2 Factor Authentication

0 vote

avatar

Hello,

We are using Remote Desktop Manager and Password Vault Manager for about 80+ users that mainly access the connections from outside the office (We're in IT Infrastructure services). Today I had some time to install Remote Desktop Manager to have a constant connection to the Database for adding and editing entries easily.
After installing I immediatly realised we're not going be able to use it... We have a strict security policy which dictates that something with sensitive data is not to be accessed from outside the internal network without 2 factor authentication.

At the moment, we are using Vasco (https://www.vasco.com/) for our 2FA needs which in it's turn uses the open RADIUS protocol. My feature thus is: is possible to incorporate AD+RADIUS authentication?

Example of how we use it for Citrix XenApp: https://citrix.savaco.com/vpn/index.html
- First field = username (same in AD as in Vasco DB)
- Second field = AD password (authenticates to AD, together with username from first field)
- Third field = Vasco PIN code + 6 digit secret from a token (authenticates with RADIUS to Vasco DB with username from first field)

Best regards,
Thomas Hofkens
Savaco NV
Belgium

All Comments (10)

avatar

Hello

I would suggest a macro

$USERNAME${TAB}$PASSWORD${TAB}%MYPIN%

In this example, I have stored the RSA PIN number in an environment variable therefore it's in my system only

You must go in the advanced settings of the session and check "allow password in variable"

When the macro finishes, focus will be in the third field after you PIN, you are left with entering the token and pressing enter

Maurice

avatar

Thank you for the suggested solution but that's not the problem.
I need a way to authenticate to Remote Desktop Manager Server with AD+Radius in the same way I connect to our XenApp environment.
In stead of just filling in username and password when connecting to Remote Desktop Manager Server (which people will automatically save, making all our customers' serverinformation and login information accessible for anyone who can log in to the usersession), we would need a third field for RADIUS authentication.

avatar

ah, you want us to add Radius authentication for RDMS itself, sorry for not getting that.

Its probably on our board already, but hasn't been addressed yet.

Maurice

avatar

+1 for RADIUS. I use YubiKey OTP with a Yubi Radius server and need to integrate that. I know about the Yubikey authentication feature but that doesn't achieve what I need, it's really just Radius I need to talk to.

avatar

I am having trouble getting this Macro to work properly, and I'm hoping you can help!

What is the proper way to apply this macro? I go to Events>After Connect, input the Macro in the Typing Macro field, but the connection authenticates before I have an opportunity to input the RSA information.

Is there another way I should configure this? I have multiple connections for which I will need to configure this macro.


















avatar

Getting this macro to work is essential to me and a team of about 200 others. I am part of a pilot group that is testing the RDM platform for a Help Desk, Managed Services, and Engineering company, and this is the oen feature that the pilot group and I have not been able to configure. If we can get this to work, it would make our operations much smoother and enable us to push for implementation of RDM, PVM, RDMS, and .msi Customization.

avatar

+1 to be able to use our own internal radius/2 factor authentication.

Could you possibly tell us where it sits on the request list?

avatar

Its on Devolutions Server list, not plain RDM.

The engineer assigned to that has 2 additional significant features to implement, I cannot say which of the three he will do next.

It should be done in March, no promises though.

Maurice

avatar

Maurice... any update on the use of our own internal radius server?

avatar

Hello,

Not yet, he finished AzureMFA which will be in soon to be released DVLS 3.2

I cannot say when he will start on radius yet. Sorry about that.

Maurice