Jump to content

PoC Guide: nFactor for Citrix Gateway Authentication with Group Extraction

  • Contributed By: Hemang Raval

Introduction

Large Enterprise environments require flexible authentication options to meet the needs of a variety of user personas. With Group Extraction user AD group membership determines the number, and type of nFactor authentication methods users are required to complete to verify their identity and access their applications and data.

Examples of user groups include:

  • normal-security-group for individuals that may have lower security requirements by the nature of their job or limited data access and are located within the bounds of the corporate security perimeter. This group may only require 1 factor.
  • elevated-security-group for third party workers or contractors who may not have had background checks done and have higher security requirements. This group may require 2 or more factors.
  • high-security-group for employees that perform critical jobs, and require special government clearance, or industry approval. This group may require 2 or more factors and contextual verifications such as source IP address.

Group Extraction Authentication

Overview

This guide demonstrates how to implement a Proof of Concept environment using two factor authentication with Citrix Gateway. It uses LDAP only to validate Active Directory credentials if the user’s endpoint is on a private subnet, indicating they are on the corporate intranet, or if they are a member of a “VIP” AD group such as a CXO. Otherwise, it is assumed they are located external to the perimeter of the Enterprise network and not a member of a group with lower security requirements, and are required to complete a second factor in the form of entering an email One Time Password (OTP). It uses a Citrix Virtual Apps and Desktops published virtual desktop to validate connectivity.

It makes assumptions about the completed installation and configuration of the following components:

  • NetScaler ADC installed, and licensed
  • Citrix Gateway configured with an externally reachable virtual server bound to a wildcard certificate
  • Citrix Gateway integrated with a Citrix Virtual Apps and Desktops environment which uses LDAP for authentication
  • Endpoint with Citrix Workspace app installed
  • Active Directory (AD) is available in the environment
  • Access to an SMTP server to originate email

Refer to Citrix Documentation for the latest product version, and license requirements: nFactor Group Extraction

nFactor

First, we log in to the CLI on our NetScaler ADC and enter the authentication actions and associated policies for LDAP and Email respectively. Then we log in to our GUI to build our nFactor flow in the visualizer tool and complete the multifactor authentication configuration.

LDAP Authentication policies

We create the LDAP actions, and the policies that reference them. We also create the Email action, and the policy that references it, which is the multifactor authentication method for users that are not members of the VIP group or on a local subnet.

For LDAP Actions populate the required fields to create the LDAP action in a string and paste it into the CLI:

  • ldapAction - enter the action name.
  • serverIP - enter the domain server/s FQDN or IP address.
  • serverPort - enter the LDAP port.
  • ldapBase - enter the string of domain objects and containers where pertinent users are stored in your directory.
  • ldapBindDn - enter the service account used to query domain users.
  • ldapBindDnPassword - enter your service account password.
  • ldapLoginName - enter the user object type.
  • groupAttrName - enter the group attribute name.
  • subAttributeName - enter the sub attribute name.
  • secType - enter the security type.
  • ssoNameAttribute - enter the single sign-on name attribute.
  • defaultAuthenticationGroup - enter the default authentication group.
  • alternateEmailAttr - enter the user domain object attribute where their email address can be retrieved.

For LDAP Policies populate the required fields to reference the LDAP Action in a string and paste it into the CLI:

  • Policy - enter the policy name.
  • action - enter the name of the Email action we created above.

For more information see LDAP authentication policies

  1. First connect to the CLI by opening an SSH session to the NSIP address of the NetScaler ADC and log in as the nsroot administrator or equivalent admin user.

LDAP action 1 - authAct_GroupExtract_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication ldapAction authAct_GroupExtract_genf -serverIP 192.0.2.50 -ldapBase "OU=Team M,OU=Team Accounts,OU=Demo Accounts,OU=Workspaces Users,DC=workspaces,DC=wwco,DC=net" -ldapBindDn workspacessrv@workspaces.wwco.net -ldapBindDnPassword 123xyz -encrypted -encryptmethod ENCMTHD_3 -ldapLoginName userPrincipalName -groupAttrName memberOf -subAttributeName cn -secType SSL -authentication DISABLED

LDAP policy 1 - authPol_GroupExtract_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication Policy authPol_GroupExtract_genf -rule true -action authAct_GroupExtract_genf

Group Extraction

LDAP policy 2A - authPol_LdapOnly_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication Policy authPol_LdapOnly_genf -rule "AAA.USER.IS_MEMBER_OF(\"VIP\") || client.IP.SRC.IN_SUBNET(10.0.0.0/8)" -action NO_AUTHN

LDAP policy 2B - authPol_TwoFactor_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication Policy authPol_TwoFactor_genf -rule "client.IP.SRC.IN_SUBNET(10.0.0.0/8).NOT" -action NO_AUTHN

LDAP action 3A - authAct_Ldap_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication ldapAction authAct_Ldap_genf -serverIP 192.0.2.50 -ldapBase "OU=Team M,OU=Team Accounts,OU=Demo Accounts,OU=Workspaces Users,DC=workspaces,DC=wwco,DC=net" -ldapBindDn workspacessrv@workspaces.wwco.net -ldapBindDnPassword 123xyz -encrypted -encryptmethod ENCMTHD_3 -ldapLoginName userPrincipalName -groupAttrName memberOf -subAttributeName cn -secType SSL -passwdChange ENABLED

LDAP policy 3A - authPol_Ldap_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication Policy authPol_Ldap_genf -rule true -action authAct_Ldap_genf

LDAP action 3B - authAct_LDAP_eotp_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication ldapAction authAct_LDAP_eotp_genf -serverIP 192.0.2.50 -serverPort 636 -ldapBase "DC=workspaces,DC=wwco,DC=net" -ldapBindDn workspacessrv@workspaces.wwco.net -ldapBindDnPassword 123xyz -encrypted -encryptmethod ENCMTHD_3 -ldapLoginName userPrincipalName -groupAttrName memberOf -subAttributeName cn -secType SSL -ssoNameAttribute userPrincipalName -defaultAuthenticationGroup Email-OTP -alternateEmailAttr otherMailbox

LDAP policy 3B - authPol_LDAP_eotp_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication Policy authPol_LdapEtop_genf -rule true -action authAct_LDAP_eotp_genf

Email Authentication policy

Populate the following fields to create the Email action and paste the completed string into the CLI:

  • emailAction - enter the action name.
  • userName - enter the user, or service account, that log in to the mail server.
  • password - enter your service account password to log in to the mail server. (The password is encrypted by the NetScaler ADC by default)
  • serverURL - enter the FQDN or IP address of the mail server.
  • content - enter the user message next to the field to enter the email code.
  • time out - enter the number of seconds the email code is valid.
  • emailAddress - enter the LDAP object to query for the user email address.

For the Email policy populate the required fields to reference the Email Action in a string and paste it into the CLI:

  • Policy - enter the policy name.
  • action - enter the name of the Email action

For more information see Email OTP authentication policy

Email action 4B - authAct_Email_eotp_genf

Update the following fields for your environment and copy and paste the string into the CLI:

add authentication emailAction authAct_Email_eotp_genf -userName workspacessrv@workspaces.wwco.net -password 123xyz -encrypted -encryptmethod ENCMTHD_3 -serverURL "smtps://192.0.2.40:587" -content "Your OTP is $code" -timeout 60 -emailAddress "aaa.user.attribute(\"alternate_mail\")"

Email policy 4B - authPol_Email_eotp_genf

Update the following fields for your environment and copy and paste the string into the CLI:

add authentication Policy authPol_Email_eotp_genf -rule true -action authAct_Email_eotp

Login Schema

lSchema 1 - lSchema_GroupExtract_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication loginSchema lSchema_GroupExtract_genf -authenticationSchema "/nsconfig/loginschema/LoginSchema/OnlyUsername.xml"

lSchema 2 - CheckAuthType_genf

The second factor does not require a Login Schema. It just has policies with expressions to check which factor to do next.

lSchema 3A - lSchema_LDAPPasswordOnly_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication loginSchema lSchema_LDAPPasswordOnly_genf -authenticationSchema "/nsconfig/loginschema/LoginSchema/PrefilUserFromExpr.xml"

Here you may receive a warning that http.req.user has been replaced with aaa.user. You must edit the xml file from the cli.

Group Extraction

To edit the xml file from CLI, do the following:

  1. Log in to the NetScaler ADC CLI
  2. Enter shell

Now you have two options:
Automated:

  1. Enter sed -i '' 's/http.req/aaa/' /nsconfig/loginschema/LoginSchema/PrefilUserFromExpr.xml
  2. Enter cat /nsconfig/loginschema/LoginSchema/PrefilUserFromExpr.xml to review the change

Manual:

  1. Enter cd /nsconfig/loginschema/LoginSchema
  2. Enter vi PrefilUserFromExpr.xml
  3. Enter /http.req
  4. Press x 8 times to delete the http.req string
  5. Press the escape key
  6. Press i and enter aaa, press the escape key again
  7. Press the colon key ‘:’, enter wq and press enter.
  8. NOTE that you can use this method to modify other aspects of the login schema such as the field prompts

lSchema 3B - lSchema_EOTPPasswordOnly_genf

Update the following fields for your environment and copy and paste the string into the CLI: add authentication loginSchema lSchema_EOTPPasswordOnly_genf -authenticationSchema "/nsconfig/loginschema/LoginSchema/PrefilUserFromExpr.xml"

NOTE: The 3B factor also uses the PrefilUserFromExpr.xml schema, but we label the policy differently for the EOTP path.

lSchema 4B - EOTP_genf

The fourth factor does not require a Login Schema. It generates the email with the One Time Passcode.

nFactor

  1. Log in to the NetScaler ADC GUI
  2. Navigate to Traffic Management > SSL> Certificates > All Certificates to verify you have your domain certificate installed. In this POC example we used a wildcard certificate corresponding to our Active Directory domain. See NetScaler SSL certificates for more information.
  3. Next navigate to Security > AAA - Application Traffic > nFactor Visualizer > nFactor Flows
  4. Select Add and select the plus sign in the Factor box

Visualizer

Factor1_GroupExtract_genf

  1. Enter Factor1_GroupExtract_genf and select create Group Extraction
  2. Select Add Schema
  3. Select the Login Schema lSchema_GroupExtract_genf
  4. Select OK
  5. In the same box select Add Policy
  6. Select the LDAP policy authPol_GroupExtract_genf
  7. Select Add
  8. Select the green plus sign next to the authPol_GroupExtract_genf policy to create another factor

Factor2_CheckAuthType_genf

  1. Enter Factor2_CheckAuthType_genf This Factor is used to verify the authentication requirements
  2. Select Create
  3. In the same box select Add Policy
  4. Select authPol_LdapOnly_genf
  5. Under Goto Expression select END
  6. Select Add Group Extraction
  7. Select the blue plus sign under the authPol_LdapOnly_genf policy to add a second policy
  8. Select the policy authPol_TwoFactor_genf
  9. Enter 90 for the Priority Here we make the Two Factor policy occur prior to the LDAP only policy by lowering the priority to 90 which is less than the default of 100. This ensures that remote users in the VIP group are identified for LDAP only authentication.
  10. Select Add

Factor3A_LDAPPasswordAuth_genf

  1. Back next to the authPol_GroupExtract_genf policy select the green plus sign to create another factor
  2. Enter Factor3A_LDAPPasswordAuth_genf
  3. Select Create
  4. In the same box select Add Policy
  5. Select authPol_Ldap_genf
  6. Under Goto Expression select END
  7. Select Add
  8. Select Add Schema
  9. Select the Login Schema lSchema_LDAPPasswordOnly_genf
  10. Select OK

Factor3B_EOTPPasswordAuth_genf

  1. Back next to the authPol_TwoFactor_genf policy select the green plus sign to create another factor
  2. Enter Factor3B_EOTPPasswordAuth_genf
  3. Select Create
  4. In the same box select Add Policy
  5. Select authPol_LdapEtop_genf
  6. Select Add
  7. Select Add Schema
  8. Select the Login Schema lSchema_EOTPPasswordOnly_genf
  9. Select OK

Factor4B_EOTP_genf

  1. Next to the authPol_LdapEtop_genf policy select the green plus sign to create another factor
  2. Enter Factor4B_EOTP_genf
  3. Select Create
  4. In the same box select Add Policy
  5. Select authPol_Email_eotp_genf
  6. Select Add
  7. Select Done and the nFactor flow is complete Group Extraction

NetScaler ADC authentication, authorization, and auditing (NetScaler ADC AAA) virtual server

  1. Next navigate to Security > AAA - Application Traffic > Virtual Servers and select Add
  2. Enter the following fields and click OK:
    • Name - a unique value. We enter GroupExtraction_AuthVserver
    • IP Address Type - Non Addressable
  3. Select No Server Certificate, select the domain certificate, click Select, Bind, and Continue
  4. Select No nFactor Flow
  5. Under Select nFactor Flow click the right arrow, select the Factor1_GroupExtract_genf flow created earlier
  6. Click Select, followed by Bind, followed by Continue Group Extraction

Citrix Gateway - virtual server

  1. Next navigate to Citrix Gateway > Virtual Servers
  2. Select your existing virtual server that provides proxy access to your Citrix Virtual Apps and Desktops environment
  3. Select Edit
  4. If you currently have an LDAP policy bound navigate under Basic Authentication - Primary Authentication select LDAP Policy. Then check the policy, select Unbind, select Yes to confirm, and select Close
  5. Under the Advanced Settings menu on the right select Authentication Profile
  6. Select Add
  7. Enter a name. We enter GroupExtract_AuthProfile
  8. Under Authentication virtual server click the right arrow, and select the NetScaler ADC AAA virtual server we created GroupExtraction_AuthVserver
  9. Click Select, and Create
  10. Click OK and verify the virtual server now has an authentication profile selected while the basic authentication policy has been removed Group Extraction
  11. Click Done

User Endpoint

First we test whether One Factor authentication is applied to VIP users by authenticating into our Citrix Virtual Apps and Desktops environment.

  1. Open a browser, and navigate to the domain FQDN managed by the Citrix Gateway. We use https://gateway.workspaces.wwco.net Group Extraction
  2. After your browser is redirected to a login screen. First enter a user name. We use wsvipuser@workspaces.wwco.net This user must be a member of the AD group VIP
  3. nFactor determines that the user is a member of the VIP group and you are prompted to submit the user password. Group Extraction
  4. Now the user is logged into their Workspace page.
  5. Select a virtual desktop and verify launch. Group Extraction

Now we test Two Factor authentication with Email OTP by authenticating into our Citrix Virtual Apps and Desktops environment again.

  1. Open a browser, and navigate to the domain FQDN managed by the Citrix Gateway. We use https://gateway.workspaces.wwco.net
  2. After your browser is redirected to a login screen. First enter a user name. We use wsuser@workspaces.wwco.net Group Extraction
  3. nFactor determines that the user is not local, nor a member of the VIP group, you are be prompted to submit the user password. Group Extraction
  4. The nFactor then presents a form requesting the OTP passcode. We copy and paste the passcode from the wsuser email account. Group Extraction
  5. Now the user is logged into their Workspace page.
  6. Select a virtual desktop and verify launch. Group Extraction

Summary

With Citrix Workspace and Citrix Gateway Enterprises can improve their security posture by implementing multifactor authentication without making the user experience complex. Group Extraction allows Enterprises to customize the depth of their multifactor use, along with contextual authentication, according to user group persona requirements.

References

For more information refer to:

NetScaler ADC Commands to Find the Policy Hits for Citrix Gateway Session Policies - learn more about CLI commands like nsconmsg -d current -g _hits to track policy hits to help troubleshoot.

nFactor for Citrix Gateway Authentication with Email OTP - learn how to implement an extensible and flexible approach to configuring multifactor authentication with nFactor for Citrix Gateway authentication with email one-time password.


User Feedback


There are no comments to display.



Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...