We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure Multi-Factor Authentication Using Time-based One-time Password (TOTP)

  • Last updated on

Some network environments require additional security levels to authenticate users when they access specific high-risk VPN or SSL VPN resources. For an additional level of security, multi-factor authentication can be enabled for accounts on an individual basis, using a Time-based One-time Password (TOTP) as a secondary authentication method. The Barracuda CloudGen Firewall supports multi-factor authentication for client-to-site VPN (TINA protocol only), SSL VPN, CudaLaunch, and the Barracuda VPN Client for Windows. Time-based One-time Password authentication is not supported on macOS and iOS devices as they use IPsec. Multi-Factor Authentication using TOTP requires an Advanced Remote Access subscription.

Like other time-based services, TOTP relies on a correct time system. Make sure the time settings on the client and the server are configured correctly. Time should be synced between all devices that are used for generating TOTP and authentication. Otherwise, authentication fails.

Before You Begin

  • Configure a primary authentication scheme, for example, MSAD. For more information, see How to Configure MSAD Authentication.
  • If you bulk enroll more than 20 users, you must temporarily increase the Configuration Read Timeout:

    1. In Firewall Admin, click the hamburger menu on the top left and select Settings.
      menu.png
    2. Click Client Settings.
    3. In the Connectivity Options section, set Configuration Read Timeout to six times the number of users in seconds. For example, for 500 users, enter 30000.
    4. Restart Firewall Admin.
  • If you bulk enroll you must also setup a mail server so that the enrollment emails get sent out.

Step 1. Enable Time-based OTP Authentication

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
  2. In the left navigation pane, select TOTP Authentication.
  3. Click Lock.
  4. Enable Time-based OTP as authentication scheme.
    totp01.png
  5. (optional) To let users log in with domain and username (e.g., user@domain.com or domain/user), set Strip Domain Name to Yes.
  6. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list. For example, select LDAP if group information must be queried from an LDAP directory.
  7. Click Send Changes and Activate.

Step 2. Enroll Users and Groups

The Barracuda CloudGen Firewall provides two options to enroll users and groups for TOTP authentication:

  • Bulk Enrollment – Automatically enroll a group of users, e.g., from your authentication server.
  • Self Enrollment – Configure self-enrollment for users to set up Time-based OTP. This option is available for the SSL VPN web portal, CudaLaunch, and the TOTP web portal.
Bulk Enrollment
Step 2.1. (optional) Export Users from Active Directory

To simplify the TOTP enrollment procedure for MSAD users, export the users as a comma-separated list from Active Directory to Excel and then to a .csv file. While exporting the users, define the required fields to get the format: [user]|[empty_password]|,[email]|.

  1. On the PowerShell, type the command:
    • Get-ADUser -SearchBase "OU= (your users),DC= (your domain)" -Filter * -properties mail | Format-Table -autosize -Property SamAccountName, mail > C:\bat\test.csv
    For example:
    • Get-ADUser -SearchBase "OU=EU Users,DC=eu,DC=ad,DC=cuda-inc,DC=com" -Filter * -properties mail | Format-Table -autosize -Property SamAccountName, mail > C:\bat\test.csv
  2. Export the output to an Excel file.
  3. Add a column for [empty_password]
  4. Export the list into a .csv file.

You can now copy and paste the data from the .csv file into the Time-based OTP Bulk Enrollment configuration. Make sure to use the format: [username]|[password]|[email]|

Step 2.2. Enroll Users for TOTP Authentication

It is recommended to enroll one or two test users before launching the whole enrolling process, to ensure that enrollment and email notifications are configured correctly.

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Time-based OTP Bulk Enrollment.
  2. Click Lock.
  3. Add the users that should be enrolled for TOTP authentication:
    • In the User Bulk Enrollment field, enter the users in the format [username]|[password]|[email]|, or
    • Copy and paste the data from the .csv file with the users from your authentication server.
  4. Click Send Changes.

  5. Click Import. The users are now listed in the Enrolled Users table.

    Per default, all users in an imported VPN group are selected for TOTP authentication. You can delete users from the list, but not add them to it by entering a username.

  6. Click Activate.

When using bulk enrollment, you must also configure email notifications. For more information, see How to Configure System Email Notifications. Check the logs to verify that emails have been correctly sent.

Self Enrollment

When using the SSL VPN web portal, CudaLaunch, or the TOTP web portal, enable self-enrollment for users to set up Time-based OTP via the web interface.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > SSL-VPN.
  2. In the left menu, click Time-based OTP.
  3. Click Lock.
  4. Select yes to Enable the TOTP Self Service.
  5. From the Authentication Scheme drop-down list, select your authentication scheme. E.g., MS Active Directory.
    enable_totp_ssl_auth.png
  6. In the Self Enrollment section:
    1. Select yes to Enable Self Enrollment.
    2. In the Allowed User Groups field, add the users that should be allowed to self enroll for TOTP authentication. Delete the asterisk and enter the MSAD group name. E.g., CN=sales
    3. In the Blocked User Groups field, add the users that should be blocked from self enrolling.
  7. (optional) Import your company Logo and customize the Login Message for your users.
  8. Click Send Changes and Activate.

Users can now use the SSL VPN web portal, CudaLaunch, or go to the dedicated TOTP web portal (URL https://(IP of the SSL VPN service)/portal/totp.html) and enroll themselves for TOTP authentication. For more information, see How to Self Enroll for Time-Based One-Time Passwords (TOTP) using the Simple TOTP Web Portal.

Users can also self enroll via CudaLaunch or the SSL VPN web portal, using the Time-based OTP menu option found under Settings if the configured Access Control Policies are configured to allow access without using Time-based OTP.

Step 3. Configure TOTP as Authentication Scheme

Enable TOTP authentication for client-to-site VPN, SSL VPN web portal, CudaLaunch, or the Barracuda VPN Client.

Enable TOTP for Client-to-Site VPN

Enable TOTP as the secondary authentication scheme:

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client to Site.
  2. Click Lock.
  3. Click the External CA tab and then click the Click here for options link. The Group VPN Settings window opens.
  4. Configure the settings for your VPN group. For more information, see How to Configure a Client-to-Site VPN Group Policy.
  5. From the Secondary Authentication Scheme drop-down list, select totp.
    totp_sec.png
  6. Click OK.
  7. Click Send Changes and Activate.

Create a VPN group policy to enforce Time-based One-time Password (TOTP) authentication:

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client to Site.
  2. Click Lock.
  3. Click the External CA tab.
  4. Create or edit a group policy. For more information, see How to Configure a Client-to-Site VPN Group Policy.
  5. In the Edit Group Policy window, right-click the Group Policy Condition field and select New Rule.
  6. Configure the settings for your VPN group. For more information, see How to Configure a Client-to-Site VPN Group Policy.
  7. Select the Enable One-Time Password check box.
  8. Click OK.
  9. Click Send Changes and Activate.

When using more than one policy, make sure that you place this policy above the ones without Time-based One-time Password enforcement.

Enable TOTP for SSL VPN and CudaLauch

To configure SSL VPN to use One-time Password authentication, create an Access Control Policy that requires TOTP authentication. For more information, see How to Configure Access Control Policies for One-Time Password Authentication and How to Self Enroll for Time-Based One-Time Passwords (TOTP) using the Simple TOTP Web Portal.

Self Enroll for TOTP

To enroll a mobile device using CudaLaunch or SSL VPN, install a TOTP-compatible app and complete the 2-step enrollment process to link the app with Time-based One-time Password Authentication on the CloudGen Firewall. For more information, see How to Self Enroll for Time-Based One-Time Passwords (TOTP) using CudaLaunch or the SSL VPN Web Portal.

Enable TOTP for the Barracuda VPN Client

To use TOTP on the Barracuda VPN Client, create or edit a VPN profile and enable One-time Password (OTP) extensions. For more information, see How to Create VPN Profiles.

Last updated on