Description:

Some scenarios require the Unified Firewall to assign special permissions to certain users or user groups, for example to access a specific network. The Single Sign-On (SSO) feature allows users to use one set of credentials to log in to multiple applications (domain login and Unified Firewall login). The Active Directory server reports successful domain authentications to the Unified Firewall, whereupon the latter assigns the configured permissions to the users.     

This article describes how the Single Sign-On feature is implemented via a Unified Firewall using the group policies of an Active Directory server.

The screenshots of the Windows Server installation are only available in german.

User groups must not be configured in the Unified Firewall but have to be imported from the Active Directory instead. If a user group is created in the Unified Firewall and an AD user is assigned to the group, this can otherwise lead to a termination of the SSO client connection and the connection not being functional after a reconnect!


Requirements:

  • Unified Firewall with LCOS FX as of version 10.4
  • Previously configured and functional local network including Internet connection
  • Windows Server with configured and functional Active Directory 
  • The Single Sign-on client for user authentication by Single Sign-On (you need access to Firewall License Portal in the LANcommunity portal first)


Scenario:

Users log in to the domain with their end devices. The appropriate permissions are automatically assigned by the Unified Firewall.


Procedure:

1) Configuration steps on the Windows Server:

This scenario was tested with a Windows Server 2019 system on a Windows Server 2016 domain functional level. The instructions refer to this version accordingly. 

1.1) Setting up a user for the Unified Firewall on the Windows Server:

1.1.1) On the Windows Server, open the menu Active Directory Users and Computers and go to the submenu <domain-name> → Users → New → User to create a new user.

1.1.2) Modify the following parameters and then click Next:

  • First name: Enter the name gpLogin.
  • Full name: Enter the name gpLogin.
  • User logon name: The user logon name must be specified in the format <full-name>/<firewall-hostname> (in this example gpLogin/rsuf). 
  • User logon name (pre-Windows 2000): Delete the firewall hostname so that only the full name is stored (in this example gpLogin).

Entries are case sensitive!      

If you have changed the hostname of the Unified Firewall in the menu Firewall → General Settings, this must be entered here accordingly.

1.1.3) Adjust the following parameters so that the user is permanently valid and then click Next:

  • Enter the password.
  • Uncheck the box User must change password at next logon.
  • Set a checkmark for Password never expires.

1.1.4) Click on Finish to close the wizard.


1.2) Associating the Service Principal Name to the Unified Firewall user:

The Service Principal Name (SPN) must be linked to the users for the Unified Firewall created in step 1.1.

On the Windows server, open the command line or Powershell with administrator rights and run the command setspn -A gpLogin/<firewall-hostname> gpLogin (in this example setspn -A gpLogin/rsuf gpLogin).


1.3) Provide the “UAClientSSO” file on the domain’s SYSVOL shared folder:

The application UAClientSSO is required for users to log in to the Unified Firewall via Single Sign-On.

Make the file UAClientSSO available in your domain’s shared folder. This is under the path \\<domain-name> \SYSVOL\<domain-name>\scripts (e.g \\ripshock.local\SYSVOL\ripshock.local\scripts). 


1.4) Create the group policy for Single Sign-On authentication:

1.4.1) Open the Group Policy Management, right-click on the domain and create a New Group Policy Object with a descriptive name (in this example SSO). 

1.4.2) Right-click the Group Policy Object created in step 1.4.1 and select Edit from the context menu.

1.4.3) Go to the menu User Configuration → Policies → Windows Settings → Scripts (Logon/Logoff) and double-click Logon.

1.4.4) Click Add.

1.4.5) Modify the following parameters:

  • Script name: Enter the full path to the shared folder with the UAClientSSO application that you provided in the domain shared folder in step 1.3. The path is specified in the format \\<domain-name> \SYSVOL\<domain-name> \scripts\UAClientSSO.exe(e.g \\ripshock.local\SYSVOL\ripshock.local\scripts\UAClientSSO.exe).
  • Script parameters: Enter the firewall hostname followed by the Unified Firewall IP address. The two parameters must be separated by a space. The input must be in the format <firewall-hostname> <IP-address of the firewall> (e.g rsuf 192.168.10.1).

1.4.6) Go to the menu Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Security Options → Network security: Configure encryption types allowed for Kerberos and enable the following encryption algorithms:

  • AES128_HMAC_SHA1
  • AES256_HMAC_SHA1
  • Future encryption types



2) Configuring the Single Sign-On feature on the Unified Firewall:

2.1) In your browser, open the configuration interface for the United Firewall and switch to the menu item User Authentication → Internal Portal → Settings.

2.2) Activate the login function via the slider button and click Save.

2.3) Go to the menu User Authentication → LDAP/AD.

2.4) From the drop-down menu for Server Type, select the option Microsoft Active Directory Server and adjust the following parameters:

  • Host: Enter the IP address of the Windows server with the Active Directory (in this example 192.168.10.2).
  • Port: Leave the port at the default value 389 or change it if you have changed it on the Windows Server.
  • User Name: Enter the user gpLogin as used by the Unified Firewall to log in to the Active Directory (see step 1.1.2).
  • Password: Enter the password that you set in step 1.1.3.
  • Domain Name: Enter the domain name of your Active Directory (in this example ripshock.local).

2.5) Click the button Test AD settings to ensure that the Active Directory login is working.

After testing successfully, click Save.

2.6) Open the menu LDAP/AD again and go to the Kerberos tab.

Here, click Create Kerberos Key and then Save



3) Authenticating a device:

If a user logs in to the domain with his end device, the permissions are automatically assigned by the Unified Firewall and communication in the permitted networks is possible.