Skip to main content

Secure your Google Apps with two-factor authentication.

Everybody loves GMail. With Google Apps for you Domain, you can use GMail with your own domain, allowing organizations to outsource their email - and the requisite anti-spam filtering to Google. Webmail is very convenient, but for frequent travellers and those who use public wifi, it can be quite dangerous. Logging in from a kiosk or shared computer is a sure way to get your username and password stolen by a keystroke logger. While cloud services are great, maintaining security is tough. It is now possible to secure Google Apps for Your Domain using

In this document, we will add two-factor authentication to Google Apps for Your Domain using their SSO/SAML protocol and the open-source version of the WiKID Strong Authentication server.

We assume that you have a WiKID server up and running and a working Enterprise Google Apps account. Please see this how-to for installing WiKID or our website for complete documentation.

Configuring the WiKID Strong Authentication Server

On the WiKID server, through the WiKIDAdmin web interface, enable the GoogleSSO protocol under Configuration, Enable Protocols:

google_sso_01.jpeg

Click on GoogleSSO

google_sso_02.jpeg

 

Click on Initialize.

google_sso_03.jpeg

 

Don't restart the server just yet.

WiKID two-factor authentication users are grouped into Domains. If you haven't done so, please create a WiKID Domain. The domain identifier is the zero-padded ip address of the server. So, 72.44.47.107 becomes 072044047107. Here we are using an internal LAN address which is fine for testing, but external clients will not be able to route to it.

google_sso_04-d.jpeg

Click on Create a new domain

google_sso_04-e.jpeg

The required domain configuration options are:

Domain Name – This is a descriptive label for this domain visible only in the administration system.

Device Domain Name – This is the domain label that will appear in the menu option on the client device. This label should be relatively short to facilitate viewing on a mobile device.

Registered URL - This URL is for mutual https authentication and is not applicable here.

Server Code – This is the zero-padded IP address of the server or the pre-registered prefix in the wikidsystems.net domain. This value must be exactly 12 digits in length.

Minimum PIN Length - This is the minimum allowable PIN length for this domain. Any attempt to set a pin shorter than this value will generate an error on the client device.

Passcode Lifetime – This parameter specifies the maximum lifetime of the one-time passcode generated in this domain. After N elapsed seconds, the one-time passcode will automatically be invalidated.

Max Bad PIN Attempts – The maximum number of bad PINs attempted by a device in this domain before the device is disabled.

Max Bad Passcode Attempts – The maximum number of bad passcodes entered for a userid registered in this domain before the userid is disabled.

Max Sequential Offlines – The maximum number of times a device may use the offline challenge/response authentication before being required to authenticate online. This feature is used in the Enterprise version for the wireless clients when they are out-of-network coverage.

Require Locked Tokens - "Locked" software tokens are PC tokens that are tied to a particular PC by certain data from that PC such as the CPU identifier or the MAC address.

Require Wireless Tokens - If you prefer to use only wireless software tokens, check this box.

Use TACACS+ This for a TACACS+ only domain. Leave it unchecked.

 

Once, complete, click Create Domain.

For an external service, such as Google Apps for your Domain in this case, to talk to the WiKID server it needs to be configured as a Network Client on the WiKID Strong Authentication Server. Click on the Network Clients Tab of the WiKIDAdmin.

google_sso_04.jpeg

 

Click on Create a New Network Client

google_sso_05.jpeg

 

 

Give the network client a name. Leave the IP address empty. Select the domain and choose GoogleSSO as the protocol.

google_sso_08.jpeg

Set your ACS URL. This is usually http://www.google.com/a/yourdomain.com/acs. Enter the additional information that is required to create a certificate for Google. The WiKID server will create this certiticate for you to provide to Google.

google_sso_09.jpeg

 

Your network client has been created.

google_sso_12.jpeg

 

On the far right hand side of the Network Client page you will see a link to download the certificate. Download it to your local PC.

google_sso_13.jpeg

 

Important: Now restart the WiKID server from the command line with:

# wikidctl restart

Configuring Google Apps For Your Domain

 

Log onto Google Apps for your Domain.

Click on Setup Single Sign-On(SSO)

google_sso_07.jpeg

For the Sign-in page URL, enter the URL of your WiKID server and append 'wikid/GSSO/'. Be sure to use https://!

Click on the link to upload a Verification Certificate and upload the certificate you downloaded to your computer in the Create Network Client steps.

That's it for the configuration.

Testing

Head to the Google Apps login page:

google_sso_14.jpeg

 

A SAML request will be create and you will be re-directed to the WiKID login page on your WiKID Server.

google_sso_15.jpeg

Start you WiKID token and generate a one-time passcode (assuming you have a registered token. See more on how to enable your users for two-factor authentication.

google_sso_18.jpeg

 

Select the domain and enter your PIN. WiKID Software tokens are capable of authenticating to mutliple domains across multiple enterprises.

google_sso_19.jpeg

 

 

Type in your email address and the one-time passcode that is returned by the WiKID Software token (it is automatically pasted into the clipboard, so all you have to do it hit Ctrl-V in the password box) and login:

google_sso_20.jpeg

 

That should be it. Now access to your Google mail is secured using two-factor authentication from WiKID.

This document supercedes the previous tutorial on Google/WiKID two-factor authentication.



 

Copyright © WiKID Systems, Inc. 2024 | Two-factor Authentication