TOTPRadius : Azure AD Proxy mode

The LDAP proxy mode of TOTPRadius was introduced as a workaround for implementing 2FA access for systems without native support for multiple authentication sources. This works perfectly fine for organizations with full on-premises or hybrid Active Directory implementations where domain controllers can be accessed over the local network directly using LDAP protocol.

We are discovering more and more organizations moving to full cloud Azure AD implementation while keeping some services, such as VPN, on-premises. As the LDAP interface of Azure AD is not accessible directly, it was not possible to configure TOTPRadius to use Azure AD as its authentication source. 

This is the reason we added a new feature, Azure AD Proxy, which will address this gap. Starting from v0.2.7, TOTPRadius can be configured to use Azure AD as the authentication source.

Use Cases

There may be many use cases for Azure AD Proxy mode to be used. We will list only a few based on our recent experience:

  • A customer having no onPrem Active Directory, but wishing to implement Cisco Meraki Client VPN access to their corporate network
  • An organization having both onPrem and Azure Active Directory with a remote office with no domain controllers present and wishing to organize access to the network of the remote office via FortiGate VPN
  • An organization having both onPrem and Azure Active Directory; with no redundancy for local DC server, wishing to have Azure AD as the backup authentication source for the VPN access (LDAP Proxy and Azure AD Proxy modes can co-exist)


Operating principle

TOTPRadius Azure AD proxy mode is based on the OAuth 2.0  Resource Owner Password Credentials (RPOC) grant authentication protocol. 

Please note that the appliance should have access to the public internet for this mode to operate correctly. The network diagram will look like below.

TOTPRadius : Azure AD Proxy mode

The password supplied by the user is expected to contain both the Azure AD password and the 6 digits OTP. The supplied password is parsed and the OTP gets verified locally and AD password is checked via Azure AD using the RPOC method.

TOTPRadius : Azure AD Proxy mode

The ROPC flow is a single request: it sends the client identification and user's credentials to the IDP, and then receives tokens in return. The client must request the user's email address (UPN) and password before doing so. In case the user account is protected with any form of MFA, the expected results returned by the OAuth2.0 endpoint is :

if the correct password is supplied:

{"error":"interaction_required"...

if the supplied password is wrong:

{"error":"invalid_grant"...

In case the RPOC responds with "interaction_required", the authentication flow continues and if the OTP supplied is correct as well, a RADIUS response packet will be sent allowing the authentication.

Restrictions

With Azure AD Proxy mode only the primary factor (password) is verified against the Azure AD user records, the second factor is checked against the TOTPRadius local database only. The second factor supported is TOTP only, with fallback mechanisms such as SMS and Email. Please note that the fallback mechanisms are not recommended being used in production and there is no push notification possible.

The TOTP secrets imported in TOTPRadius can be the same as with Azure MFA - this will allow the users to use the same TOTP App profile or hardware token for TOTPRadius-connected authentication and Azure applications. You can also use a different set of TOTP secrets for TOTPRadius-hosted user records - in some scenarios this can enhance security even further.


Configuration

Follow the instructions below to configure your TOTPRadius in Azure AD Proxy mode. Before proceeding with the settings of TOTPRadius, you need to create an app registration within Azure. 

Configure the OAuth Resource in Azure AD

1. Navigate to the Microsoft Azure Portal and authenticate.

2. Navigate to Azure Active Directory.

3. Click on App Registrations.

4. Click on New Registration.

TOTPRadius : Azure AD Proxy mode

In the New Registration dialog, fill the form as shown on the example below, and click on “Register” to complete the action

TOTPRadius : Azure AD Proxy mode

After the App Registration is done, the Overview of the object will be shown (see example below).

TOTPRadius : Azure AD Proxy mode


Note down the 2 IDs shown on this page (this can be retrieved at a later stage as well):

- Application (client) ID

- Directory (tenant) ID

These values will be entered into the TOTPRadius configuration settings in the next steps.


Configure TOTPRadius for Azure AD proxy mode

Login to the admin panel of TOTPRadius and navigate to the setting page ('Settings' button on the main page, or Settings → General settings from the header menu)

TOTPRadius : Azure AD Proxy mode

Navigate to Azure Active Directory Proxy section and set the parameters as shown in the example below:

Azure AD Proxy - Set 'Enabled'

Tenant ID and Client ID - Set to the values generated and recorded in the previous step

Azure AD domain - Set to the main domain of your Office365 tenant . This value will be used to convert regular usernames to full UPN when TOTPRadius is used with systems not supporting UPN as the username.  For such systems, the username will be converted as in the example below: 

username  → [email protected]

TOTPRadius : Azure AD Proxy mode

To make sure the configuration is correct, you can use the 'test Azure AD' button. 


Provisioning the second factor in TOTPRadius

Due to technical limitations, only the primary factor (username+password) will be verified against Azure AD in this mode. The second factor (TOTP Secret) has to be provisioned independently for each user. This can be done via the admin panel as illustrated below:

TOTPRadius : Azure AD Proxy mode


Reusing hardware tokens from Azure MFA

If you have Azure AD Premium P1 or P2 and use OATH Tokens functionality of Azure AD, you can import the same csv file to TOTPRadius. This will allow your users to use the same hardware token for both Office365 apps and TOTPRadius-protected systems.

To import users from Azure MFA CSV file, navigate to Settings → Export&Import and upload the csv file in 'Import users using Azure MFA CSV file' section

TOTPRadius : Azure AD Proxy mode

Large Volume Orders
For large orders, Token2 offers volume discounts.If you are interested in larger volume orders, please contact us and we will get back with a quote immediately