Remote Access with Citrix NetScaler Gateway — Legacy RADIUS Experience

Imprivata Enterprise Access Management (formerly Imprivata Confirm ID) integrates with Citrix NetScaler Gateway to streamline authentication management and simplify two-factor authentication for remote access for employees. In addition to logging in remotely, Enterprise Access Management users can also enroll authentication methods from outside your network.

Enterprise Access Management also offers a customized user interface for Citrix NetScaler. When logging in remotely and enrolling authentication methods, the user interface will closely resemble the Imprivata enrollment utility on the Imprivata agent.

Before You Begin

Review Enterprise Access Management MFA Supported Components to confirm that your version of Citrix NetScaler Gateway is supported. Fully configure your Citrix NetScaler Gateway environment for remote access with single-factor username and password authentication before configuring its connection to Imprivata.

BEST PRACTICE:

To plan your rollout and learn how Remote Access works, start here.

Best Practice — Use Graphical User Interface on the Web Portal

Enterprise Access Management offers a graphical user interface for your users when logging in remotely and enrolling authentication methods. You can enable this interface with one click when setting up the Imprivata RADIUS host below.

Remote Access with Imprivata ID

This is one example of a typical Remote Access configuration; your gateway software and Enterprise Access Management configuration may vary.

Diagram: Two-Factor Remote Access Authentication

click to enlarge

  1. The user initiates primary authentication to the Citrix NetScaler Gateway.
  2. The Citrix NetScaler Gateway sends a RADIUS access request to the Imprivata appliance.
  3. The Imprivata appliance sends a push token request to the Imprivata Cloud Token Service.
  4. Imprivata Cloud Token Service sends a push notification to the Imprivata ID app on the user's device.
  5. The user accepts the push notification from the Imprivata ID app, and the device sends a token to the Imprivata Cloud Token Service.
  6. The Imprivata Cloud Token Service sends a push token accept to the Imprivata appliance.
  7. The Imprivata appliance sends RADIUS access accept to the Citrix NetScaler Gateway.
  8. The Citrix NetScaler Gateway access granted to the user.

Configure Imprivata Remote Access

Add a New RADIUS Client

To enable Imprivata to serve your RADIUS client, name your RADIUS client and configure the NAS address / SNIP address on the Imprivata Admin Console:

  1. In the Imprivata Admin Console, go to Applications > Remote access integrations.
  2. Click Add new RADIUS client.
  3. On the Add new RADIUS client screen:
    • Select a Client type
    • Enter a descriptive Client name
    • Enter the Hostname or IP address of the RADIUS client. (The RADIUS client may also be referred to as the Network Access Server (NAS) or VPN Server);
    • Enter the Encryption key (shared secret).
    • BEST PRACTICE: This encryption key will be used as a shared secret between your server and RADIUS client. Use a computer-generated string of 22 to 64 characters in length.

      You do not need to repeat this process for each Imprivata appliance. This client configuration is distributed to all Imprivata appliances in your enterprise.

  4. Click Save.

Optional — Non-licensed User Access

When you integrate Enterprise Access Management Remote Access with your gateway, the following users will be blocked from logging in:

  • Enterprise Access Management users who are not licensed for Remote Access, and

  • All non-Imprivata users: users not synced with the Imprivata users list.

However, you can override this default behavior and allow remote access for these users:

  1. In the Imprivata Admin Console, go to Applications > Remote access integrations.

  2. Select the RADIUS client.

  3. In the section Non-licensed user access, select Allow remote access for users without a Confirm ID for Remote Access license.

  4. Click Save.

This option uses Active Directory authentication for these users only, bypassing Enterprise Access Management authentication.

Active Directory Groups Queried

Users synced with the Imprivata appliance — The Imprivata appliance will query direct group and nested group memberships.

Users not synced with the Imprivata appliance — The Imprivata appliance will only query direct group memberships.

Troubleshooting — Nested Groups Not Queried

If you allow non-licensed user access and a non-Imprivata user is still blocked from Remote Access, their Active Directory group may be nested and not queried in this Remote Access Log In workflow.

Example — A user who is a member of Group1, where Group1 is a member of Group2 is not considered to be a member of Group2 and will not be queried for non-Imprivata users attempting Remote Access.

If you need to provide remote access to non-Imprivata users in nested groups, sync them with the Imprivata appliance. You do not need to license them for any Imprivata features. The sync alone will cause them to be queried by Enterprise Access Management for Remote Access.

CAUTION: All users synced with the Imprivata appliance must be added to a user policy. If you do not want these users consuming any licenses, verify that the user policy they're added to consumes no licenses (the Imprivata Admin Console may present a Caution on this user policy stating these users will not be able to log in; this message can be ignored in this specific case). See Creating and Managing User Policies and Synchronizing the Users List.

Optional - Configure RADIUS Group Attributes

Some RADIUS clients demand return information about authenticating users in the form of RADIUS attributes. See Managing RADIUS Connections

Troubleshooting The RADIUS Connection

You can troubleshoot the connection between your RADIUS client and the Imprivata appliance by viewing serverProxy.log:

  1. On the Imprivata appliance, go to System > Logs.

  2. In the section Log data export, export the log data for the period you wish to troubleshoot.

  3. Click View files.

  4. In the index of logs, open RadiusENA/serverProxy.log.gz

  5. The communication between the RADIUS client and the Imprivata appliance is logged here.

Examples

  • If you see the message Source IP address [ip address] does not have a NAS entry, the IP address for the RADIUS client may have been entered incorrectly or not configured at all.
  • If you see no entries in the log, and the Imprivata appliance does not respond to the request from the RADIUS client, this may mean:
    • The IP address for the Imprivata appliance was not entered properly on the RADIUS client.
    • The authentication port for the Imprivata appliance was not set to 1812 on the RADIUS client.
  • If you see the message The Remote Authentication failed, either because the assigned user policy has no permission configured in the Authentication subtab OR the user's credentials failed, this may mean:
    • The encryption key (shared secret) does not match on the RADIUS client and the Imprivata appliance; or
    • The RADIUS client is configured to use an unsupported protocol.
  • Push Notifications — If the Imprivata Admin Console reports an authentication via push notification succeeded, but the RADIUS client reports the authentication timed out, the timeout value on the RADIUS client may need to be increased.

To create and run a RADIUS Activity report, in the Imprivata Admin Console, go to Reports > Add new report.

Configure the Citrix NetScaler Gateway VPN

Add a virtual server, configure RADIUS as your primary authentication method, and create a secret key.

  1. On the Citrix NetScaler Gateway Configuration Utility, go to the Configuration tab > NetScaler Gateway > Virtual Servers.
  2. Click Add.
  3. Enter a name and IP address for your virtual server.
  4. Set the port to 443.
  5. Click OK.
  6. Set the binding to your server certificate.
  7. In the section Authentication, click the plus sign to add a primary authentication method.
  8. Select RADIUS Policy and set the Type to Primary.
  9. In the section Authentication, click the name RADIUS Policy. The VPN Virtual Server Authentication RADIUS Policy Binding window opens.
  10. Click the policy to highlight it and then cllick Edit > Edit neo.server label.
  11. In the Configure Authentication RADIUS Server window, enter a name.
  12. In the IP Address field, enter Imprivata appliance / RADIUS server IP address.
  13. NOTE: If you will be using Citrix NetScaler Gateway to configure load balancing directly, enter the SNIP for RADIUS source IP address (NAS) here. See Citrix NetScaler RADIUS Load Balancing.

  14. The Port for Imprivata appliances = 1812.
  15. Create a secret key to enter here. You will also enter this key as the "encryption key" in the Imprivata Admin Console (see Imprivata Remote Access).
  16. Click Done.
  17. In the Policies section, click the policy to highlight it, and then click Edit > Edit Policy.
  18. If your RADIUS server is not selected, select it now.
  19. Set the Expression to ns_true.
  20. Click OK.

NOTE: The Enterprise Access Management (Imprivata Confirm ID) RADIUS server only supports PAP protocol. CHAP protocols are not supported. Configure your RADIUS clients for PAP protocol to support Enterprise Access Management.

Optional — Native Citrix Workspace app Support

Enterprise Access Management supports remote access via native Citrix Workspace app, but the following configuration is required if you need to provide remote access via native Citrix Workspace app and remote Citrix access via the web portal.

In this section, configure one Citrix server for the web portal, and direct the native Citrix Workspace app to a subnet IP address. Then configure Enterprise Access Management for two separate Remote Access clients.

NetScaler Network IP Addresses

  1. Log into the Citrix NetScaler Admin page > Configuration > System > Network > IPs

  2. Make a note of the IP addresses: NetScaler IP and Subnet IP.

Add Two RADIUS Clients

In this section, set up two RADUIS clients: one for traffic from the Citrix web portal, and one for traffic from the native Citrix Workspace app. The web portal can use Enterprise Access Management's graphical user interface, while the native Citrix Workspace app must use the text-based interface.

  1. In the Imprivata Admin Console go to Applications > Remote access integrations.
  2. Click Add new RADIUS client.
  3. Add a Citrix NetScaler RADIUS client using the NetScaler IP.
  4. Select the graphical user interface.
  5. Add a second Citrix NetScaler RADIUS client using the Subnet IP.
  6. Select the Text-based user interface.
  7. For more details, see Add a New RADIUS Client above.

Create a Load Balancing Server

  1. Log into the Citrix NetScaler Admin page > Configuration > Traffic Management > Load Balancing > Server and click Add.
  2. Create a load balancing server: Enter your Imprivata appliance information.
  3. Click Create.

Create a Load Balancing Service

  1. Go to the Citrix NetScaler Admin page > Configuration > Traffic Management > Load Balancing > Services and click Add.
  2. Create a load balancing service: Use the just-created load balancing server as the service provider.
  3. Click OK.

Create a Load Balancing Virtual Server

  1. Go to the Citrix NetScaler Admin page > Configuration > Traffic Management > Load Balancing > Virtual Servers and click Add.
  2. Create a load balancing virtual server:
    1. Protocol = RADIUS;
    2. Enter a domain IP address;
    3. RADIUS port = 1812
    4. Bind the just-created load balancing service to the virtual server.
  3. Click Done.

Create an Authentication RADIUS Server

  1. Go to the Citrix NetScaler Admin page > Policies > Authentication > RADIUS > Servers.
  2. Create an authentication RADIUS server by using the just-created Load Balancing Virtual Server:
    1. Create a secret key to enter here. You will also enter this key as the "encryption key" in the Imprivata Admin Console (see Imprivata Remote Access).
    2. Change the Time-out value to 30 seconds or greater.
  3. Click Create.

Create Two RADIUS Authentication Policies

  1. Go to the Citrix NetScaler Admin page > Policies > Authentication > RADIUS > Policies.
  2. Bind one policy to the normal Imprivata appliance, and the other policy to the just-created RADIUS "load balancing" virtual server which is, in reality, also pointing to the Imprivata appliance.

Bind RADIUS Authentication Policies to the Virtual Server

Bind the two RADIUS authentication policies to the NetScaler Gateway Virtual Server for the user login interface:

  1. Go to the Citrix NetScaler Admin page > Virtual Gateways.
  2. Add or configure a gateway virtual server and bind the two RADIUS authentication policies to the virtual server.

Optional — Citrix NetScaler RADIUS Load Balancing

BEST PRACTICE: In large deployments, configure load balancing to distribute RADIUS authentications among Imprivata appliances within the Imprivata enterprise.

This section describes how to configure the Citrix NetScaler Gateway load balancer to distribute the traffic load to all your Imprivata appliances in production. If your Citrix NetScaler Gateway license does not include load balancing, another load balancing solution should be used to distribute RADIUS traffic from the Citrix NetScaler Gateway to all your Imprivata appliances in production.

In a large deployment, you should not configure the Citrix NetScaler Gateway to send all RADIUS requests to one Imprivata appliance.

On the Citrix NetScaler Gateway Configuration Utility, go to the Configuration tab > Traffic Management > Load Balancing > Servers:

  1. Create Servers: Add the names and IP addresses or domain names for each Imprivata production appliance in your enterprise.
  2. Add A Service Group: Add your Imprivata appliances into a service group. Configuring a service group enables you to manage a group of Imprivata appliances as easily as a single appliance.
  3. Add a Virtual Server: Add a Virtual Server for your service group.

Optional — Returning An Active Directory Password in the RADIUS Response

Imprivata Confirm ID can be configured to return the authenticating user's Active Directory (AD) password back to the RADIUS client as part of the RADIUS Accept-Accept response.

Allow or Restrict Access Based on RADIUS Attributes

Optional — Configure the VPN via the CLI

You may find it easier to configure Citrix NetScaler via the CLI.