Hello there!

Need Help? We are right here!

miniOrange Email Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Search Results:

×

Two-Factor Authentication (2FA/MFA) for Juniper Routers and Switches


Two Factor Authentication (2FA) or Multifactor Authentication is the process of the authentication in which you have to provide two factors to gain the access. First Factor is the one that you know username and password and Second factor is what you might have as unique like a phone (For OTP) or Fingerprint. This additional layer prevents the unauthorized person from accessing the resources even if they know your username and password. miniOrange provides 15+ authentication methods and solutions for various use cases. TACACS+ provides better authentication, authorization and accounting, which allows for more flexible administrative control. In this guide, we will learn how to configure TACACS+ on Juniper routers and switches.


Connect with any External Directories


miniOrange provides user authentication from various external directories such as miniOrange Directory, Microsoft AD, Azure Active Directory/LDAP, AWS Cognito and many more.

Can't find your Directory? Contact us on idpsupport@xecurify.com



Get Free Installation Help - Book a Slot


miniOrange offers free help through a consultation call with our System Engineers to Install or Setup Two-Factor Authentication for Juniper Routers and Switches solution in your environment with 30-day trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you setting it up in no time.



Enable Two-Factor Authentication (2FA)/MFA for Juniper Routers and Switches Client to extend security level.

1. Add the TACACS Client in miniOrange

  • Login into miniOrange Admin Console.
  • Click on Customization in the left menu of the dashboard.
  • In Basic Settings, set the Organization Name as the custom_domain name.
  • Click Save. Once that is set, the branded login URL would be of the format https://<custom_domain>.xecurify.com/moas/login
  • 2FA Two-Factor authentication for Juniper Routers and Switches  : setting up branding

  • Go to Apps Click on Add Application button.
  • Add Juniper Routers and Switches  TACACS Application

  • Choose TACACS as Application type and click on Create App button.
  • 2FA Two-Factor authentication for Juniper Routers and Switches  : Create TACACS Application

  • Click on Juniper Routers and Switches application tab. If you don't find your application click on Custom TACACS Client application tab.
  • 2FA Two-Factor radauthentication for Juniper Routers and Switches  : Select your TACACS Client

    Client Name: Any name for your reference.
    Client IP: IP address of network device which will send TACACS authentication request.
    Shared Secret: Security key.
    For Eg. "sharedsecret"
    (Keep this with you, you will need to configure same on TACACS client).
  • Click Next.
  • If you want to authenticate your users from Identity Provider other than the default Identity Provider, navigate to Advanced Settings tab. Select your preferred Identity Provider under Primary Identity Provider section. To add your identity providers in miniOrange IDP, follow this guide.
  • 2FA Two-Factor radauthentication for Juniper Routers and Switches  : advanced settings

  • Click on Save button.
  • 2FA Two-Factor radauthentication for Juniper Routers and Switches  : save settings

  • Configure the following Policy details for the TACACS Client.
  • Group Name: Group for which the policy will apply.
    Policy Name: Any Identifier that specifies policy name.
    Login Method Login Method for the users associated with this policy.
    Enable 2-Factor Authentication Enables Second Factor during Login for users associated with this policy.
    Enable Adaptive Authentication Enables Adaptive Authentication for Login of users associated with this policy.
  • After configuring the given above details, Click on Save button.
  • Copy and save the TACACS server IPs which will be required to configure your TACACS client.
  • NOTE: For On-Premise version follow the below steps before testing the connectivity.

    Only For On-Premise Version

    Open Firewall Ports.

  • In order to receive the TACACS request, it is necessary to open UDP traffic on ports 1812 and 1813 for the machine where On-Premise IdP is deployed.
  • If the hosting machine is a Windows Machine then you can follow this document.
  • If the hosting machine is a Linux Machine then you can follow this document.

  • NOTE: If your machine is hosted on AWS, then enable the ports from the AWS panel.

2. Configure Authentication for Juniper via TACACS

    set system tacplus-server <server-ip> port 49
    set system tacplus-server <server-ip> < server >
    set system tacplus-server <server-ip> source-address <switch-ip>
    set system accounting destination tacplus server <server-ip> port 49
    set system accounting destination tacplus server <server-ip> < server >
    set system accounting destination tacplus server <server-ip> source-address <switch-ip>
    set system login user remote class operator

Creating User Groups (Recommended)


  • This step involves Importing the user group from the Active Directory and Provisioning them.
  • Go to Provisioning. Switch to Setup Provisioning tab and select Active Directory from Dropdown menu.
  • MFA/Two-Factor Authentication(2FA) for  : Select Active Directory (AD)

  • Select Group Provisioning/Deprovisioning tab, and toggle on Import Group option.
  • Enter the Base DN for group sync and click Save.
  • MFA/Two-Factor Authentication(2FA) for  : Enter BaseDN

  • If you want to dynamically allocate users to the groups present in the miniOrange, then enable "Assign Users to groups"
  • MFA/Two-Factor Authentication(2FA) for  : Switch on import Group

  • Now switch to Import Groups option and select Active Directory from which you want to import your users.
  • Finally, click on Import button. Your group will be imported.
  • MFA/Two-Factor Authentication(2FA) for  : User group imported successfully

    (The Active Directory Group Provisioning (Sync) setup is done. Now, whenever a user is created or modified in LDAP server and if the Assign Users to groups is enabled, then user group attribute from the LDAP server will be automatically synced and the user group will be assigned or changed accordingly in miniOrange.)

  • Select Groups >> Manage Groups from left panel.
  • Click on the Create Group button on the top.
  • MFA/Two-Factor Authentication(2FA) for   Manage Groups

  • Enter an appropriate Group Name and click on Create Group.
  • MFA/Two-Factor Authentication(2FA) for   Create Groups

  • In this guide we have created a Group by name VPN_Group.
  • Assign various members to the group using the Assign User option associated with the group in the groups list.
  • MFA/Two-Factor Authentication(2FA) for   User Assign

  • Select the Users that are required to be assigned to this group. Then Select Assign to Group in Select Action Dropdown and click on Apply button.
  • MFA/Two-Factor Authentication(2FA) for   Assignment to Group

  • These groups will be helpful in adding multiple 2FA policies on the applications.


7. Setup MFA for

Note: You can follow this guide, if you want to customize and enroll MFA for end users.


  • Here, we will configure a policy for the User Group that we created in this step and associate it with the VPN Application.
  • Click on Policies tab >> App Login Policy.
  • MFA/Two-Factor Authentication(2FA) for   App Authentication Policy

  • Click on Add Policy tab.
  • In Application section, select the TACACS App that we configured earlier in Step 1.
  • Select the required User Group in Group Name and enter the Policy name.
  • In this guide, we will configure a Password Only policy for "VPN_Group", so that only the VPN_Group members can access VPN Services without a Second Factor.
  • Once done with the policy settings, click on Save to Add Policy.
  • MFA/Two-Factor Authentication(2FA) for   App Add Policy

8. Test miniOrange 2FA for Juniper Login

  • Connect to Juniper.
  • Enter Username and Password.
  • It will prompt you for second factor(if enabled from miniorange admin panel), Enter your 2FA code and you should be connected to Juniper.

Further References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products