Print Download PDF Send Feedback

Previous

Next

Configuring Identity Agents

Identity Agent Deployment Methods

There are different Identity Agent deployment methods:

Configuring Identity Agent Deployment from Captive Portal

To configure Identity Agent deployment from Captive Portal:

  1. From the Identity Awareness page, select the Identity Agents checkbox.
  2. Select Browser-Based Authentication and click Settings.
  3. From the Portal Settings window, select the Require users to download checkbox to make users install the Identity Agent. Select which Identity Agent they must install. If you select this option and you do not select the defer option, users will can only access the network if they install the Identity Agent.
  4. To give users flexibility to choose when they install the Identity Agent, select Users may defer installation until. Select the date by which they must install it. Until that date a Skip Identity Agent installation option shows in the Captive Portal.
  5. Click OK.

Configuring Identity Agent Deployment for User Groups

When necessary, you can configure specific groups to download the Identity Agent. For example, if you have a group of mobile users that roam and it is necessary for them to stay connected as they move between networks.

To configure Identity Agent deployment for user groups:

  1. From the Identity Awareness page, select the Identity Agent checkbox.
  2. Select Browser-Based Authentication and click Settings.
  3. Select Name and password login and click Settings.
  4. Select Adjust portal settings for specific user groups - You can add user groups and give them settings that are different from other users. Settings specified for a user group here override settings configured elsewhere in the Portal Settings. The options that you configure for each user group are:
    • If they must accept a user agreement.
    • If they must download the Identity Agent and which one.
    • If they can defer the Identity Agent installation and until when.
  5. Click OK.

Server Discovery and Trust

Before the Identity Agent can connect to an Identity Awareness Gateway, the Identity Agent must discover and trust the server, to which it connects. There are several methods to configure this. The basic method is to configure one server. Another method is to deploy a domain-wide Policy, to connect to an Identity Awareness Gateway, based on the Identity Agent client current location.

Server Trust makes sure that the Identity Agent connects to a genuine Identity Awareness Gateway. It makes sure that the communication between the Identity Agent and the Security Gateway is secure. For example, Server Trust blocks man-in-the-middle attacks.

Trust is made with when the server fingerprint matches the expected fingerprint, as calculated during the SSL handshake.

There are different server discovery and trust methods:

Discovery and Trust Method

Description

File name based server configuration

If no other method is configured (out of the box situation), the Identity Agent downloaded from the Captive Portal is renamed to include the Captive Portal computer IP address in its name. During installation, the Identity Agent uses this IP address for the Identity Awareness Gateway. Users manually accept the server in the Trust window.

AD based configuration

If the Identity Agent computers are members of an Active Directory domain, deploy the server IP addresses and trust data with a dedicated Distributed Configuration tool (installed as a part of the Identity Agent).

DNS SRV record based server discovery

Configure the Identity Awareness Gateway's addresses on the DNS server. Users manually accept the server in the Trust window.

Note - This is the only server discovery method for the Mac OS Identity Agent.

Remote registry

All client configurations, including Identity Server IP addresses and trust data, are in the Windows OS Registry. Deploy these values before installing the client (by GPO, or other method that lets you remotely control the Windows registry). The Identity Agent uses the data immediately.

Prepackaging Custom Identity Agents

Create a custom version of the Identity Agent installation that comes with the Identity Awareness Gateway.

Configuring Identity Agents in SmartConsole

In the Identity Sources section of the Identity Awareness page, select Identity Agents to configure Identity Agent settings.

To configure the Identity Agent settings:

  1. Select Identity Agents and click Settings.
  2. From the Identity Agents Settings window, configure:
    • Identity Agent Access Settings
    • Authentication Settings
    • Session details
    • Identity Agent Upgrades

Identity Agent Access

Click Edit to select from where the Identity Agent can be accessed. The options are based on the topology configured for the Security Gateway.

Users can communicate with the servers if they use networks connected to these interfaces.

Session

Configure data for the logged in session using the Identity Agent.

Identity Agent Upgrades

Configure data for Identity Agent upgrades.

Note - When you install or upgrade the Full Identity Agent version, the user will experience a momentary loss of connectivity.

Troubleshooting Authentication Issues

Some users cannot authenticate with the Identity Agent

This issue can occur in Kerberos environments with a very large Domain Controller database. The authentication failure occurs when the CCC message size is larger than the default maximum size. You can increase the maximum CCC message size to prevent this error.

To increase the maximum CCC message size, use the procedure in sk66087.

Transparent Portal Authentication fails for some users

This issue can occur for users that try to authenticate with Kerberos authentication with the transparent portal. The user sees a 400 Bad Request page with this message:

Your browser sent a request that this server could not understand.

Size of a request header field exceeds server limit.

The authentication failure occurs because the HTTP request header is larger than the default maximum size. You increase the maximum HTTP request header to prevent this error.

To increase the maximum HTTP request header size, use the procedure in sk92802.