Search

Language:  

  • Article for your preferred language does not exist. Below is international version of the article.
Available article translations:

How to configure Parallels RAS with DUO Radius

APPLIES TO:
  • Parallels Remote Application Server

This article is intended to guide how to setup DUO MFA in Parallels RAS.  You can also refer to a this video guide at Parallels Youtube Channel.

1. Download DUO Proxy Authenticator. Use the default installation instructions and you will notice that DUO service is not running in services.msc. This is expected, because authproxy.conf has to be configured for your environment.  

2. Open Windows Explorer, navigate to C:\Program Files (x86)\Duo Security Authentication Proxy\conf and open authproxy.cfg:

3. The configuration file has several unnecessary settings and for typical RAS integration we should configure the following:  


Please refer to Authentication Proxy guide for additional information.

[ad_client] is to use an Active Directory domain controller to perform primary authentication. This section accepts the following options:
service_account_username - The username of an account that has permission to read from your Active Directory database;
service_account_password - The password corresponding to service_account_username;
search_dn - The LDAP distinguished name (DN) of an Active Directory container or organizational unit (OU) containing all of the users you wish to permit to log in;
security_group_dn - To further restrict access, specify the LDAP distinguished name (DN) of a security group that contains the users who should be able to log in. Others users will not pass primary authentication.

[duo_only_client] - to use Authentication Proxy for secondary authentication. This section has no additional properties to configure.

[radius_server_duo_only] - to use a RADIUS integration which does not handle primary authentication credentials. The user's passcode or factor choice, encrypted using the PAP mechanism, is submitted for the RADIUS password.
ikey -  Your Duo integration key;
skey -  Your Duo secret key;
api_host - Your Duo API hostname (e.g. “api-XXXXXXXX.duosecurity.com”);
radius_ip_1 - IP address of your RAS Publishing Agent.
radius_secret_1 - The secret key that you will specify in step 6;
radius_ip_2 - IP address of your secondary Publishing Agent if you have any. If you have only one PA, don't add this line;
radius_secret_2 - The same secret key as for radius_secret_1. If you have only one PA, don't add this line;

failmode -  Either "safe" or "secure", defines the behavior of the system when Duo's service cannot be contacted. When set to "safe", authentication attempts will be permitted if primary authentication succeeds. When set to "secure", all users' authentication attempts will be rejected.

client - The mechanism that the Authentication Proxy should use to perform primary authentication. This should correspond with a "client" section elsewhere in the config file. Set "ad_client" to use Active Directory for primary authentication. Make sure you have an [ad_client] section configured.

port - Port on which to listen for incoming RADIUS Access Requests. By default, the proxy will listen on port 1812.

4. Start DUO Security Authentication proxy Service 

5. Configure RAS to communicate with DUO: RAS Console → Farm → Connections → Second Level Authentication Tab. Chose the option to use Duo (RADIUS) and click on Settings:

6. Configure connection settings: 

7. Click on Check Connection and you should see Success result:

8. Click Apply and the next time users logon they will have 2-factor-authentication enabled. 




1d70d1f9c41d01c5f7202a4290e434e1

FEEDBACK
Was this article helpful?
Tell us how we may improve it.
Yes No