MicroStrategy ONE

Enabling Two-Factor Authentication with MicroStrategy Identity to a VPN

You can provide an additional layer of security for users logging in to your virtual private network (VPN) by configuring MicroStrategy Identity to act as a second factor of authentication. For example, when users log in to your VPN, they enter their username and password, then enter an Badge Code provided via the MicroStrategy Badge app on their smartphone. In this example, the username and password is the primary factor of authentication, and the Badge Code on the user's smartphone is the secondary factor of authentication.

You can also add additional security to your VPN by requiring your users to enter a phrase of their selection when authentication the VPN connection through MicroStrategy Identity. This provides an additional layer of authentication for users logging into your VPN.

Your VPN is integrated with MicroStrategy Identity through a RADIUS server that communicates between your VPN server and MicroStrategy Identity Server. The Identity component that integrates with the RADIUS server and performs this role is called the Identity Module.

After you configure two-factor authentication with MicroStrategy Identity, users logging in to your VPN must authenticate with the MicroStrategy Badge app, in addition to providing their username and password. You can turn off two-factor authentication, and permit users to log in to your VPN by providing their username and password only. For steps, see Turning On or Off Two-Factor Authentication with MicroStrategy Identity.

Setting up Two-Factor Authentication

Perform the following procedure to enable two-factor authentication to your VPN.

You are integrating MicroStrategy Identity with one of the following VPN configurations:

To Create a Certificate Signing Request (CSR)

You enable private communication between the MicroStrategy Identity Server and MicroStrategy Identity components running locally on your system by configuring them to use SSL (secure sockets layer) encryption while communicating with each other. To do this, you must obtain an SSL certificate signed by MicroStrategy Identity. You generate the signed certificate by submitting a certificate signing request (CSR) through MicroStrategy Identity Manager to be signed by MicroStrategy Identity.

Use a third-party tool to create a certificate signing request (CSR) that meets the following requirements:

  • RSA key size of at least 3072 bits
  • Hash algorithm of SHA-256 or higher
  • The CSR uses the following values:
    • Organization Name: Usher
    • Organizational Unit Name: Agent

You can create a certificate signing request (CSR) using the OpenSSL® utility. If you have installed MicroStrategy Identity on Windows, the OpenSSL utility is included. Alternatively, you can download the OpenSSL utility from https://www.openssl.org/community/binaries.html. On Linux, an openssl utility is included with many distributions.

The steps below contain only the information required to configure or use OpenSSL with MicroStrategy Identity. See the OpenSSL documentation for the latest information.

To Create a CSR Using OpenSSL

  1. Depending on your platform, do one of the following:
    • Windows: Open a command prompt window as administrator, and navigate to the location where OpenSSL is installed.
      • If you use the utility installed with MicroStrategy Identity, the default is C:\Program Files (x86)\Common Files\MicroStrategy\OpenSSL\openssl-1.0.2e\.
      • If you installed the utility manually, the default is C:\OpenSSL- Win32\bin.
    • Linux: Open a terminal window.
  2. To create a private key and certificate signing request (CSR), enter the following command:

    openssl req -new -newkey rsa:rsaKeySize -shaHashAlgorithm -nodes -subj '/O=Usher/OU=Agent' -keyout KeyName.key -out CSRName.csr

    where:

    • rsa:rsaKeySize = the RSA key size. For example, enter rsa:3072 to create an RSA key size of 3072 bits.
    • -shaHashAlgorithm = the hash algorithm. For example, enter -sha256 to use the SHA-256 hash algorithm.
    • KeyName.key = the name that you want to give the private key file. By default, the private key file is created in the current location. To create the file in a different location, include the location path in the KeyName.key parameter.
    • CSRName.csr = the name that you want to give the CSR file. By default, the CSR file is created in the current location. To create the file in a different location, include the location path in the CSRName.csr parameter.

      For example: openssl req -new -newkey rsa:3072 -sha256 -nodes -subj '/O=Usher/OU=Agent' -keyout UsherApp.key -out UsherApp.csr

      A CSR (.csr) file and a private key (.key) file are created.

Next, configure your VPN server to use MicroStrategy Identity for two-factor-authentication.

Turning On or Off Two-Factor Authentication with MicroStrategy Identity

  1. Log into MicroStrategy Identity Manager.
  2. Click Logical Gateways.
  3. Under VPN Configuration, click Edit.
  4. Set the Enable VPN access with MicroStrategy Identity option:
    • On — requires users to authenticate with MicroStrategy Identity in addition to providing their username and password.
    • Off — allows users to log in with their username and password only.
  5. Review the confirmation message and click Yes.
  6. Click Save.

Related Topics

Creating a MicroStrategy Identity Network and Issuing an Administrator Badge

Managing Users from an IDM System that is Synchronized with MicroStrategy Identity

Logical Gateways

Categorizing MicroStrategy Badge Resources