Skip to main content

Configuring authentication modules

A number of configuration options are displayed in the Module configuration table, depending on the module type.

To configure a module:

2777.png

Password authentication module (password.pss)

The password authentication module runs the built-in password.pss authentication program. Set the following for the password authentication module:

If module succeeds, bypass this module in failed attempt retries

The module is not shown again for authentication if the authentication chain fails and is retried from a failed attempt and the module had succeeded in a previous attempt.

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Note : If a product administrator helps another user via the HELPDESK_LOGIN chain, and the Increment lockout counter when this module fails option is disabled for any of the modules in that chain, then the global fail counter will still increase if the product administrator fails to correctly answer any of the questions during help desk authentication. However, this does not cause the user to be locked-out, even if the number of failed attempts reaches or exceeds the value set by MAX USERAUTH FAILURE.

Security questions module (response.pss)

The security questions module runs the built-in response.pss authentication program.

Set the following for the security questions authentication module:

If module succeeds, bypass this module in failed attempt retries

The module is not shown again for authentication if the authentication chain fails and is retried from a failed attempt and the module had succeeded in a previous attempt.

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Note: If a product administrator helps another user via the HELPDESK_LOGIN chain, and the Increment lockout counter when this module fails option is disabled for any of the modules in that chain, then the global fail counter will still increase if the product administrator fails to correctly answer any of the questions during help desk authentication. However, this does not cause the user to be locked-out, even if the number of failed attempts reaches or exceeds the value set by MAX USERAUTH FAILURE.

If a user does not have a valid security questions profile

Defines which action to take when a user does not have a complete security questions profile. If a user’s security question profile is incomplete and this option is set to:

Abort login immediately – The entire authentication chain is not available as an authentication method for the user and is not displayed.

Fail this module – The response.pss module is treated as a failure. If the Control type for this module is set to either:

  • sufficient or optional, and the other modules in the authentication chain are valid for the user, then the user can still authenticate using the other modules.

  • binding, required or requisite then the entire authentication chain is not available as an authentication method for the user and is not displayed.

  • Bypass this module – The response.pss module is completely ignored regardless of Control type, even if set to required .

Caution

If this option is set and the module is bypassed, and the remaining modules are set to either sufficient or optional , then access is not immediately granted. At least one of the remaining modules must pass in order to gain authentication.

Interval to re-sample questions when a user fails to provide correct answers

Controls whether or not new questions are selected for a user if they previously answered incorrectly. You can choose the period of time before the questions are re-sampled from the drop-down list. When this period of time expires, a different set of security questions are randomly chosen for the user. The default is to re-sample security questions after an hour. Question sets are often configured to select a random subset of the questions in a user’s profile. For example, a user may have 5 questions enrolled in a given question set. The question set may be configured to prompt the user for a random 2 of those questions.

One of the objectives of random selection is to make it harder for an attacker to predict what questions will be presented. An attacker could respond to a displayed set of questions, which he cannot answer, by abandoning the login process and trying again.

This setting allows you to prevent an attacker from ”shopping” for a set of questions to which he has gathered answers. It also prevents the attacker from getting an exhaustive list of questions which might be asked of a given user, which he can then research answers to.

Number of questions to ask during authentication

Provides more control over how many questions to ask from each question set. If you do not change this setting, it defaults to the setting for each individual question set.

You can choose:

  • From all question sets Choosing a number from this drop-down list allows you to specify how many questions the user is asked.The questions are randomly selected from all available question sets. Setting this value automatically changes the value for individual question sets to (None).

    Note: This setting is not intended to work for SecurID questions when the user’s token is in extended mode, such as the next token code or new PIN modes.

  • From [<questionset>] Each available question set has a drop-down list, allowing you to specify how many questions the user is asked from each question set. Changing this value automatically changes From all question sets to (None).

    Note: If javascript is disabled, then you must manually set From all question sets to (None) before changing the value for any of the individual question sets.

Configuration notes for the Security questions module:

  • Modules for external security question sets should be set to the effective setting, and all other question sets should be set to (None). These modules should also have the From all question sets value set to (None).

  • The external question sets should be set to 0 when configuring values for other question sets, such as those for the user-defined and pre-defined question sets.

  • Selecting (None) for all of the question sets for a module resets all of the values for the question sets to use the default question set values.

  • When configuring a question set, if you deselect the Ask users to answer questions from this set setting:

    • Then the question is no longer available for use with the default login authentication chain.

    • External question sets still work via legacy Front-end configuration.

  • If you add a new question set, you may need to reconfigure the response.pss module for an authentication chain. The new question set is added to existing response.pss modules for all authentication chains with the value for the number of questions to ask users/help desk set to the effective setting.

External program module (external.pss)

The external program module runs the built-in external.pss module, which interfaces with an external authentication program.

Bravura Security Fabric ships with several sample scripts that can be used with this module, listed below:

Table 1. External authentication plugin samples

Sample script

Description

authplugin.psl

A simple demonstration of this kind of plugin.

httpauth.psl and httpauth.exe

Generic tools for web server (NTLM, SmartCard) authentication integration.

authanonreg.psl

Provides authentication to anonymous users who do not have pre-existing credentials, allowing them to submit pre-defined requests for new users.

authuserattr.psl

Allows authentication using profile attributes, such as date of birth and email address.



These files are installed with a complete Bravura Security Fabric installation or if you selected Sample files in a custom installation. See Authentication Chains: Use Cases and Authentication Chains: Plugins for more information on using these scripts.

Set the following for the external program authentication module:

If module succeeds, bypass this module in failed attempt retries

The module is not shown again for authentication if the authentication chain fails and is retried from a failed attempt and the module had succeeded in a previous attempt.

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Note: If a product administrator helps another user via the HELPDESK_LOGIN chain, and the Increment lockout counter when this module fails option is disabled for any of the modules in that chain, then the global fail counter will still increase if the product administrator fails to correctly answer any of the questions during help desk authentication. However, this does not cause the user to be locked-out, even if the number of failed attempts reaches or exceeds the value set by MAX USERAUTH FAILURE.

External program

Must be set to a plugin name

Target system to use for address and credentials

This is the target system ID on which the user has an account.

If the user does not have an account on the specified system the authentication chain will not appear.

Interface communication protocol

Must be set to the protocol that matches the plugin you named as your external program:

  • Authentication plugin

  • Authentication plugin/6.x(Legacy)

You can customize the user interface by modifying the authchain.m4 file and recompiling the skins. See the sample files and the Customization guide for more information.

Security questions with answer scores module (scoreqna.pss)

The score based challenge and response module runs the built-in scoreqna.pss authentication program.

This module prompts users for questions from the user’s question sets. Points are provided for correct answers, and penalties are given for incorrect answers. The points are calculated to determine whether the user’s score passes the authentication threshold. A passing score is required to authenticate successfully.

If the user has not yet answered all questions, but the total score has passed the threshold, then the module immediately passes authentication.

If the user has answered some of the questions incorrectly, and the total score for the remaining questions cannot pass the threshold (even if all are answered correctly), then the module immediately fails.

Set the following for the score based challenge and response module:

If module succeeds, bypass this module in failed attempt retries

The module is not shown again for authentication if the authentication chain fails and is retried from a failed attempt and the module had succeeded in a previous attempt.

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Note: If a product administrator helps another user via the HELPDESK_LOGIN chain, and the Increment lockout counter when this module fails option is disabled for any of the modules in that chain, then the global fail counter will still increase if the product administrator fails to correctly answer any of the questions during help desk authentication. However, this does not cause the user to be locked-out, even if the number of failed attempts reaches or exceeds the value set by MAX USERAUTH FAILURE.

If a user does not have a valid security questions profile

Defines which action to take when a user does not have a complete security questions profile. If a user’s security question profile is incomplete and this option is set to:

Abort login immediately – The entire authentication chain is not available as an authentication method for the user and is not displayed.

Fail this module – The scoreqna.pss module is treated as a failure. If the Control type for this module is set to either:

  • sufficient or optional, and the other modules in the authentication chain are valid for the user, then the user can still authenticate using the other modules.

  • binding, required or requisite then the entire authentication chain is not available as an authentication method for the user and is not displayed.

    Bypass this module – The scoreqna.pss module is completely ignored regardless of Control type, even if set to required.

Caution

If this option is set and the module is bypassed, and the remaining modules are set to either sufficient or optional, then access is not immediately granted. At least one of the remaining modules must pass in order to gain authentication.

Number of questions to ask during authentication

Provides more control over how many questions to ask from each question set. If you do not change this setting, it defaults to the setting for each individual question set.

You can choose:

  • From all question sets Choosing a number from this drop-down list allows you to specify how many questions the user is asked. The questions are randomly selected from all available question sets. Setting this value automatically changes the value for individual question sets to (None).

    Note: This setting is not intended to work for SecurID questions when the user’s token is in extended mode, such as the next token code or new pin mode.

  • From [ < questionset > ] Each available question set has a drop-down list, allowing you to specify how many questions the user is asked from each question set.

    Changing this value automatically changes From all question sets to (None).

    Note: If javascript is disabled, then you must manually set From all question sets to (None) before changing the value for any of the individual question sets.

  • Display all questions at once... By default, this option is disabled, which means that questions are prompted one at a time on their own screen. If this option is enabled, then all questions appear together on one single screen.

Points for correct answers

The number of points that are added to the score for each correctly answered question.

You can choose:

  • From all question sets Choosing a number from this drop-down list allows you to specify the number of points that are added to the score whenever a question is answered correctly from all sets. This corresponds to the number of questions that are prompted as specified by From all question sets in the Number of questions to ask during authentication section.

    This value is reset to 1 if the questions are configured to be prompted from the individual question sets. The value is still specified, but is not used.

  • From [ < questionset > ] Each available question set has a drop-down list, allowing you to specify the number of points awarded for each correct answer to questions from each question set.

    When questions are prompted from all question sets, the settings for this option will reset to the default value (set to 1) but are not used.

Penalties for incorrect answers

The number of points that are deducted from the score as a penalty for each incorrectly answered question.

You can choose:

  • From all question sets Choosing a number from this drop-down list allows you to specify the number of points that are deducted from the score whenever a question is answered incorrectly from all sets. This corresponds to the questions that are prompted as specified by From all question sets in the Number of questions to ask during authentication section.

    This value is reset to (None) if the questions are configured to be prompted from the individual question sets

  • From [ < questionset > ] Each available question set has a drop-down list, allowing you to specify the number of points that are deducted from the score for each incorrect answer to questions from each question set.

    When questions are prompted from all question sets, the settings for this option will reset to the default value (set to (None)) but are not used.

Authentication thresholds

  • Passing score The value of the passing score indicates the number of points that are required to pass authentication for the score based challenge and response module. The passing score cannot be greater than the total number of points that can be achieved when correctly answering all of the available questions, otherwise it would be impossible to pass authentication.

  • Failing score The value for the failing score indicates the number of points for the module to fail authentication. The failing score cannot be less than the minimum number of total penalties when answering all of the available questions.

Configuration notes for the Score base challenge and response module:

  • Selecting "(None)” for all question sets for a module resets all of the question set values to the default question set values.

  • When configuring a question set, if you deselect the Ask users to answer questions from this set setting, then the question is no longer available for use with the default login authentication chain.

  • If you add a new question set, you may need to reconfigure the scoreqna.pss module for an authentication chain. The new question set is added to existing scoreqna.pss modules for all authentication chains that have the value for the Number of questions to ask during authentication set to the effective setting.

  • Use case: A question set (for example, the pre-defined set) is disabled and the Security questions with answer scores (scoreqna.pss) module is configured for use with other question sets (for example, the user-defined set).

    If the question set that was previously disabled is now re-enabled, it cannot be used within the scoreqna.pss module until the module has been re-configured. For example, a user would still only be prompted for questions from the user-defined set after the pre-defined set has been re-enabled and before the scoreqna.pss module has been re-configured.

    The scoreqna.pss module would have to be modified in order to prompt for questions from this newly enabled question set.

    Other parameters such as the number of points for correct or incorrect answers and the values for the authentication thresholds for the passing and/or failing score should also be adjusted accordingly to account for the newly added/enabled question set.

  • Use case: Both the user-defined and pre-defined questions sets are enabled and the Security questions with answer scores (scoreqna.pss) module for a custom authentication chain is configured to use questions from both of the question sets.

    If one of the question sets has been disabled, that particular question set will not be available for use with the scoreqna.pss module.

    The authentication chain configured with this module will also not be usable at all until it has been re-configured to account for the missing question set that was just disabled.

Email/SMS PIN (emailsmspin.pss)

The Email/SMS PIN module runs the built-in emailsmspin.pss authentication program. This module will send a random PIN to the user via an email-to-SMS gateway or to the users email address.

Set the following for the Email/SMS pin authentication module:

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Note: If a product administrator helps another user via the HELPDESK_LOGIN chain, and the Increment lockout counter when this module fails option is disabled for any of the modules in that chain, then the global fail counter will still increase if the product administrator fails to correctly answer any of the questions during help desk authentication. However, this does not cause the user to be locked-out, even if the number of failed attempts reaches or exceeds the value set by MAX USERAUTH FAILURE.

If user hasn’t registered an email/mobile phone number:

Defines which action to take when a user does not have the required email, mobile phone number and/or SMS gateway attributes defined:

Show notice – The user will be given a message indicating that they must enroll before using this authentication chain.

Abort login immediately – The entire authentication chain is not available as an authentication method for the user and is not displayed.

Fail this module – The emailsmspin.pss module is treated as a failure. If the Control type for this module is set to either:

  • sufficient or optional, and the other modules in the authentication chain are valid for the user, then the user can still authenticate using the other modules.

  • binding, required or requisite then the entire authentication chain is not available as an authentication method for the user and is not displayed.

Target system to use for address and credentials

This is the target system ID on which the user has an account.

If the user does not have an account on the specified system the authentication chain will not appear.

Email/SMS PIN settings

Will define the composition of the PIN and how the PIN will be delivered to the user.

PIN length – The length of the randomly generated PIN that is sent to the user. Can be set from 4 to 32 characters in length.

Type of generated PIN – Choose Numeric , Upper and lowercase , or Alphanumeric for the PIN composition for the user.

Time (in minutes) before PIN expires – The period of time hat the PIN will be valid. The default is time 10 minutes.

PIN delivery method – Choose whether you want the PIN to be delivered via Email or Email/SMS gateway .

Plugin to send the generated PIN – The plugin that will be used to send the generated PIN. The default is the GLOBAL MAIL PLUGIN .

Attributes

Defines what profile attributes will be used for sending of the PIN.

Note: In order for a profile attribute to be listed it must be configured with Allow for authentication chains selected.

Profile attribute specifying email/mobile phone number – This attribute will determine what email address or mobile number will be used to send the PIN to the user.

Profile attribute specifying mobile phone service provider – When the PIN delivery method selected is the Email/SMS gateway , this attribute will be set to the users mobile provider.

Message settings

Defines the message content of the email being sent to the user.

Sender email address for the PIN delivery message – The senders email address. The default is the SENDER EMAIL .

PIN delivery message subject – The contents of the subject line being delivered to the user.

PIN delivery message content – The contents of the email body being delivered to the user.

PIN delivery message format – Choose the format of the email, Plain text or HTML .

Connector package agent (agent.pss)

The connector package agent module runs the built-in agent.pss authentication program. This module will allow for authentication using either the user verify password or challenge response authentication operations directly for applicable connectors.

Set the following for the connector package agent module:

Increment lockout counter when this module fails

Increments the global fail counter each time a user fails authentication for this module. It is enabled by default. The global fail counter is managed by the MAX USERAUTH FAILURE system variable. If the number of failed attempts reaches MAX USERAUTH FAILURE, then the user is locked out.

Target system to use for address and credentials

This is the target system ID on which the user has an account.

If the user does not have an account on the specified system the authentication chain will not appear.

Password verification operation

This is the connector operation that will be used for authentication to the target system as noted above. It may be set to one of these two operations:

User verify password – Authentication will be done using the user verify password operation for the target system.

Challenge response authentication – Authentication will be done using the challenge response authentication operation for the target system.

Note: This may only be set for the target systems in which these are supported operations. For example, a RADIUS Authentication or RSA Authentication Manager 7.1/8.2 target system may be used for the challenge-response authentication.

Authentication chain selector (select_chain)

The authentication chain selector module (select_chain) can run a plugin to automatically choose an authentication chain to use to log in.

Bravura Security Fabric ships with two sample scripts that can be used with this module:

  • chainselect.psl is a generic sample to demonstrate IP based chain selection

  • authselect.psl can be used to direct users to a single-page login page that includes ID and password fields.

For example, if the sample authselect.psl script is configured for the DEFAULT_LOGIN authentication chain, then it can be used to allow the user to enter both their user ID and password on the main page to log into the Front-end . If valid credentials are used, then the default password.pss module is used for authentication and the user is automatically logged in.

These sample files are installed with a complete Bravura Security Fabric installation or if you selected Samplefiles in a custom installation. See Authentication Chains: Use Cases and Authentication Chains: Plugins for more information.

Set the following for the authentication chain selector module:

Run this plugin to automatically select a sub-chain

Specify the name of the plugin to run to select authentication chains. The plugin accepts information from the Front-end , such as HTTP headers, posted data, and authentication chain information.

If selected chain fails, automatically try the same chain again

Enable this checkbox to automatically reload this authentication chain if authentication to the Front-end fails. If this option is disabled (default), then users that fail authentication are redirected to the main page.

Allow plugin to skip chain selection (plugin only)

Select this checkbox if you specified a plugin and you want to allow it to skip chain selection for users who already meet authentication requirements.

Available chains

Select the existing authentication chains from which end users can choose.

You can customize the user interface by modifying the authchain.m4 file and recompiling the skins. See the sample files and the Customization guide for more information.

Mobile authentication (mobileapp)

The Mobile authentication module will allow for authentication using a QR Code that is scanned from the Bravura One app that is registered for Bravura One for the user for two factor authentication.

Set the following for the Mobile authentication module:

QR code durations (default 60 seconds)

defines the amount of time that a QR Code will be displayed to the user for authentication.

See also:

Next: