Set Up Multi-Factor Authentication
You can set up Multi-Factor Authentication (MFA) for NetWitness using one of the following methods:
- ADFS Log in to NetWitness with SecurID Passcode.
- PAM SecurID Log in to NetWitness for AD Users.
- Azure ADFS Log in to NetWitness.
ADFS Log in to NetWitness with SecurID Passcode
Single Sign-On (SSO) functionality of NetWitness can be leveraged where the user authenticates using ADFS log in user interface with AD user credentials followed by the SecurID passcode.
Note: This method is suitable only for single AD users.
Prerequisites
-
The NetWitness Platform (NW) version 11.4 or later
-
MS Active Directory Federation Services (ADFS) - MS Windows Server 2012 R2 or later
-
MS Active Directory (AD) – MS Windows Server 2008 R2 or later
-
Authentication Manager (AM) 8.4 or later
-
Authentication Agent for ADFS 1.0 or later
Perform the following configurations:
Configure Authentication ManagerConfigure Authentication Manager
Configure Active Directory as an Identity Source in Authentication Manager using the steps described in the section Add an Identity Source.
Configure NetWitnessConfigure NetWitness
- Configure Active Directory for External Authentication to NetWitness using the steps described in the section Configure Active Directory.
-
NetWitness must be configured for SSO using the steps described in the section Configure Single Sign-On.
Configure ADFSConfigure ADFS
ADFS must be configured for SSO in NetWitness. You must copy the exported metadata (see step 9 in Configure Single Sign-On) to ADFS and perform the following steps:
-
Go to Server Manager > Tools > ADFS management > Trust Relationships.
-
On the right-side, click Add Relying Part Trust > Start.
-
Click Import data about the relying party from a file and select the metadata file.
-
Click Next, and enter a display name.
-
Click Next until the Close button is displayed.
-
Ensure the Open the Edit Claim Rules option is selected.
-
Click Close.
-
In the Edit Claim Rules dialog, click Add Rule.
-
In the Add Transform Claim Wizard dialog, click Next.
-
Enter a claim rule name.
-
In the Attribute Store drop-down menu, select Active Directory.
-
In the Mapping of LDAP attributes table, on the left-side select SAM-Account-Name and on right-side, select Name ID.
Note: Only one mapping is required.
-
Click Finish.
-
Click Apply.
-
Click OK.
Next you need to configure MFA using Authentication Agent in ADFS. The agent is freely available at (https://community.securid.com/t5/securid-authentication-agent-for/tkb-p/auth-agent-ad-fs-documentation) and for more information on configuration, see ® Authentication Agent 2.0.3 for Microsoft® AD FS Administrator's Guide.
PAM SecurID Log in to NetWitness for AD Users
In this method only SecurID Passcode is required for authenticating to NetWitness. Authentication Manager takes care of the authentication to AD without requiring the password from the user.
After the configuration, the user registered in the Active Directory can log in to NetWitness using the SecurID passcode.
Prerequisites
-
The NetWitness Platform (NW) version 11.0 or later
-
MS Active Directory (AD) – MS Windows Server 2008 R2 or later
-
Authentication Manager (AM) 8.2 or later
Perform the following configurations:
Configure Authentication ManagerConfigure Authentication Manager
Configure Active Directory as a Identity Source in Authentication Manager using the steps described in the section Add an Identity Source.
Configure NetWitnessConfigure NetWitness
Complete the additional configuration for Authentication Manager and NetWitness configuration as described in the section Configure PAM Login Capability.