

- #Sonicwall 2fa global vpn software#
- #Sonicwall 2fa global vpn password#
- #Sonicwall 2fa global vpn download#
The top-level DN that you wish to query from
#Sonicwall 2fa global vpn password#
The password for the above bind_dn account Port if LDAP server uses non-standard (i.e., 389/ 636)ĭN of a user with read access to the directory For all other LDAP-speaking directory services, such as OpenDJ or OpenLDAP, select LDAP: Select Active Directory if you have an AD Server. You may also opt not to use a first factor, in which case LoginTC will be the only authentication factor. You may use Active Directory / LDAP or an existing RADIUS server. We recommend setting the Request Timeout value to 60 seconds in the LoginTC RADIUS Connector and setting the RADIUS authentication server timeout to 70 seconds in SonicWALL SRA.Ĭlick Test to validate the values and then click Next:Ĭonfigure the first authentication factor to be used in conjunction with LoginTC. Make a note of what you set the Request Timeout to as you will need to use a larger timeout value in your SonicWALL SRA. The Application ID and Application API Key are found on the LoginTC Admin Panel. Number of seconds that the RADIUS connector will wait for The 64-character Application API Key, retrieve Application API Key The 40-character Application ID, retrieve Application ID You will now configure the LoginTC RADIUS Connector.Ĭreate a new configuration file by clicking + Create your first configuration:Ĭonfigure which LoginTC Application to us: Use username logintc-user and the password you set upon initial launch of the appliance. First ConfigurationĬlose the console and navigate to your appliance web interface URL. Section specific validation simplifies troubleshooting and gets your infrastructure protected correctly faster. Each section has a Test feature, which validates each input value and reports all potential errors. The web interface makes setting up a configuration simple and straightforward. It is strongly recommended to enable encryption of all sensitive fields for both PCI compliance and as a general best practice. This section describes which RADIUS-speaking device will be connecting to the appliance and whether to encrypt API Key, password and secret parameters. However with either a static list or Active Directory / LDAP Group you can control whom gets challenged to facilitate seamless testing and rollout. This section describes whether the appliance will perform a LoginTC challenge for an authenticating user. If no first factor is selected, then only LoginTC will be used for authentication. Either against an existing LDAP, Active Directory or RADIUS server. This section describes how the appliance will conduct an optional first factor. Only users that are part of your organization and added to the domain configured will be able to authenticate. This section describes how the appliance itself authenticates against LoginTC Admin Panel with your LoginTC Application. Configuration for SonicWALL 2FAĬonfiguration describes how the appliance will authenticate your RADIUS-speaking device with an optional first factor and LoginTC as a second factor. You will be asked to change the default password on first boot of the appliance and will not be able to access the web interface unless it is change. Logintc-user is used for SSH and web access. A firewall runs with the following open ports: Port The LoginTC RADIUS Connector runs CentOS 7.7 with SELinux. Once started, access the web interface by navigating to the URL mentioned in the information box:.For access to the web interface select Web Server and then Start: It may take 5-10 seconds to start the first time:.If you wish to manually configure the network, use the Down arrow key to navigate to Network Configuration and DNS Configuration By default the appliance network is configured by DHCP.The first thing you must do is set the logintc-user password:.You will be presented with a console dashboard:.Ensure that the LoginTC RADIUS Connector has a virtual network card.
#Sonicwall 2fa global vpn software#
Import the virtual appliance your computer virtualization software.
#Sonicwall 2fa global vpn download#
Download the latest LoginTC RADIUS Connector:.If you have already created a LoginTC Application for your deployment, then you may skip this section and proceed to Installation. e) that you want to protect with LoginTC.Ĭreate a LoginTC Application in LoginTC Admin Panel, follow Create Application Steps. An Application represents a service (e.g. An application is a service (e.g., VPN or web application) that you want to protect. Start by creating a LoginTC Application for your deployment. Computer virtualization software such as VMware ESXi, VirtualBox, or Hyper-V.Prerequisitesīefore proceeding, please ensure you have the following: SonicWALL SRA and any other appliance which have configurable RADIUS authentication are supported.
