record must exist for each OneSpan User Websites client installed at different locations
(IP address). Each client component record requires a valid license key.
A RADIUS client component record is required when clients will be sending authentication requests to IDENTIKEY
Authentication Server using the RADIUS protocol. The IDENTIKEY Authentication Server will check the component
record to find:
n the shared secret to use for communicating with the RADIUS client
n the policy to apply to the authentication request
A default RADIUS client component record is automatically created during installation of IDENTIKEY Authentication
Server. This can be deleted and specific records created for each location.
Note
The default RADIUS client created during installation will be given a shared secret by default.
A component record is required for any DIGIPASS Authentication Module used with IDENTIKEY Authentication
Server. The component record will be checked whenever the DIGIPASS Authentication Module sends an authen-
tication request to the IDENTIKEY Authentication Server. The IDENTIKEY Authentication Server will check:
n that the component record contains a valid license key for a client module
n which policy to apply to the authentication request
There are two pre-defined client components for DIGIPASS Authentication for Windows Logon:
n DIGIPASS Authentication for Windows Logon is a pre-defined SOAP-based client component used for
DIGIPASS Authentication for Windows Logon 2.x. Client component records of this type require a valid cli-
ent component license.
Client component records of this type are required for all client IP addresses used to log on to Windows via
DIGIPASS Authentication for Windows Logon 2.x. However, unlike DIGIPASS Authentication for Windows
Logon 1.x, you can define client component records to cover IP address ranges instead of individual client
component records for each individual IP address.
n Identikey Windows Logon Client is a pre- defined SEAL- based client component used for DIGIPASS
Authentication for Windows Logon 1.x. Client component records of this type do not require a client
component license
A client component record of this type is required for each client IP address used to log on to Windows via
DIGIPASS Authentication for Windows Logon 1.x. DIGIPASS Authentication for Windows Logon 1.x uses
Dynamic Component Registration (DCR) to ensure that the correct client component record is available
when required (see 6.4. Dynamic Component Registration (DCR)).
Dynamic Component Registration (DCR) must be enabled in the Windows Logon policy.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that for being GDPR-com-
pliant, DIGIPASS Authentication for Windows Logon requires the Verify server SSL certificate box to be checked in
the DIGIPASS Authentication for Windows Logon Configuration Center.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
An IDENTIKEY Federation Server client component record for IDENTIKEY Authentication Server is required when
IDENTIKEY Federation Server is used for authentication to different Web applications. IDENTIKEY Federation Server
communicates with IDENTIKEY Authentication Server via the SEAL protocol. For more information about the func-
tionalities of and settings for IDENTIKEY Federation Server, refer to the IDENTIKEY Federation Server Product Guide.
Note
If you register IDENTIKEY Federation Server as a client, IDENTIKEY Authentication Server will require you to upload
a valid IDENTIKEY Federation Server license.
A server component record holds the license key for a specific IDENTIKEY Authentication Server instance. This com-
ponent record will be checked when IDENTIKEY Authentication Server is started.
n License key. If the license key is missing, invalid or expired, all authentication except for administration
logons will be refused. The following items need to be supported in the license key:
n RADIUS
n SOAP
n Authentication scenario
n Signature Validation scenario
n Provisioning scenario
n DIGIPASS Authentication for Windows Logon 1.x
n Policy. The effective policy to use for SEAL administration logins. If an ODBC database (including the
embedded MariaDB database) is used as the data store, the policy will be applied to all administration
logins (including live audit connections) for which an administration program component record is not
found.
A server component record is automatically created for each IDENTIKEY Authentication Server instance during
installation.
13. Policies
Policies may be set up in a hierarchy, where a policy will inherit most of its attributes from a parent policy, but with
some modifications for a slightly different scenario. At the top of this hierarchy is a given parent or base policy - not
necessarily the default IDENTIKEY Authentication Server Base Policy - which does not inherit any attributes from
any other policies (i.e. parentless policies).
In the example above, all attributes are inherited from the parent policy. The attributes shown in the child policies
above are explicitly set, which make the policy different from the parent policy. The explicitly set attributes in the
child policies override those of the parent policies.
As the various levels of settings in policy inheritance can get confusing, functionality is available which allows you
to view the settings effective for a selected policy, taking inherited settings into account. The text below shows the
effective settings for the IDENTIKEY Authentication Server RADIUS self-assignment policy:
Effective Policy Settings
[Local/back-end authentication]
Local Authentication : DIGIPASS/Password during Grace Period
back-end authentication : Always
Back-End Protocol : RADIUS
User Accounts]
Dynamic User Registration : Yes
Password Autolearn : Yes
Stored Password Proxy : Yes
Default Domain: (none)
User Lock Threshold : 3
[DIGIPASS Assignment]
Assignment Mode : Self-Assignment
Grace Period (days) : 0
Serial No. Separator : |
Search up Organizational Unit Hierarchy : Yes
[DIGIPASS Settings]
Application Names
Application Type : No Restriction
DIGIPASS Types
PIN Changed Allowed : Yes
The settings listed here include those set in policies from which the IDENTIKEY Authentication Server RADIUS Self-
Assignment policy inherits.
Policies may be set up in a hierarchy, where a policy will inherit most of its attributes from a parent policy, but with
some modifications for a slightly different scenario. At the top of this hierarchy is a given parent or base policy - not
necessarily the default IDENTIKEY Authentication Server Base Policy - which does not inherit any attributes from
any other policies (i.e. parentless policies).
Policy attributes can be overridden - you can set authentication policy settings at the user level for the following
attributes:
n Local Authentication
n back-end authentication
n Offline Authentication
n Max Days Between Authentications
n Virtual Mobile Authenticator Delivery
When configured at the user level, these settings will override those set by the parent policy.
Pre-loaded policies are created for IDENTIKEY Authentication Server during installation and provide useful policy
examples for typical environments.
The Base Policy provides globally applicable settings. In general, all other policies should inherit from it, either dir-
ectly or indirectly.
14. Reporting
IDENTIKEY Authentication Server allows you to define and run a wide range of detailed reports. Reporting aspects
include desired fields, runtime query options, permissions, templates and scheduling. You can use pre-defined
standard reports, which can be edited, or you can define elements to create your own customized reports. Reports
are managed via the Administration Web Interface.
For detailed instructions on reporting tasks, refer to the Reporting chapter in the IDENTIKEY Authentication Server
Administrator Guide.
For a list of factors to consider when configuring reporting, refer to 14.2. Considerations for Reporting and
Auditing.
Reports are created by collecting and manipulating data from a variety of sources. The principle concepts and fea-
tures behind reporting in IDENTIKEY Authentication Server are described in the following sections.
n List Analysis. Lists all items that match the criteria specified in the report definition, e.g. a list of users with
no DIGIPASS assigned.
n Detailed Analysis. Shows detail of the events specified in the report definition, e.g. a detailed list of failed
authentications for a user.
n Distribution Analysis. Shows a count of events and objects, e.g. the number of failed authentications for a
domain.
n Trend Analysis. Shows a trend over a period of time for the objects specified in the report definition. For
Trend Analysis reports, there is an extra parameter: the period of time for which the data needs to be
extracted must be specified by hour, day, month, and year.
All reports, whether standard or custom, are based on these report types. Each report type retrieves information
from either the audit data, the data store, or both.
The grouping level specifies how the data in the report will be grouped:
n Client. If a report has set grouping level to Client, each (physical) client connected will be represented indi-
vidually.
n Domain.
n Organizational Unit. If a detailed or list report has set grouping level to Organizational Unit, the data for all
the users in that organizational unit will be added together and represented only once under the organ-
izational unit.
n User. If a detailed or list report has set at grouping level to User, each user will be represented individually.
n Digipass.
n Users. Generates the report based on the user information from the IDENTIKEY Authentication Server data
store.
n Users + Audit Data. Generates the report based on the user information mentioned above, and the audit
data from IDENTIKEY Authentication Server.
n Digipass. Generates the report based on the authenticator information from the IDENTIKEY Authentication
Server data store.
n Digipass + Audit Data. Generates the report based on the authenticator information mentioned above,
and the audit data from IDENTIKEY Authentication Server.
n Audit Data. Generates the report based on the audit data only. This means that the results are grouped by
the distinct grouping objects, e.g. client components, found in the audit data for the selected reporting
time period, whether they currently exist in the IDENTIKEY Authentication Server database or not.
n Users + Digipass. Generates the report based on the user and authenticator information from the
IDENTIKEY Authentication Server data store. This option can be used for list or detailed analysis reports
only.
The administrative scope of reports allows to define for which part of the organizational structure the report is to
be generated and run. Via this administrative scope it is possible to determine which users, DIGIPASS authen-
ticators, organizational units, and domains are to be included in the report processing and the relevant output.
n ODBC Storage
n All domains. Running the report is initiated by a Master Domain administrator; objects are pro-
cessed over all domains, including the Master Domain.
n Single domain. Running the report is initiated by a single domain administrator; objects which are
part of that same domain are processed.
n Multiple domains. Running the report is initiated by a multiple domain administrator; objects
which are part of those domains for which the administrator has the relevant permissions are pro-
cessed.
n Org unit and all child org units. Running the report is initiated by an organizational unit
administrator; objects which are part of that organizational unit and all its child organizational
units are processed.
n Active Directory Storage
n All domains. Running the report includes all organizational units as well as the DIGIPASS pool and
DIGIPASS reserve containers.
n Domain. Running the report includes the domain where the administrator account has been
defined; this includes all organizational units as well as the DIGIPASS pool and DIGIPASS reserve
containers in this domain.
n Org unit and all child org units. Running the report for a selection of one or more organizational
units in the domain for which the administrator account has been defined. The DIGIPASS pool and
DIGIPASS reserve containers are in this case also treated as organizational units.
Note
The administrative scope is not applicable to reports on client applications.
When configuring report settings, you can specify a time zone. This selected time zone will be used for:
14.1.6. Fields
You can filter report data at a field level, but only if:
If no specific fields are selected, then all fields are included in the report. For example, your report could display
the number of session times over one hour within the past week.
14.1.7. Query
You can further customize reporting data by setting one or more Queries.
For example, to generate a report for a specific audit message, e.g. Authentication, you can specify the fol-
lowing line in your query:
Audit Message = 'Authentication'
You will then only receive information on Authentication audit messages in your report.
You can use multiple queries to gain even finer-grained control of data. For example, the Authentication Activity by
Client report includes the following query data:
Audit:Category equals Authentication,
Audit:Type equals success,
Audit:Code equals S-002001,
Audit:Code equals S-010001
The Query value field can also recognize free text for time values. For example:
Audit:Timestamp + is greater than + “6 months ago”
14.1.8. Permissions
Each report definition has an owner. The owner is usually the administrator that created the report, but ownership
can be transferred to another administrator in the same domain. Permissions associated with each report determ-
ine:
n Who can run the report. Use can be restricted to the report owner, or it can be granted to other admin-
istrators.
n Who can change the report definitions. The ability to change the report format and details can be restric-
ted to the report owner, or it can be granted to other administrators.
n Who can view the report.
Usage Permissions
There are three types of usage permissions:
n Private. Only the owner can view and run the report.
n Domain. The report can be run and viewed only by administrators that belong to the domain where the
report was defined.
n Public. All administrators in all domains can view and run the report.
Change Permissions
There are three types of change permissions:
14.1.9. Templates
Reports can be generated in XML, HTML or PDF format. When defining a report, you can either:
Templates are defined when creating a report, and are then selected from a list when running the report. Each
report definition can have more than one formatting template.
Report data is always generated (initially) into XML. An SQL query retrieves the data that is required for the report.
PDF
The XML data is run through a PDF generator to produce a basic PDF report. This is then combined with the
template data (including header, footer and logo data), to provide a finished PDF with bookmarked headline
sections. The PDF header, footer and logo data can be customized, or use the standard template.
Note
Only PDF reports can be run from the background. As such, running a report with XML or HTML outputs will lock
the Administration Web Interface until the reporting task is completed.
When creating reports you should consider how your data is stored, made available for reports, and archived. The
reports you can run use the audit data and the data store.
An issue arises when you have more than one instances of IDENTIKEY Authentication Server in your system. Audit
messages can be stored on a database or in local text files. The database storage option can be local or cent-
ralized; text files are local.
When a report is run, the data has to be in a database. The report can only read one database at a time, so if (a)
there is more than one IDENTIKEY Authentication Server instances writing audit data to individual databases or (b)
the audit data is being written to one or more text files, the following options are available to enable reports to run
on all audit data:
Note
If you choose to install the embedded MariaDB database with IDENTIKEY Authentication Server, your default
audit method will be ODBC database. In addition, IDENTIKEY Authentication Server will automatically configure
DSN according to the settings used during installation.
Tip
You can also edit the settings for DSN, user name, and password in the ODBC Audit Settings tab in the Reporting
and Audit scenarios and the Auditing section of the IDENTIKEY Authentication Server Configuration Utility.
Reports that need to use up to the minute data can be run on the server that retrieves its data locally. An
example of this would be a user activity report for troubleshooting.
Reports that need to use global data can be run on the reporting server. Reports will only contain data up to
the last load to the centralized audit database.
An option to Upload Audit Data is available in the Maintenance Wizard . This will allow you to configure
IDENTIKEY Authentication Server to upload local audit data to a centralized audit database.
Archiving Strategy
If you are running reports that will require data spread out over a long period of time, the reports will take a
long time to run as the volume of data gets bigger. The best way of dealing with this growth is to archive the
data. It is best to develop a good archiving strategy when your system is being implemented. Consider the
kind of data you will want to report on, and the length of time you would like data to be available before
being archived. Remember, archived data cannot be reported upon.
Indexing
When reports that use large amounts of data are produced, they can take a long time to process. To help
make these reports run faster you can add additional indexing to the searchable fields on the database.
If you intend to work with the User Dashboard and view recent user and DIGIPASS activity, it is recommended
that you set the level of indexing for the vdsAuditMsg table to 1, to prevent authentication and report per-
formance loss. For more information about the various levels of indexing, refer to the IDENTIKEY Authentic-
ation Server Administrator Reference.
The Report-Size-Limit parameter is configured directly in the IDENTIKEY Authentication Server con-
figuration file; namely, identikeyconfig.xml. This file is located in:
/etc/vasco/ias/ (Linux)
<install_dir>\bin\ (Windows)
where <install_ dir> is the installation directory of IDENTIKEY Authentication Server (typically
%PROGRAMFILES%\VASCO\IDENTIKEY Authentication Server)
This parameter is listed under Report-Location in the Reporting Scenario configuration, i.e. nested
under ScenarioModule4. Report-Size-Limit dictates a data point limit; in this case, the data
point limit is the maximum number of distinct data fields (i.e. each user ID, domain, or organizational unit
entry) shown in a report. The data point limit effectively limits the size of the report.
The default Report-Size-Limit value is 100000. While this is adequate for most installations, you
can decrease this value if running a reporting task slows down IDENTIKEY Authentication Server significantly.
Keep in mind, though, that altering the Report-Size-Limit value requires that you restart IDENTIKEY
Authentication Server.
Note
IDENTIKEY Authentication Server uses a third-party library – Haru – to generate PDF reports; Haru has an
internal PDF size limit. Increasing the Report-Size-Limit also increases the chances of reaching
Haru's PDF size limit. When this occurs, the reporting task will fail.
As such, if you need to increase the Report-Size-Limit value, use the XML or HTML report tem-
plates instead.
14.2.1. Generating Reports in Environments with Multiple IDENTIKEY Authentication Server Instances
In environments with multiple IDENTIKEY Authentication Server instances, generating reports and other admin-
istrative tasks can be handled in different ways, depending on the database and replication setup of your system.
For more information about how administrative tasks are performed in multi-server environments, refer to 9.11.
Administration with Multiple IDENTIKEY Authentication Server Instances.
If you want to run reports solely on a dedicated reporting server, you need to disable the Reporting Scenario in the
IDENTIKEY Authentication Server Configuration Utility for all other IDENTIKEY Authentication Server instances. In this
case, the reporting server will be the only instance for report handling, and it will process and run one report task
at a time.
Note
In environments with a dedicated reporting server, if you connect to an IDENTIKEY Authentication Server instance
that has the Reporting Scenario disabled, the REPORTS menu will not be displayed in the Administration Web
Interface.
You can create and run report tasks only when connected to the reporting server instance.
When a one-time password authentication is performed, a session ID is assigned to the wireless connection. Fast
Reconnect uses this session ID to automatically re-authenticate the wireless connection rather than requiring user
ID and one-time password input from the user.
In order for Fast Reconnect to occur, a record must exist in the data store for the wireless access point making the
Fast Reconnect request.
1. IDENTIKEY Authentication Server retrieves the policy to use from the component record.
2. IDENTIKEY Authentication Serverperforms the following checks:
n Windows username/domain resolution (if used)
n Windows Group Check
n Whether the user has a DIGIPASS user account
n Whether the user's DIGIPASS user account is disabled or locked
3. Optional: If back-end authentication and Stored Password Proxy are enabled, IDENTIKEY Authentication
Server checks the stored static password with another system (e.g. Windows or RADIUS).
4. Authentication result is audited and returned.
A change from one wireless access point to the next can be made without inconvenience to the user when Fast
Reconnect can be used between the access points.
Note
Roaming connections are not supported over multiple instances of IDENTIKEY Authentication Server.
Fast reconnect will only work for roaming wireless connections where:
n All wireless access points are sending authentication requests to the same IDENTIKEY Authentication
Server instance
n All component records for the wireless access points are using the same policy
n All wireless access points are configured to use the same SSID
Multiple roaming zones – where roaming wireless connections are not permitted between zones - may be estab-
lished by assigning different SSIDs to wireless access points in different zones, and using different policies for com-
ponents in each zone. The following diagram illustrates how Fast Reconnect works with an environment with
multiple roaming zones.
While DIGIPASS user account and DIGIPASS records can belong to any domain, a single domain is identified
during installation as the DIGIPASS Configuration Domain. This domain is used to store the following records:
n Component
n Policy
n Back-end server
When no domain is specified, the DIGIPASS configuration domain is also used as a default domain for user
lookup.
Whenever IDENTIKEY Authentication Server uses an Active Directory data store, the following information is stored
in Active Directory:
Warning
You cannot import DIGIPASS licenses prepared for the Multi-Device Licensing and Activation model, if IDENTIKEY
Authentication Server has been configured to use Active Directory (AD) as data storage.
Multi-Device Licensing is not supported in those cases; importing a respective .dpx file will fail with an appro-
priate error message.
Upon assignment to a user, the DIGIPASS record is stored in the same location as the user.
When a DIGIPASS is assigned to a user, it is moved to the same location as the DIGIPASS user account it is assigned
to. This makes it easier to set up the permissions necessary for delegated administration.
Note
A DIGIPASS record will not automatically be moved when the user account to which it is assigned is moved to
another location. When moving user accounts within Active Directory, ensure that the records of any assigned
DIGIPASS are manually moved to the same location.
Unassigned DIGIPASS Records may be stored in various places in the data store:
DIGIPASS Pool
A container called DIGIPASS-Pool is created during installation. This is intended as a general store for unas-
signed DIGIPASS.
Organizational Units
If an organizational unit structure is used in the data store, DIGIPASS can be loaded or moved either into the
exact organizational units where the user accounts to which they will be assigned are located, or into a few
key organizational units in the hierarchy where they may be assigned to users in lower level organizational
units.
Users Container
When Active Directory is used as the data store, DIGIPASS can be loaded into the users container so they are
available for users in that container. However, it is not recommended to use the users container for either
user accounts or DIGIPASS.
When looking for an available DIGIPASS to assign to a user, the IDENTIKEY Authentication Server will first look in
the same organizational unit as the specific user account. The search upwards in organizational unit hierarchy
option, when enabled, allows the IDENTIKEY Authentication Server to search in parent organizational units and the
DIGIPASS-Pool container. This option may be set at the policy level for system searches (i.e. Auto-Assignment and
Self-Assignment) or at the time of the search for manual assignment.
Note
IDENTIKEY Authentication Server will always find or assign the closest available DIGIPASS record to the selected
user record(s).
If the assignment is manual (performed by an administrator), it will only find and successfully assign DIGIPASS from
locations where the administrator has the correct permissions. The administrator must have read permission for
DIGIPASS objects in the location to find a DIGIPASS record, and if it needs to be moved to the user's location, they
must have delete permission for DIGIPASS objects to successfully assign the DIGIPASS. If the administrator has suf-
ficient permissions to view a DIGIPASS record but not to assign it, the assignment will fail.
The DIGIPASS Pool is treated as the Domain Root by the IDENTIKEY Authentication Server, as DIGIPASS records may
not be saved in the Domain Root.
In this diagram, the IDENTIKEY Authentication Server is shown searching upwards through the organizational unit
structure for available DIGIPASS to assign to a DIGIPASS user in the organizational unit B1. Because no available
DIGIPASS are found in B1, it searches in B, then in the DIGIPASS pool.
Administrator 1 needs delegated administrator permissions for the organizational unit B and its child organ-
izational units. They must also have read and delete permissions for DIGIPASS objects in the DIGIPASS pool con-
tainer.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
In the diagram above, the IDENTIKEY Authentication Server can search in the parent organizational unit for avail-
able DIGIPASS.
Administrator 1 has full admin permissions for organizational unit B and its child organizational units. She does not
require any other permissions to assign DIGIPASS from organizational unit B to a user in organizational unit B1.
Administrator 2 has full admin permissions for organizational unit A2 only. He has read and delete permissions for
DIGIPASS objects in organizational unit A in order to assign DIGIPASS from organizational unit A to a user in organ-
izational unit A2.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
in the organizational unit are assigned, more DIGIPASS will need to be moved in manually by a domain admin
before they can be assigned by a delegated administrator.
In the diagram above, unassigned DIGIPASS are stored in the exact organizational units in which they will be
assigned.
Each delegated administrator only requires permissions within their specific organizational unit(s).
Note
The Search Upwards in Organizational Unit hierarchy option does not need to be enabled for this model.
The installation process will ensure that the IDENTIKEY Authentication Server has sufficient permissions. This is
achieved by assigning permissions in the domain to the in-built RAS and IAS Servers group. It is neces-
sary to make sure that the IDENTIKEY Authentication Server is added to that group.
Note
For ANY group that uses back-end authentication via LDAP and Active Directory, the permission List contents
Administrative permissions for IDENTIKEY Authentication Server administrators are controlled using Active Directory
security properties. Refer to the Permissions Needed by Administrators topic in the IDENTIKEY Authentication
Server Administrator Reference for more information.
Domain administrators may view and edit all DIGIPASS and DIGIPASS user information in their domain, plus
DIGIPASS configuration information if the DIGIPASS configuration container is located in their domain. No per-
missions setup is required for them.
Delegated administrators may view and edit all DIGIPASS and DIGIPASS user information within their administrative
scope of control. It is necessary to grant them full control, create and delete permissions over the DIGIPASS and
DIGIPASS Application objects within their scope.
Reduced Rights Administrators may perform a subset of the administration tasks. Property sets are defined with
the directory which can be used to enable or limit them in various DIGIPASS administration tasks (i.e. Access to the
DIGIPASS BLOB).
The Active Directory Command-Line Utility (dpadadmin) has to perform several tasks that are needed at various
times during installation and upgrade if Active Directory is selected, or afterward for maintenance. Some of the
commands are run automatically by the installation program, while others are run manually. The commands that
are run automatically can be run manually also, for example to troubleshoot why the installation is not succeeding.
Note
On some versions of Windows, the use of this utility will require an administrator login to the IDENTIKEY Authentic-
ation Server host. Because of this, you may be prompted to either:
The purpose of either prompt is to elevate your privileges to those required by the utility you are attempting to
run. If you cannot elevate your privileges, the utility will run in an underprivileged state, which will likely result in
unexpected behavior.
This includes:
This command can optionally be used to also add a machine to the group.
setupdomain Set up the DIGIPASS configuration container in the specified domain.
To run dpadadmin , you need to copy dpadadmin.exe to the computer from which the AD database can be
accessed.
You can retrieve dpadadmin.exe from the installation folder (by default %PROGRAMFILES%\VASCO\IDENTIKEY
Authentication Server) or from the following folder on the product installation CD:
\Software\Windows\Utilities\dpadadmin
For more information about Active Directory replication, refer to the IDENTIKEY Authentication Server Administrator
Guide, Section "Active Directory Replication Issues".
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), be aware that when selecting
the embedded MariaDB during installation, you will be prompted to choose whether or not to use encryption. By
selecting Yes, IDENTIKEY Authentication Server will use data-at-rest encryption for the database, and use ODBC
connection encryption by default.
When selecting the Advanced installation option and not opting for a MariaDB database, you are responsible for
protecting the database and the connections to it.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
Whenever IDENTIKEY Authentication Server uses an ODBC-compliant database as a data store, the following
information is stored in the data store:
Note
When copying, migrating, or backing up encrypted database files, ensure that the encryption key (and/or the
optional password key) is also backed up. Otherwise, you will not be able to read the data, as it will be encryp-
ted.
Domains and organizational units are included in the ODBC database in a way that mirrors the data structure used
by Active Directory.
Organizational units are designed to hold user accounts and DIGIPASS records. They allow grouping of users accord-
ing to department, job function, or other criteria. They also allow DIGIPASS to be allocated for Auto-Assignment to
single or multiple groups of users. Both domains and organizational units can be used to limit administrators to a
group of users and/or DIGIPASS.
For more information about domains and organizational units, refer to 2.9. IDENTIKEY Authentication Server Data
Model
When a DIGIPASS is assigned to a user, it is moved to the same organizational unit as the DIGIPASS user account to
which it is assigned.
Note
When a user account is moved to an organizational unit, all DIGIPASS records assigned to it will also be moved.
A DIGIPASS record assigned to a user cannot be moved, the user account must be moved. Unassigned DIGIPASS
records may be allocated to various places in the organizational unit structure:
Master Domain
During installation, a default domain is created. DIGIPASS are imported to the Master Domain, and may then
be moved to other domains and organizational units.
Organizational Units
If an organizational unit structure is used in the database, DIGIPASS can be moved either into the exact organ-
izational units where the user accounts to which they will be assigned are located, or into a few key organ-
izational units in the hierarchy where they may be assigned to users in lower level organizational units.
When looking for an available DIGIPASS record for a device to assign to a user, the IDENTIKEY Authentication Server
will first look in the same organizational unit as the specific user account, if the user account belongs to an organ-
izational unit. The Search Upwards in Organizational Unit hierarchy option, when enabled, allows the IDENTIKEY
Authentication Server to search in parent organizational units and the DIGIPASS pool container. This option may be
set at the policy level for system searches (i.e. Auto-Assignment and Self-Assignment (see Section 11.2.2. Auto-
Assignment and Section 11.2.1. Self-Assignment) or at the time of the search for manual assignment.
Note
The IDENTIKEY Authentication Server will always find or assign the closest available DIGIPASS record to the selec-
ted user record(s).
If the user account being assigned a DIGIPASS record does not belong to an organizational unit, the IDENTIKEY
Authentication Server will look for an available DIGIPASS record which does not belong to an organizational unit,
i.e. for an available record stored directly in the domain.
Domain Root
This option allows a centralized point of access for assignment of DIGIPASS records. It also requires less calculation
and high-level administration - DIGIPASS records are all stored in one area and there is no need to manually move
records or calculate the exact number of DIGIPASS required for each organizational unit or group of units. Admin-
istrators must belong to the domain only (not an organizational unit) to assign DIGIPASS from the domain root.
In the diagram above, the IDENTIKEY Authentication Server searches upwards through the organizational unit struc-
ture for available DIGIPASS record to assign to a DIGIPASS user in the organizational unit B1. Because no available
DIGIPASS records are found in B1, it searches in B, then in the domain root.
The administrator account manually assigning the DIGIPASS records must be located in the domain root (no organ-
izational unit) in order for this model to work successfully.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
This option is simplified if an organizational unit structure is not used in the database. User accounts and DIGIPASS
records may all be stored in the Master Domain. The Search Upwards in Organizational Unit hierarchy option does
not need to be enabled in this case.
Unassigned DIGIPASS records can be kept in key organizational units, and made available to their lower level
organizational units.
In the diagram above, the IDENTIKEY Authentication Server can search in the parent organizational unit for avail-
able DIGIPASS records.
The administrator account manually assigning the DIGIPASS records must belong to the parent organizational unit.
Note
The Search Upwards in Organizational Unit hierarchy option must be enabled for this model to function correctly.
In the diagram above, unassigned DIGIPASS records are stored in the exact organizational units in which they will
be assigned.
Administrator accounts belonging to the organizational units A1 and A2 have administration privileges in their own
organizational unit only.
Note
The Search Upwards in Organizational Unit hierarchy option does not need to be enabled for this model.
This is set up automatically if you choose to use the embedded MariaDB database. For more information about per-
missions required for administration tasks, refer to the IDENTIKEY Authentication Server Administrator Reference.
The ODBC Database Command-Line Utility (dpdbadmin) performs several tasks needed at various times during
installation and upgrade, or afterward for maintenance. Some of the commands are run automatically by the
installation program, while others are run manually. The commands that are run automatically can also be run
manually, for example to troubleshoot why the installation is not succeeding. Table 16: dpdbadmin Commands
lists the available commands.
Note
dpdbadmin only retrieves tables that are owned by the calling user. For this reason, you need to use either
the table owner to call dpdbadmin, or use consistently the same user for database schema creation, update
and/or validation.
To run the dpdbadmin utility, you need to copy dpdbadmin.exe to the computer from which the ODBC database
can be accessed.
You can retrieve dpdbadmin.exe from the installation folder (by default %PROGRAMFILES%\VASCO\IDENTIKEY
Authentication Server) or from the product installation CD.
A synchronized backup database may be set up for the IDENTIKEY Authentication Server. This helps to ensure con-
tinuous service if the main database fails. The synchronization can be a shadow database, a mirror or a replicated
copy.
The required synchronization must be set up according to the instructions provided by the database vendor. It is
strongly recommended to minimize the synchronization delay.
Once the database and any synchronization is set up, create a Data Source Name for the new database and add it
to the Configuration Utility.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), be aware that the destination
database and connections to it must be encrypted. The IDENTIKEY Authentication Server embedded database
can be installed with data-at-rest encryption for the database, and ODBC connection encryption.
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
For more information, refer to the IDENTIKEY Authentication Server Administrator Guide, Section "Database Con-
nection Handling".
If more than one IDENTIKEY Authentication Server instance is installed on the system, some additional setup may
be required.
If more than one IDENTIKEY Authentication Server instance is using the same ODBC database, no additional setup
steps are required. A backup database should be considered.
17.7. Replication
When multiple IDENTIKEY Authentication Server are in use each with their own database, they can be configured to
replicate data changes between them, to keep all databases synchronized.
Warning
If you are running multiple IDENTIKEY Authentication Server instances using ODBC in a high-load scenario, we
strongly recommend to disable IDENTIKEY Authentication Server replication and set up replication on the ODBC
database server level instead.
Slow responses from the IDENTIKEY Authentication Server instances under load will disrupt the replication pro-
cess!
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), be aware that when using rep-
lication, the data to be replicated is temporarily stored in a local SQLite database, and then transferred via mes-
sages over the SEAL protocol to its destination. The data temporarily stored on the disk is unencrypted. To be
GDPR-compliant, OneSpan recommends to encrypt either the folder containing the replication database or the
hard disk, and setting up SSL-encryption for replication connections between the IDENTIKEY Authentication
Server instances.
For more information on GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regulation
Compliance Guide.
Image 67: Replication between a Primary and Backup IDENTIKEY Authentication Server instance
Image 68: Replication between Primary, Backup, and Disaster Recovery in IDENTIKEY Authentication Server
Other replication scenarios may also be used. For example, a company may have three IDENTIKEY Authentication
Server instances, all replicating to each other. This may keep data up to date better than a simpler replication
chain.
Or, a company might require two Primary IDENTIKEY Authentication Server instances, each with a backup
IDENTIKEY Authentication Server instance, and add in an extra replication link to speed up data communications:
Security for replication can be further enhanced by enabling SSL. SSL can be enabled when defining the Rep-
lication destination server on the Configuration Utility. Use the destination server configuration page to provide the
SSL certficate, SSL password, and CA Certificate store.
For more information about enabling and configuring SSL for replication connections, refer to the IDENTIKEY
Authentication Server Administrator Guide, Section "Enabling SSL on Replication Connections".
Certain multi-step workflows in IDENTIKEY Authentication Server require caching, because state information that is
shared between individual steps must be available within IDENTIKEY Authentication Server.
When multiple IDENTIKEY Authentication Server instances are working together, the above mentioned multi-step
commands use a cache written to the database which is available to all IDENTIKEY Authentication Server instances
that share the same database. This allows multi-step commands to be sent to any IDENTIKEY Authentication
Server instance that is part of the setup (i.e. share the same database).
This persistent cache mechanism removes in-memory cache limits. Moreover, the IDENTIKEY Authentication
Server service/daemon can be restarted without losing sessions.
Note
The Administration Web Interface now supports cache-specific settings. These cache settings can be found in
SERVERS > Global Configuration.
The settings can no longer be edited in the IDENTIKEY Authentication Server configuration file
(identikeyconfig.xml).
Note
Cache persistence is an important element used for the high-availability and maximum-availability deployment
models.
In the advanced deployment model caches are persistent for each IDENTIKEY Authentication Server instance.
However, cache data is not replicated between the instances using the IDENTIKEY Authentication Server rep-
lication mechanism.
For more information about the different deployment models, refer to the IDENTIKEY Authentication Server Per-
formance and Deployment Guide.
Note
Cache persistence is automatically disabled in IDENTIKEY Authentication Server deployments using Active Dir-
ectory as data store!
18. Licensing
OneSpan products are licensed per client component record in the data store. The licensing relies upon a license
key which is checked when the IDENTIKEY Authentication Server starts. This license key is tied to the location (IP
address) where the IDENTIKEY Authentication Server is installed, and stored in the client component record for
IDENTIKEY Authentication Server.
IDENTIKEY Authentication Server will not authenticate a user without a correct license key, except to permit admin-
istration. A license key is required for all of the following:
n SOAP
n RADIUS
n Authentication Scenario
n Signature Validation Scenario
Re-licensing
You will need to obtain and load new license keys for your IDENTIKEY Authentication Server components in
the following situations:
Note
Whenever you change or update the server license key, you need to reconfigure IDENTIKEY Authentication Server
replication!
Some client components—such as the DIGIPASS Authentication Modules or DIGIPASS Authentication for Windows
Logon—require a license key to be loaded into their client component record. IDENTIKEY Authentication Server, to
which they connect, will otherwise reject all authentication requests from them.
n DIGIPASS Authentication for Windows Logon is a pre-defined SOAP-based client component used for
DIGIPASS Authentication for Windows Logon 2.x. Client component records of this type require a valid cli-
ent component license.
A client component record of this type with location default is automatically created during installation. If
the client component used to serve an authentication request by a DIGIPASS Authentication for Windows
Logon client does not have a client component license, IDENTIKEY Authentication Server falls back on the
client component record with the default location. If the default client component record has no valid
license loaded either, the authentication request is rejected.
n Identikey Windows Logon Client is a pre- defined SEAL- based client component used for DIGIPASS
Authentication for Windows Logon 1.x. Client component records of this type do not require a client com-
ponent license. However, the SEAL and Windows Logon options must be enabled in the IDENTIKEY
Authentication Server license.
DIGIPASS Gateway
DIGIPASS Gateway is a pre-defined SOAP-based client component used for DIGIPASS Gateway clients in the
context of Push Notification. Unlike other SOAP clients it does require a valid license key in the client com-
ponent record. However, it does not require SOAP authentication to be enabled in the IDENTIKEY Authentic-
ation Server license.
An evaluation license means that you can use its full functionality until the evaluation period runs out. At the end of
this period, you will need to either uninstall the product or buy a permanent license. Contact your distributor or the
appropriate OneSpan reseller representative to acquire the licenses you will need. For your convenience, the eval-
uation serial number is embedded in the installation program. You will still need to obtain and load a license key.
Note
Licenses for previous IDENTIKEY Authentication Server 3.x updates (i.e. Identikey Server 3.1 or IDENTIKEY
Authentication Server 3.3) are valid for this version of IDENTIKEY Authentication Server.
The Maintenance Wizard will guide you through the process of requesting and loading a License Key. However, if
for some reason it is not possible to complete the licensing at installation time, the Administration Web Interface
can be used to obtain and load a License Key for a Component. This process must be completed for each
IDENTIKEY Authentication Server instance, and requires an active internet connection to open the Manage
IDENTIKEY Authentication Server page.
To view license information for a client component, log in to the Administration Web Interface and navigate to Cli-
ents > List. Doing so will display the Client List. Note that not all clients require a license:
Note
To obtain a license key, an active internet connection is required.
Doing so will launch a browser window, with the OneSpan license activation page loaded. Some details of
the component will be entered automatically for you.
8. The download of your License Key file should begin. Keep note of where you save the file, and its name.
9. Once the download is complete, return to the Licensing page of the server component for which you are
obtaining a license.
10. Click on the Load License Key button.
11. Browse to the download location of the License Key you downloaded earlier and select the .dat License
Key file.
12. To enable IDENTIKEY Authentication Server features which are newly licensed, tick the Automatically
enable new functionality checkbox. All new functionality will be enabled, and will be available to admin-
ister in the Administration Web Interface. Note that some features, such as the RADIUS communicator, will
not be enabled if they were disabled when the license was loaded. They will still have to be enabled
manually.
If the Automatically enable new functionality checkbox is not ticked, new functionality will only be enabled
after logging off the Administration Web Interface, and logging back on.
13. Click on Upload to load the License Key from the file into the component record.
14. Any new functionality may need to be enabled in other IDENTIKEY Authentication Server instances in your
system. If so, follow this procedure for each one.
Note
Whenever you change or update the server license key, you need to reconfigure IDENTIKEY Authentic-
ation Server replication!
19. Monitoring
This chapter describes the Performance and System Monitoring functions in IDENTIKEY Authentication Server.
Performance Monitoring allows you to monitor specific parts of IDENTIKEY Authentication Server processing to pro-
duce useful performance statistics.
Performance Monitoring is disabled, enabled, and managed using the Configuration Utility.
IDENTIKEY Authentication Server uses Filters to define what to monitor; the different supported plugins are used to
control how to deliver that data. Filters are applied to all possible output plugins.
The Help button of the Configuration Utility's Performance Monitoring section contains detailed information on the
syntax of filters.
20.1.1. Filters
The Performance Monitoring tool uses filters to determine which specific parts of IDENTIKEY Authentication
Server processing should be monitored.
A filter must consist of the name of a performance transaction. You can specify a single performance transaction,
or you can use the asterisk (*) wildcard to identify a group of transactions.
In the IDENTIKEY Authentication ServerConfiguration Utility click Add to define a filter. In the Transaction Filter box ,
a filter can be added by entering a pattern. This pattern must consist of the name of a performance transaction.
The positioning of the asterisk determines what performance transactions will be filtered. For example:
n *administration.logon -by placing the asterisk at the beginning , all performance transactions
that end in administration.logon will be monitored
n *administration* -by placing an asterisk at the beginning and at the end, everything related to
administration will be monitored
n identikey.scenario.signature* -by placing the asterisk at the end, all performance trans-
actions starting with identikey.scenario.signature will be monitored
n identikey*logon -by placing the asterisk in the middle, all performance transactions starting with
identikey and ending with logon will be monitored.
You can find a list of available performance transactions via the Help of the Configuration Utility, as well as in the
IDENTIKEY Authentication Server Administrator Reference.
The Performance Monitoring tool uses several plugins in order to define its output.
CSV Plugin
The CSV Plugin allows you to define a comma-separated variable (.csv) file to write the results to. To enable
the CSV plugin, click Enable CSV Plugin in the Performance Monitoring Tool.
Counter Plugin
To enable the counter plugin, click Enable Counter Plugin in the Performance Monitoring Tool.
The counter plugin records statistics on transactions specified in the filter. The counters are available via
SNMP on both Windows and Linux. When using the Counter Plugin, you can only filter on Performance Mon-
itoring Counters. The Counter Plugin does not filter on scenario counters.
The Counter Plugin will generate data relating to the number of times certain transactions have been carried
out, and relevant timing information for those transactions. The SNMP server on which the Counter Plugin
enters the data is the one running on IDENTIKEY Authentication Server.
Note
For the counter plugin to work, system monitoring must be enabled (see 21.1. System Monitoring).
ARM4 Plugin
This plugin allows you to define an Application Response Measurement application.
IDENTIKEY Authentication Server offers a dedicated health check to monitor the VASCO IDENTIKEY Authentication
Server service and check if the service is available and working properly. The health check endpoint is enabled by
default using port 8889 and /health as URL extension. If you send an HTTP GET request to this endpoint, one of the
following HTTP status codes is returned in a log file, according to the service status:
IDENTIKEY Authentication Server supports application level system monitoring with SNMP. This feature allows you
to monitor IDENTIKEY Authentication Server processing to provide notifications when specific events occur.
System Monitoring is performed based on the IDENTIKEY Authentication Server audit messages and their contents,
and creates an alert when specified messages appear. These alerts, or targets, are sent via text messages, e-
mails, or SNMP traps. To apply system monitoring, the IDENTIKEY Authentication Server System Monitoring feature
must be enabled. Use the IDENTIKEY Authentication Server configuration interfaces to configure, enable, or disable
system monitoring. In the Configuration Utility go to Monitoring and click Enable System Monitoring, in the Admin-
istration Web Interface go to System > Server Configuration > System Monitoring. The Configuration Utility is also
used to define which audit messages to monitor, along with the notification destination and format.
Note
When enabling system monitoring via the Configuration Utility, IDENTIKEY Authentication Server needs to be
restarted - the system automatically enforces this operation. When enabling system monitoring via the Admin-
istration Web Interface, IDENTIKEY Authentication Server does not need to be restarted.
Filters help system administrators monitor critical events as they occur, rather than making them search through
an extensive list of audit logs to locate potentially critical system events.
21.1.1. Filters
System Monitoring requires filters to specify which IDENTIKEY Authentication Server events / audit messages
should be monitored. Filter details must include a/an:
n Name
n Target, specifying which notification method is to be used
n Audit message type to monitor
n Specific field
n Condition
n Value for the specified field
The fields listed herein are monitored from the vdsauditmsg table, which stores audit messages.
21.1.2. Targets
The System Monitoring tool requires one or more targets to be defined to specify the output format. The available
target formats are:
n SMS
n E-mails
n SNMP-traps
Note
When you configure SNMP targets, make sure to set both the Authentication type AND the Privacy type for a
complete trap configuration in the IDENTIKEY Authentication Server Configuration Utility, i.e. you cannot set
a privacy type without setting an authentication type.
n IDENTIKEY Authentication Server Errors. For this type of events, OneSpan recommends defining an audit fil-
ter that extracts all error audit messages.
n Locked DIGIPASS users. For this type of events, a filter should be defined that extracts all audit messages
with the audit code ‘W-011003’.
n Failed administrative logons. For this type of events, a filter should be defined that extracts all audit mes-
sages with the audit code ‘F-004001’.
n Replication failures. For this type of events a filter should be defined that extracts all audit messages with
the audit code ‘F-003001’ or ‘F-003002’.
In addition, the User Dashboard facilitates user-specific report creation and provides easy access to audit mes-
sages for a single user or DIGIPASS activity record. For more information, refer to 22.1.7. Generating Reports via
the Dashboard Tab, 22.3. Generating Reports via the Reports Tab, and 22.2. View Audit Message Page.
The Dashboard tab of the User Properties page in the Administration Web Interface provides an overview of the
most important settings for the selected user such as user information, assigned DIGIPASS, used clients, and
recent activity.
n Last authentication
n Account status
n Expires
n Static password
n Administration privileges
To view all user account settings or to change settings, switch to the User Account tab of the User Properties page.
This section lists the policy override settings for the user:
n Local authentication
n Back-end authentication
n Offline authentication
n Max Days Between Authentications
n Virtual DIGIPASS
n Virtual signature
To change the policy override settings, switch to the Policy Overrides tab of the User Properties page.
n User name
n Phone
n Mobile
n Email address
n Description
To view all user info settings or to change settings, switch to the User Account tab of the User Properties page.
This section contains information about the five last used DIGIPASS assigned to the selected user, and includes the
following:
n Serial number
n DIGIPASS type
n Status
n Active applications
n Virtual Mobile Authenticator (VDP)
For a complete list of assigned DIGIPASS, switch to the Assigned DIGIPASS tab of the User Properties page.
This section shows the most recent activity records for the user.
To view all recent activity records, switch to the Recent Activity tab of the User Properties page.
This section lists the five last client components used by the selected user, and includes the following:
Click the client identifier to go to the Client Properties page for this client.
Click the policy ID to go to the Policy Properties page for this policy.
To view all recently used clients, switch to the Recent Activity tab of the User Properties page.
The QUICK REPORT button in the User Dashboard of the selected user allows an administrator to quickly generate
a user-specific report. By default, IDENTIKEY Authentication Server generates a Detailed Activity Summary report.
For more information about generating reports via the User Dashboard, refer to the IDENTIKEY Authentication
Server Administrator Guide, Section "User Dashboard".
For more information about reports, refer to 14. Reporting. For more information about generating user-specific
reports via the Reports tab in the User Properties page, refer to 22.3. Generating Reports via the Reports Tab.
Recent user activities include results from various user operations and IDENTIKEY Authentication Server events:
n Authentication
n Authenticating a user
n EMV-CAP Authentication
n Authenticating using EMV-CAP
n Signature Validation
n Authenticating a signature
n Generating a virtual signature
n Provisioning
n Registering
n Activating
n Assigning
n Registering using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Activating using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Getting activation data using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Registering using Multi-Device Licensing (MDL)
n Adding a device using Multi-Device Licensing (MDL)
n Activating using Multi-Device Licensing (MDL)
n Administration
n Assigning a DIGIPASS authenticator
n Moving a user
n Unassigning a DIGIPASS authenticator
n Disabling a user
n Enabling a user
n Unlocking a user
n Enabling offline authentication
n Disabling offline authentication
n Resetting the last authentication time
n Setting user expiration
n Updating a user
n Linking a user
n Setting a password
n Resetting a password
n Setting user permissions
n Creating user attributes
n Deleting user attributes
n Deleting offline data
n Events
n No DIGIPASS authenticator was found for Auto-Assignment.
n A user account has been locked.
When a client application is configured to use auto- unlock and the user account becomes
locked,the audit information also displays the date and time when the end user can authenticate
again to auto-unlock their user account.
The number of recent user activity records displayed can be restricted by time and number. This means that activ-
ity records older than a certain time threshold are excluded from the result. Furthermore, only a total number of
records are returned. The limits are configured in the global server configuration. This means that they apply to all
IDENTIKEY Authentication Server instances within a replicated environment.
Recent DIGIPASS activities include results from various DIGIPASS operations and IDENTIKEY Authentication Server
events:
n Authentication
n Authenticating a user
n EMV-CAP Authentication
n Authenticating using EMV-CAP
n Signature Validation
n Authenticating a signature
n Generating a virtual signature
n Provisioning
n Registering
n Activating
n Assigning
n Registering using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Activating using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Getting activation data using DIGIPASS Software Advanced Provisioning Protocol (DSAPP)
n Registering using Multi-Device Licensing (MDL)
The number of recent DIGIPASS activity records displayed can be restricted by time and number. This means that
activity records older than a certain time threshold are excluded from the result. Furthermore, only a total number
of records are returned. The limits are configured in the global server configuration. This means that they apply to
all IDENTIKEY Authentication Server instances within a replicated environment.
The View Audit Message page displays the details of a single audit message for the user or DIGIPASS recent activity
on a single page and provides access to all relevant audit message fields. To view this page, the administrator
must have the View Audit Information administration privilege; if this applies, they can access the View Audit Mes-
sage page by selecting the relevant audit message code displayed in the Recent Activity page.
The number of audit records for recent user or DIGIPASS activities displayed can be restricted by time and number.
This means that audit records older than a certain time threshold are excluded from the result. Furthermore, only a
total number of records are returned. The limits are configured in the global server configuration. This means that
they apply to all IDENTIKEY Authentication Server instances within a replicated environment.
The Reports tab of the User Properties page provides a list of reports that can be run via this tab. That list is a sub-
set of the global list of reports in IDENTIKEY Authentication Server, where the currently viewed user is automatically
preselected in the run-time query definition. For a complete list of reports that are by default available in this tab,
refer to the IDENTIKEY Authentication Server Administrator Reference, Section "Reporting".
This subset can be retrieved from the global report set by filtering the reports according to different sets of defin-
ition criteria (see Table 19: Report Definition Criteria).
Using these criteria to create a customized report allows you to also include this report in the results list.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), ensure that GDPR-compliance
is met when auditing with IDENTIKEY Authentication Server by:
For more information about GDPR, refer to the IDENTIKEY Authentication ServerGeneral Data Protection Regu-
lation Compliance Guide.
Audit messages are primarily generated by IDENTIKEY Authentication Server and include RADIUS accounting data.
These messages may be recorded by a number of different methods:
Live auditing, where audit messages are captured and passed directly to the Audit Viewer application as a live
feed, is also available.
Auditing output from the IDENTIKEY Authentication Server can be configured using the Configuration Utility. For
more information, refer to the IDENTIKEY Authentication Server Administrator Reference, Section "Configuration".
The Audit Viewer can retrieve messages from several different sources and display audit messages from each in
separate windows. Audit messages may be filtered by message type, date and time, or the contents of specific
fields.
Note
On some versions of Windows, the use of this utility will require an administrator login to the IDENTIKEY Authentic-
ation Server host. Because of this, you may be prompted to either:
The purpose of either prompt is to elevate your privileges to those required by the utility you are attempting to
run. If you cannot elevate your privileges, the utility will run in an underprivileged state, which will likely result in
unexpected behavior.
For a list of audit messages, refer to the IDENTIKEY Authentication Server Administrator Reference.
Active Directory auditing may be enabled and configured to record access and modifications to DIGIPASS-related
data used by the IDENTIKEY Authentication Server.
For more information, refer to the Active Directory auditing section in the IDENTIKEY Authentication Server Admin-
istrator Guide.
An option is available to enable Secure Auditing during the installation of IDENTIKEY Authentication Server.
Integrity protection
With Secure Auditing, IDENTIKEY Authentication Server uses a non-viewable encrypted signature added to
each line of an audit file, or each row of an audit data store. This prevents any operator from making untrace-
able manual changes to the audit file.
Independent verification
Each audit file or data store can be verified using the Secure Auditing Verification Tool.
Non-repudiation
Secure Auditing verifies audit data by comparing each signed line or row of audit data with the previous and
subsequent entries in the audit data.
Secure Auditing can also work with a Hardware Security Module (HSM) (see 8.2. Licensing and Configuration).
Secure Auditing adds a cryptographic signature to each audit message written to the output. The cryptographic sig-
nature relates each message entry to the previous and subsequent entries. External auditors can cryptographically
verify each signature and verify that no lines have been manually deleted or added from the audit information; the
relationship between the entries is verifiable using the Secure Auditing Verification Tool.
Each audit message entry belongs to an epoch, which is a period delimited either by time or by number of audit
messages. At the end of each epoch the encryption key is changed. A message is written to the audit file to indic-
ate that an epoch has ended, and another message is written to indicate that a new epoch has begun. The length
of processing for each epoch is defined during initial configuration. A new epoch always begins at midnight. A mes-
sage is written to the output to indicate the beginning and end of an epoch. Each epoch message contains inform-
ation required by the Secure Auditing Verification Tool to decrypt the signatures for that epoch. This information is
located at the start of each epoch message.
Warning
OneSpan does not support multiple IDENTIKEY Authentication Server instances writing Secure Auditing data to
the same audit database. As such, for environments running multiple instances of IDENTIKEY Authentication
Server, each instance that uses Secure Auditing should have its own audit database.
Audit data that are older than a given period, defined by your organization, or that are no longer required for the ori-
ginal purpose, can be deleted from the IDENTIKEY Authentication Server audit database. This can be done via the
Maintenance Wizard, or via the Administration Web Interface and the Delete Audit Data Wizard.
The Audit Message Import/Export wizard allows you to import audit data from one source and re-import it to a text
file or ODBC database. This wizard is launched from the main interface of the Maintenance Wizard.
With the Delete Audit Data Wizard you can either delete audit records immediately, or schedule a task for the dele-
tion; you can also configure this to be a recurring task and delete audit records at regular intervals.
For more information on task management and more detailed instructions for audit message export and task-
based erasure of audit data, refer to the IDENTIKEY Authentication Server Administrator Guide.
23.5. Tracing
IDENTIKEY Authentication Server also offers tracing for troubleshooting purposes. The level of tracing used by
IDENTIKEY Authentication Server can be configured using the Configuration Utility. Tracing messages will be recor-
ded to a text file, and the trace log files can be rotated according to their age or size.
Note
OneSpan strongly recommends using the tracing feature only for troubleshooting and disable tracing when
IDENTIKEY Authentication Server is used in production mode to enhance server performance.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), you need to ensure that
GDPR-compliance is met by encrypting the folder or disk storing the trace file, if tracing is used.
Refer to the Tracing section in the IDENTIKEY Authentication Server Administrator Reference for more information
and for specific instructions on configuring tracing for IDENTIKEY Authentication Server.
Warning
If your organization is impacted by the General Data Protection Regulation (GDPR), note that the SEAL protocol
used for communication with IDENTIKEY Authentication Server must be SSL enabled in the Message Delivery
Component Configuration Utility to be GDPR-compliant.
If the Email Delivery option is selected, ensure that the gateway server is configured to use SSL and TLS encryp-
tion.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
You can enable client and server SSL certificates over the link between MDC and IDENTIKEY Authentication Server,
and you can customize rotation of the trace log file (if desired).
IDENTIKEY Authentication Server supports the following delivery methods via MDC:
n SMS
n Email
n Voice (a text-to-speech service)
n Push notifications
Several templates are defined for each of these delivery methods. For more information about these templates,
refer to the IDENTIKEY Authentication Server Administrator Guide and the IDENTIKEY Authentication
Server Administrator Reference, Section "Message Delivery Component Message Settings".
MDC can be used for a number of different functional areas within IDENTIKEY Authentication Server. The delivery
methods available depend on the functionality available within each functional area.
Multiple gateways may be configured, and optionally grouped by a chosen MDC profile name. These gateway
definitions can be managed via the MDC Configuration Utility . For more information, refer to the IDENTIKEY
Authentication Server Administrator Guide, Section "Message Delivery Component Configuration via GUI".
Each gateway is tied to a specific delivery method and protocol. A gateway definition defines a gateway as having
a server type of either:
n Primary
n Backup
The server type of a gateway helps determine how the Message Delivery Component performs load-balancing, fail-
over, and/or failback.
Multiple gateways may be configured, and optionally grouped by a chosen MDC profile name. These gateway
definitions can be managed via the MDC Configuration Utility . For more information, refer to the IDENTIKEY
Authentication Server Administrator Guide, Section "Message Delivery Component Configuration via GUI".
IDENTIKEY Authentication Server supports three types of gateway format. Each of these gateway formats uses a
specific connection protocol:
IDENTIKEY Authentication Server also supports exporting and importing gateway definition settings to and from
XML.
Gateway definitions can be grouped using MDC profiles. MDC profiles are independent of gateway type or delivery
method. MDC will select the highest-ranked, enabled and available gateway with the specified MDC profile name,
and use it for message delivery. If an MDC profile name is not specified, then the highest-ranked, enabled and
available gateway for the specified delivery method will be used.
During a rolling upgrade, i.e. when upgrading multiple IDENTIKEY Authentication Server instances in environments
where authentication services absolutely cannot be taken offline, authentication services remain available through-
out the upgrade process. For more information about rolling upgrade and the various scenarios, refer to the
IDENTIKEY Authentication Server Administrator Guide.
3. (OPTIONAL) Migrating from Software Security Module (SSM) to Hardware Security Module (HSM)
While steps 1 to 3 require individual servers to be down, authentication services are available during server data
migration in step 4, and are also available on other server instances during a rolling upgrade.
Warning
When upgrading from IDENTIKEY Authentication Server version 3.14 or an earlier supported version using the
embedded PostgreSQL database, the PostgreSQL database remains on the disk, and to be GDPR-compliant,
OneSpan recommends to either delete the database, or to encrypt the file or disk if the old database is kept.
For more information on GDPR, refer to the IDENTIKEY Authentication Server General Data Protection Regulation
Compliance Guide.
25.1. Upgrading IDENTIKEY Authentication Server Software and Updating Static Server Con-
figuration
During IDENTIKEY Authentication Server software upgrade and static configuration update, the installed product
components and all static server settings are updated. At this point, authentication requests cannot be processed
on the server instance that is being upgraded.
IDENTIKEY Authentication Server data stored in the storage subsystem, such as DIGIPASS or user data, will be
migrated in a separate step, to avoid prolonged server downtime. For more information, see 25.3. Migrating
Server Data.
25.2. Migrating from Software Security Module (SSM) to Hardware Security Module (HSM)
When configuring IDENTIKEY Authentication Server in the course of an upgrade, if an SSM is configured for this
instance of IDENTIKEY Authentication Server and if the storage used is an ODBC storage, you can migrate to a Hard-
ware Security Module (HSM). On Microsoft Windows, you can migrate to a SafeNet HSM. On Linux, SafeNet and
Thales nShield HSMs are supported.
Warning
The migration from an SSM to an HSM deployment is not revertible; migrating back to an SSM deployment is not
possible.
For more information about the HSM migration process, see 8.4. HSM Migration. For instructions to migrate to an
HSM, refer to the IDENTIKEY Authentication Server Installation Guide for Windows or the IDENTIKEY Authentication
Server Installation Guide for Linux.
Upgrading IDENTIKEY Authentication Server will most likely involve a database schema update. Therefore, as soon
as the server has been upgraded, server data from the previous installation such as DIGIPASS and user data, needs
to be migrated to match the new schema.
Server data is continuously migrated while the already-upgraded IDENTIKEY Authentication Server is running. This
means that the data store contains both migrated and non-migrated data until data migration has been com-
pleted.
To ensure that authentication services remain available at all times, data is migrated using two complementary
mechanisms:
On-the-fly data migration means that data is migrated on demand whenever IDENTIKEY Authentication
Server receives a request (e.g. an authentication request) and accesses server data records. Only data
records required to process the request are migrated, whereas data records which are newly created or
have already been migrated will not be processed (a second time).
Note
On-the-fly data migration is only triggered upon updating or reading a data record; it is not initiated by
queries (listing several data records).
In addition, to systematically migrate all server data from the old installation, you need to start or schedule
a data migration task using the Administration Web Interface. The data migration task runs in the
background and migrates all database records one-by-one to the new schema, except for server data
which has already been migrated.
Each server data record is migrated only once, either on-the-fly or by the data migration task.
Note
If a data record cannot be migrated for any reason, it will be specially marked. Such marked data records will be
blocked and cannot be accessed regularly anymore, but only queried and deleted. To use such blocked data
records again, you need to manually inspect and recover them.
The following sections contain recommendations for and additional information about server data migration.
25.3.1.3. Miscellaneous
n While server data migration is still in progress, the result of a query command may be incomplete and may
include not-yet migrated data.
n While server data migration is still in progress, you cannot switch IDENTIKEY Authentication Server to
migration mode (and use it with Data Migration Tool).
n Should a restart of the IDENTIKEY Authentication Server service be required while the data migration task
is in progress, the task will automatically resume when the service is available again.
For more information about data migration after a rolling upgrade, refer to the IDENTIKEY Authentication Server
Administrator Guide . For instructions to create and schedule a data migration task, refer to the IDENTIKEY
Authentication Server Windows Installation Guide or the IDENTIKEY Authentication Server Linux Installation Guide.
Index
A B
accepted domain 64 Back-End Authentication 84
Activation Code 102, 125 DP110 Provisioning Scenarios 119
activation completed notification 104 Grace Period 73
activation delayed notification 104 LDAP protocol 87
Active Directory LDAP protocol and Active Directory, site awareness 87
administrative permissions 206 Password Autolearn 86
administrative tasks 145 provisioning 105
Back-End Authentication 87 Software DIGIPASS Registration 125
Back-End Authentication, site awareness 87 Stored Static Password 85
domain root 202 back-end protocol 63, 84, 105, 111, 117, 183, 185
overview 45, 200 back-end server
permissions required 205 RADIUS server 35
User 60-61, 87 record 45, 86
Users and Computers Extension (ADUCE) 148 Backup Virtual DIGIPASS 22
Active Directory, storage Usage Guidelines 175
domain name resolution 59 BLOB
administration DIGIPASS 44
administrative tasks
ADUCE 148 C
ODBC and Active Directory comparison 145
cache persistence 220
administrator types 206
centralized database
components 41
reporting 192
interfaces 145
Certificate Authority 48
privileges 162
challenge
Administration Client Component 178
Access-Challenge mechanism 35
ADUCE 41, 87, 108, 145, 148, 162, 206
generating a challenge 74
Asymmetric Encryption 49
Challenge/Response
Audit System 41, 238
1-Step 74
Audit Viewer 42, 62, 145, 154, 178, 238-239
1-Step Challenge/Response 74, 185
auditing
2-Step 74
live auditing 239
2-Step Challenge/Response 74
live connection audit method 239
challenge generation 74
Auditing
time/event-based 170
database schema (ODBC) 194
types of DIGIPASS 16
importing and exporting Audit Messages 242
CHAP 32, 47, 87, 93-94, 138
authentication process 53
Check Digit 171, 183, 185
authenticators
Citrix Web Interface 28, 54, 76, 179
auto-assignment and maker-checker authorization 65, 166
Classless Inter-Domain Routing (CIDR) notation 54, 99, 123
auto-assignment
Communicator 28
and maker-checker authorization 65, 166
component records 44
overview 166
connection handling 215
auto-unlock 163
Context Menu 149
Autolearn
conversion, User ID/domain 158
Password Autolearn 85-86, 94, 159, 161, 183, 185
creating users via dynamic user registration (DUR) 157
Index
Index
I
IDENTIKEY Authentication Server
upgrading 245
inheritance 183
international character support
limitations 94
Index
monitoring permissions
filters 227 Active Directory 205
performance 227 administrative permissions (Active Directory) 206
Performance Monitoring tool 227, 229 PIN
plugins 229 DIGIPASS authenticators with keypads 17
system monitoring 226, 230-231 DIGIPASS PIN 170
Multi-Mode 16, 21, 69 Server PIN 70
types of DIGIPASS 16 Server PIN settings 174
plugins
N performance monitoring 229
Policy
nFastServer 143
base policy vs. Base Policy, definition 182, 184
O parentless policy 182, 184
Primary Account Number 136
ODBC Primary Virtual DIGIPASS 22
administrative tasks 145 Private Key 49
domain name resolution 57 privileges, administration 162
domain name resolution with Active Directory back end 58 protocols
domain root 210 RADIUS (supported) 93
domains and organizational units 208 provisioning 105
Offline Delivery 102 Provisioning
one-time passwords (OTP) 15 DP110 119
Operator Card Set 142 Public Key 48
Organizational Units Push Notification
Active Directory 201 authentication method 26
ODBC 210 DIGIPASS App 21
record 46 DIGIPASS Gateway 75
out-of-band (OOB) authentication
push notification 75 R
Outlook Web Access 54, 69, 84-85, 179
RADIUS 31
P as a back-end server 35
Attributes 32, 186
PAP 32, 47, 87, 93 limitations 94
Parent Organizational Units securing connections 29-31, 41-43, 128, 131, 150, 157,
Active Directory 203 180, 208, 214, 238, 242
ODBC 211 supported protocols 93
password recent DIGIPASS activity 235
supported protocols 32 recent user activity 234
Password registration of Software DIGIPASS 123
expiration, back-end password 161
expiration, local password 160
password strength 159
Policy 160
RADIUS password protocols (limitations) 94
PCI-DSS 50
PEAP 35
pending operations See maker–checker authorization
performance monitoring 227
Index
Index
Virtual DIGIPASS 22
Backup Virtual DIGIPASS Usage Guidelines 175
factors to consider 174
limiting usage 176
login options 176
Primary and Backup 22
W
Web Basic Authentication 95
Windows Group Check 62, 65, 67, 84, 100, 124, 132, 183, 197
wireless RADIUS 34, 196