This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • Private network without 2nd factor authentication - Windows Agent
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
ManuelHolzner
ManuelHolzner New Contributor
New Contributor
‎2019-03-26 06:50 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Private network without 2nd factor authentication - Windows Agent

Hello,

 

Users are complaining because the Windows Agent (in our case used for RDS-Applications) is always asking for the second factor (SecurID).
Is there a way to define a "secure network" so that the Windows Agent doesn't ask for the RSA SecurID Passcode?

In our case it would be great if we could define (in Authentication Manager) all our private client networks and set any policy for disabling MFA for source hosts in this networks.

 

Thank you.

 

Greets,

Manuel

Labels (1)
Labels
  • Labels:
  • Agents

  • Tags:
  • 2fa
  • Agent
  • Agents
  • Auth Agent
  • Authentication Agent
  • Community Thread
  • disable mfa
  • Discussion
  • Forum Thread
  • passcode
  • private client network
  • rds
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • two factor authentication
  • Windows Agent
  • windows authentication
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
8 Replies
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2019-03-26 09:52 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

You need to add each of these apps as an RDCFileName so that Windows does not try to push a Credential Provider to the user when they access these apps, so they won't get prompted with the SID credential provider to enter their Passcode. Add either in the Registry as an entry in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RSA\RSA Desktop\Local Authentication Settings\RDCFileName or as a GPO remote desktop connection.
https://community.rsa.com/docs/DOC-58298

The following discussion focused on adding Chrome as an RDC, if you want an example of what I'm talking about.

https://community.rsa.com/message/924431?commentID=924431#comment-924431 

1 Like
Share
Reply
ManuelHolzner
ManuelHolzner New Contributor
New Contributor
‎2019-03-26 10:57 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Hi Jay,


thanks for your fast reply.
But there is no possibility to add a policy in Authentication Manager to control this behavior centrally (like in CAS)?

For example if user's client is in 192.168.178.0/24 network, do not challenge him/her but if the same user comes with an OIP (because he/her isn't at the office)  challenge him//her.


Thank you.

0 Likes
Share
Reply
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
In response to ManuelHolzner
‎2019-03-26 11:43 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

There's limited Risk Based Authentication on the Authentication Manager, AM side of SecurID Access, which is what you are really asking about (is the user on Corporate LAN or somewhere else?) AM agents can only challenge based on group membership, and if you were to use AM Risk Based Authentication, RBA, your only choices are Password for low risk, and either Security Question Answers or On Demand Token Authentication, ODA if the risk is higher. ODA is basically a single TokenCode delivered via email or SMS text after you enter your PIN.

It's on the Identity Router, IDR interface to the SID Access Cloud that you can configure more granular policies for step-up authentication. 

0 Likes
Share
Reply
ManuelHolzner
ManuelHolzner New Contributor
New Contributor
In response to JayGuillette
‎2019-03-27 08:05 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

But there is actually no possibility to build this as policy in CAS, because the Windows Agent doesn't offer any ability to communicate directly with the IDR / CAS, right?
Also I'm wondering how I could create such a policy. In the Authentication-Logs of the AM I can only see the IP of the server running the windows agent as client ip, no "real" client ip..

 

Thank you.

0 Likes
Share
Reply
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2019-03-27 10:16 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

I'm not sure.  With the current Windows agent (which only works with Authentication Manager) you can challenge or not based on group membership, so theoretically if you could add users to an AD group based on their IP or subnet address, you could use that group as the challenge or not group, and you might accomplish what you are trying to do, that users with an IP on the "secure network" would not be challenged, either at the console or when accessing Remote Desktop Connections (which I think you still have to add as an an RDCFileName)

There will be a next Generation MFA agent for Windows, which will use the REST API to authenticate against either AM or CAS, due by end of year as far as I know.  You'd have to ask your Sales person about any early access.

0 Likes
Share
Reply
PAULGIBSON
PAULGIBSON Contributor
Contributor
‎2019-04-02 03:46 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

If these are in Active Directory, and an AD site is configured, you should be able to do this using a Group Policy. Create a new Group Policy Object and apply it to the site the computers are in

pastedImage_1.png

 

And set the RSA Agent setting to not challenge users

pastedImage_2.png

 

Computers NOT in the site can have MFA enabled, and when a computer IS in the site MFA can be disabled. I don't know the download link to the RSA Group Policy Templates, but I know it's available.

0 Likes
Share
Reply
EricaChalfin
Employee (Retired) EricaChalfin Employee (Retired)
Employee (Retired)
In response to PAULGIBSON
‎2019-04-02 04:58 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

You can find the GPO templates on the RSA Authentication Agent download page.  Just download the version of the agent you need.

 

Regards,

Erica

0 Likes
Share
Reply
ManuelHolzner
ManuelHolzner New Contributor
New Contributor
In response to EricaChalfin
‎2019-04-03 01:47 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Thank you all for your help. But I think you do not understand what I mean.

Actually I have a AD-Group to decide if a user has to be challenged or not (because we are in the rollout-phase).

But I need additionally a mechanism which decides based on the users location (client is using a private IP of our company or any OIP) wether the user has to be challenged or not.

If the user is in the company he should for example not be challenged.

 

Thank you.

 

Von meinem iPhone gesendet

 

Am 02.04.2019 um 23:00 schrieb Erica Chalfin <no-reply@rsa.com>:

 

 

 

 

Re: Private network without 2nd factor authentication - Windows Agent

reply from Erica Chalfin in RSA SecurID Access - View the full discussion

 

You can find the GPO templates on the RSA Authentication Agent download page. Just download the version of the agent you need.

 

 

Regards,

 

Erica

 

Reply to this message by replying to this email, or go to the message on RSA Link

Start a new discussion in RSA SecurID Access by email or at RSA Link

Following Re: Private network without 2nd factor authentication - Windows Agent in these streams: Inbox

This email was sent by RSA Link because you are a registered user.

You may unsubscribe instantly from RSA Link, or adjust email frequency in your email preferences

>

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.