This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • NetWitness Community
  • Support
  • Community Support
  • Ideas & Suggestions
  • Fail Open authentication - Cloud Authentication
  • Options
    • Subscribe to RSS Feed
    • Mark as New
    • Mark as Read
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content

Fail Open authentication - Cloud Authentication

Marcus
Marcus New Contributor
New Contributor
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Printer Friendly Page
  • Report Inappropriate Content
‎2019-10-07 01:57 PM
Status: New

Currently we authenticate users via AD, then enforce the multi authentication ( Approve, Token, Voice etc)

 

When we see an issue with the RSA cloud ( which I was promised should never happened but I digress), we are forced to log into the radius client itself, and switch from pointing to IDR to point to something else ( such as AD directly)

 

I would like to see more flexibility for fail open/close type scenarios like this, where the administrator would not need to take any extra steps in order to have users log into the system. I am asking for flexible options as I don't think there will be a 1 solution fits all type scenario.

 

This means to 1st implement a fail option that can be set per policy. This means when creating a new policy, currently there are sections called

  • 1. Basic Information
  • 2. Identity Sources
  • 3. Rule Sets

 

I would propose a 4th section called " Fail Open/Close Options " ( I believe policy is the best place as all devices using the same policy typically would leverage the same fail open/close open, vs doing this in the Radius Client config)

 

Within the 4th section called " Fail Open/Close Options ", I am proposing these options:

   1 - Fail Close - No access to the system if cloud is unreachable ( Some super secret services would want this)

   2 - Fail Open

         a - Allow Auth via 1st factor only ( in our case a user would have entered their AD credentials and this would allow them in - in our case the device in question leverages certs as 1st factor, and AD creds as 2nd factor)

         b - Fall back to internal Access Manager authentication for MFA

         c - This option would require the most work on DEV side, but would be the best option for most companies - IDR should function as local Authenticate Token Replica where the token code on the users device can be leveraged.  This means the IDR senses the cloud is down, and can respond back to the radius client with a special message " Primary Authentication Cloud is not accessible, please enter Authenticate Token to continue"

         d - Allow any other custom directory authentication - can't think of one outside of AD, maybe an option to tie to a different LDAP such as IBM LDAP ( a SAML auth would be far fetched, but this is the RSA Ideas section where anything goes)

 

thanks

  • idea
  • ideas
  • ideation
  • IDR
  • idr authentication options
  • rsa ideas
  • RSA Link Idea
  • RSA Link Platform Idea
  • RSA Link Platform Suggestion
  • RSA Link Suggestion
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • Suggestion
1 Like
  • Back to Idea Exchange
  • Previous
  • Next
1 Comment
Status changed to: Proposed
rsalinkadmin
Administrator rsalinkadmin Administrator
Administrator
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2021-08-12 08:49 PM
‎2021-08-12 08:49 PM
 

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
  • Back to Idea Exchange
  • Previous
  • Next
Idea Statuses
  • New 76
  • Needs Info 0
  • Investigating 0
  • Accepted 0
  • Declined 0
  • Delivered 0
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.