Follow

How can I install RWWGuard 2008?

Configuring RWWGuard 2008

On installation RWWGuard 2008 is initially disabled. RWWGuard 2008 must be configured to communicate to an Two Factor Auth strong authentication server before it can start offering two-factor authentication to remote users.

Enabling RWWGuard Support

When you ready to enable strong authentication for users in Remote Web Workplace, simply select the “Enable Two Factor Auth passcode field in RWW logon page” checkbox.

Selecting the Authentication Policy

With RWWGuard 2008, you can control who is required to prove their identity with an AuthAnvil Two Factor Auth credential or not. Using the “AuthAnvil Authentication Policy”, you can either configure the policy to be:

  • Required only for users in the exception list; or
  • Required for all users except those in the exception list

Combined with the AD Security Group Exception List, which is a defined Active Directory Security Group, users can be added or removed to adjust the required policy within Remote Web Workplace.

Configuring Two Factor Auth settings

RWWGuard can communicate via web services directly with an Two Factor Auth strong authentication server to validate an OTP Passcode. In the “Two Factor Auth SAS URL” you need to configure the URL where the Two Factor Auth TokenValidator service lies, and the Site ID that your company is configured to.

Example: https://localhost/AuthAnvil/SAS.asmx

Note: You may need to configure your firewall to allow for HTTPS to be spoken to/from the server. For safety and security of the user PIN and OTP, it is NOT recommended to use the clear text HTTP protocol.

Note: The SBS Server where RWWGuard resides MUST trust the remote digital certificate if connecting to an external Two Factor Auth server. The easiest way to test this is to click the “Verify URL” button in the Configuration tool.

Using RWWGuard 2008

Normal Operations

When RWWGuard 2008 is installed but not enabled, it will continue to provide detailed audit logging in the RWWGuard Event Log. It looks and acts EXACTLY like the traditional Remote Web Workplace logon page, with the one caveat that RWWGuard 2008 does not currently support the “Change Password” functionality if an Active Directory password expires.

When RWWGuard 2008 is enabled, a new OTP Passcode field is added to the logon form.

If a user is required to provide an OTP Passcode, the username is sent along with the OTP Passcode to the configured Two Factor Auth SAS. On success, the active directory credentials are then verified, and finally logon to Remote Web Workplace occurs.

Reviewing Audit Logs

Viewing the Authentication Logs

RWWGuard provides detailed audit logs for all users who use Remote Web Workplace. Included in this are the following fields:

  1. Active Directory Username
  2. Logon Time
  3. Status
  4. IP Address

You can view these logs directly in the RWWGuard log in Event Viewer under the Applications and Services Logs.

Conclusion

Congratulations! There is always so much to see in a new product, and you have just successfully completed an installation and review of the key features of Scorpion Software’s RWWGuard 2008 product.

While this Installation Guide can only cover the highlights of RWWGuard 2008 in action, we have been able to see several key points:

  1. RWWGuard 2008 is easy to set up and install. As a built in web application on SBS2008 and EBS2008, it blends easily with your existing management process.
  2. RWWGuard 2008 protects your small business and enhances its remote access security with the addition of two-factor authentication directly into Remote Web Workplace.
  3. RWWGuard 2008 not only highlights logon failures, it allows the administrator to go from high-level detection to detailed analysis of current password policies.

 

Questions?

If you have any questions or need some help, we would be happy to assist. Open a case at help.scorpionsoft.com or send an email to support@scorpionsoft.com.

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

Powered by Zendesk