Ukraine flag

We stand with our friends and colleagues in Ukraine. To support Ukraine in their time of need visit this page

Setting Up Protectimus SMS Tokens

Once you’ve successfully installed the Protectimus On-Premise MFA Platform, it will generate a configuration file named protectimus.platform.properties. The protectimus.platform.properties file must be located in the same directory as the executable.

This file allows you to customize the following settings:
  • Configure SMPP server connection to add your SMS provider to deliver one-time passwords via SMS.
  • Configure delivery of one-time passwords via email.
  • Add SSL certificate for the Protectimus Platform. Different SSL certificate formats are supported, including .pkcs12, .pem, .der, .pfx.
  • Specify the path to the license file. Please note that the path to the license file should be indicated with double backslashes
    (eg. C:\\some\\path\\file).

To configure an SMPP server connection and add your SMS provider for one-time password delivery, add the following properties to the protectimus.platform.properties file:

PLEASE NOTE! Additionally, you can configure settings for SMSC and ALIBABA as well.
PROPERTY NAMEPROTERTY STANDS FOR
smpp.server.login
SMPP server login.
smpp.server.password
SMPP server password.
smpp.server.host
Host or IP address of the SMPP server.
smpp.server.port
Port for the SMPP server.
smpp.message.encoding
Encoding for SMPP messages.
smpp.from.address
Source or sender address for SMPP messages.
Example:
smpp.server.login = login
smpp.server.password = **********
smpp.server.host = smpp.example.com
smpp.server.port = 12000
smpp.message.encoding = UTF-8
smpp.from.address = Protectimus

If you have other questions, contact Protectimus customer support service.

Setting Up Protectimus Mail Tokens

Once you’ve successfully installed the Protectimus On-Premise MFA Platform, it will generate a configuration file named protectimus.platform.properties. The protectimus.platform.properties file must be located in the same directory as the executable.

This file allows you to customize the following settings:
  • Configure delivery of one-time passwords via email.
  • Configure SMPP server connection to add your SMS provider to deliver one-time passwords via SMS.
  • Add SSL certificate for the Protectimus Platform. Different SSL certificate formats are supported, including .pkcs12, .pem, .der, .pfx.
  • Specify the path to the license file. Please note that the path to the license file should be indicated with double backslashes
    (eg. C:\\some\\path\\file).

To configure one-time password delivery via email, add the following properties to the protectimus.platform.properties file:

PROPERTY NAMEPROTERTY STANDS FOR
smtp.host
SMTP server’s hostname or IP address.
smtp.port
Port number for SMTP server.
smtp.user
Username or email account for authentication.
smtp.password
Password associated with the username or email account.
default.from.address
Allows you to set the address from which emails will be sent to the user.
Example:
smtp.host = smtp-server.com
smtp.port = 25
smtp.user = [email protected]
smtp.password = **********

If you have other questions, contact Protectimus customer support service.

Setting Up Protectimus Bot Tokens

Protectimus Bots are used for delivering one-time passwords (OTPs) and important notifications from the Protectimus Two-Factor Authentication System to end users. OTP delivery through messaging apps addresses several key issues: it is much more secure than SMS authentication, completely free, and easy to use. ProtectimusBot chatbots are available on Facebook Messenger, Telegram, and Viber. You can also create and connect your own chatbot by following these instructions.
Here’s a step-by-step guide to connecting your own bots to the Protectimus platform.

1. Check the Bot Box During Platform Installation

When installing the Protectimus On-Premise Platform:
  1. Ensure that you check the Bot box during the installation process.
  2. If the Protectimus On-Premise Platform is not yet installed, also check the Platform box to include the necessary components.
Ensure that you check the Bot box during the installation process

2. Edit the bot.yml Configuration File

  1. Navigate to the following directory: ./Protectimus/Bot/
  2. Open the bot.yml file in a text editor.
  3. Add the token(s) for the messaging platform(s) you intend to use.

    Important: At least one token must be added; otherwise, the bot will not function.
Below is an example structure of the bot.yml file for reference:

bot.yml
server:
  port: 8180

spring:
  activemq:
    broker-url: tcp://localhost:61616
    user: admin
    password: admin

bot:
  facebook:
    verification-token: your_token
    page-access-token: your_token
  viber:
    token: your_token
  telegram:
    token: your_token

logging:
  level:
    com.protectimus.bot: INFO

If you have other questions, contact Protectimus customer support service.

Updating the Protectimus Platform

You can update the Protectimus On-Premise Platform using a Docker image on any operating system.

However, if you initially installed the Platform on Windows, you may follow the instructions for Windows users below.

1. Updating Platform Using a Docker Image

You have two options for updating the Protectimus On-Premise Platform with a Docker image: We’ll walk you through both methods, allowing you to choose the one that best suits your preferences.

1.1. Updating via Git Repository Cloning

  1. Use this command to copy the repository containing Docker Compose files to your local computer, where the Protectimus On-Premise Platform is installed.

    git clone 
    https://github.com/protectimus/platform

    The contents of the archive will be as follows:

    .
    └── platform
        ├── platform
        │   ├── docker-compose.yaml
        │   ├── .env
        │   ├── platform_data
        │   │   ├── autogenerated-keystore.jks
        │   │   └── protectimus.platform.properties
        │   └── postgres_data
        ├── radius
        │   ├── config
        │   │   ├── radius.all.yml
        │   │   └── radius.yml
        │   ├── docker-compose.yaml
        │   └── .env
        └── unifi-guest-portal
            ├── config
            │   ├── fragments.html
            │   ├── guest-portal.all.yml
            │   └── guest-portal.yml
            ├── docker-compose.yaml
            └── .env

  1. Go to the platform directory:

    cd platform/platform

  1. Run the application using Docker Compose.

    This command will start all the containers required for your application in the background (-d):

    docker-compose up -d

  1. Stop running containers using this command:

    docker-compose down

  1. Make a backup of your database. The data is located in the postgres_data directory.

  1. Get latest changes from Git repository.

    This command will update your local repository to the latest version that you have uploaded to Git.

    Resolve any configuration conflicts if necessary.

    git pull

  1. Download the updated images. This command will download the updated Docker images from your Docker registry:

    docker-compose pull

  1. Restart containers with new images.

    This command will restart the containers using the updated images in the background mode (-d):

    docker-compose up -d

1.2. Manual Update from Github

  1. Download the latest version of the archive with the Protectimus Platform from Github and extract it:
    https://github.com/protectimus/platform/releases

    The contents of the archive will be as follows:

    .
    └── platform
        ├── platform
        │   ├── docker-compose.yaml
        │   ├── .env
        │   ├── platform_data
        │   │   ├── autogenerated-keystore.jks
        │   │   └── protectimus.platform.properties
        │   └── postgres_data
        ├── radius
        │   ├── config
        │   │   ├── radius.all.yml
        │   │   └── radius.yml
        │   ├── docker-compose.yaml
        │   └── .env
        └── unifi-guest-portal
            ├── config
            │   ├── fragments.html
            │   ├── guest-portal.all.yml
            │   └── guest-portal.yml
            ├── docker-compose.yaml
            └── .env

  1. Go to the platform directory:

    cd platform/platform

  1. Run the application using Docker Compose.

    This command will start all the containers required for your application in the background (-d):

    docker-compose up -d

  1. Stop running containers using this command:

    docker-compose down

  1. Make a backup of your database. The data is located in the postgres_data directory.

  1. Change the component version to the latest in the .env file.

  1. Download the updated images. This command will download the updated Docker images from your Docker registry:

    docker-compose pull

  1. Restart containers with new images.

    This command will restart the containers using the updated images in the background mode (-d):

    docker-compose up -d

2. Updating Platform on Windows

2.1. Stop Platform, Bot, and Radius Services

Before updating the platform, stop the platform, bot, and Radius in services. Stop the Protectimus On-Premise Platform - Step 1 Stop the Protectimus On-Premise Platform - Step 2 Stop the Protectimus On-Premise Platform - Step 3

2.2. Upgrade Platform and Select Existing Database

Install the new version of the Protectimus On-Premise Platform, and when selecting a database, choose the one used in the old version of the Protectimus platform.

  1. Choose the necessary components.
Install the new version of the Protectimus On-Premise Platform - Step 1

  1. Click Next.
Install the new version of the Protectimus On-Premise Platform - Step 2

  1. Click Next.
Install the new version of the Protectimus On-Premise Platform - Step 3

  1. Use your username and password to log in to the PostgreSQL database you created during the first platform installation and click LogIn.
Install the new version of the Protectimus On-Premise Platform - Step 4

  1. Enter the name of the database you used in the old version of the Protectimus platform and click Select.
    You can click the List button to see the list of available databases if you don’t remember the exact name of the necessary database.
Install the new version of the Protectimus On-Premise Platform - Step 5

  1. Preferably, use the same destination folder as previously.
Install the new version of the Protectimus On-Premise Platform - Step 6

  1. Once the platform is installed, you will see the changelog describing recent updates; close it.
Install the new version of the Protectimus On-Premise Platform - Step 7

  1. Then click OK to finish the installation.
Install the new version of the Protectimus On-Premise Platform - Step 8

If you have other questions, contact Protectimus customer support service.

Configuring SSL Certificates

To ensure secure communication, the Protectimus On-Premise Platform requires a properly configured SSL certificate. This section provides detailed instructions on issuing, importing, and configuring trusted SSL certificates.

1. How to issue a trusted SSL certificate for the On-Premise Platform using AD CS with Web Enrollment

Please Note:
  1. The certificate of Certification Authority (CA) has to be installed on the clients machines in your domain to integrate the On-Premise Platform with such solutions as OWA.
  2. The Common Name (CN) for which the certificate was issued has to be accessible in your domain to integrate the On-Premise Platform with such solutions as OWA.

Prerequisites:
  1. AD CS installed with Web Enrollment feature.
  2. You need to have access to the Web Server template in certsrv.
  3. Keytool and OpenSSL tools are required.

1.1. Generate a Certificate Signing Request (CSR) Using OpenSSL

  1. Generate a private key:

    openssl genrsa -out test-server.key 2048

  2. Create a CSR:

    openssl req -new -key test-server.key -out test-server.csr

1.2. Submit the CSR to AD CS to issue and download a certificate

  1. Open the AD CS web interface:

    http://CA-Server-Name/certsrv

  2. Select Request a Certificate:

    Request a Certificate
  3. Select Advanced Certificate Request:

    Advanced Certificate Request
  4. Open your .csr file in a text editor, copy its contents, and paste it into the request box.
  5. Choose the Web Server template and submit the request:

    Advanced Certificate Request
  6. The Certificate Issued page should be opened, Select Base64 encoded checkbox.
  7. Click on the Download certificate.
  8. (Optional) Click on the Download certificate chain in case you need your CA to be trusted in your domain. Import the ca-chain.pem into the Trusted Root Certification Authorities store on the clients machines.

1.3. Import a SSL certificate to the Protectimus Platform

To import the issued certificate, follow the instructions in the “2. How to Import Trusted SSL Certificate” section.

2. How to Import Trusted SSL Certificate

By default, a self-signed SSL certificate is used for the SSL connections with the Protectimus On-Premise Platform. If you would like to import your own trusted SSL certificate, follow the instructions below.

To import the SSL certificate, you will need the SSL certificate itself, the keytool, and openssl utilities.

Different SSL certificate formats are supported, including .pkcs12, .pem, .der, .pfx.

Replace names and parameters taking into account your configuration:

  1. Combine the certificate (test-server.cer) and the private key (test-server.key) into a PKCS12 file which is Java-compatible keystore (.jks) format:
openssl pkcs12 -export -in test-server.cer -inkey test-server.key -out test-server.pfx
 
  1. Create a Java Keystore and import the .pfx file into it:
keytool -importkeystore -srckeystore test-server.pfx -srcstoretype PKCS12 -destkeystore “C:\Program Files\Protectimus\Platform\keystore.jks” -deststoretype JKS

Then you need to update the protectimus.platform.properties file to apply changes.

You can find instructions in the 3.1. SSL Certificate Configuration section. Don’t forget to save the file and restart the Platform.

3. How to Configure SSL Certificate, Mail and SMS Tokens, and Specify the Path to the License File

Once you’ve successfully installed the platform, it will generate a configuration file named protectimus.platform.properties. The protectimus.platform.properties file must be located in the same directory as the executable.

This file allows you to customize the following settings:
  • Add SSL certificate for the Protectimus Platform. Different SSL certificate formats are supported, including .pkcs12, .pem, .der, .pfx.
  • Configure delivery of messages via email;
  • Configure SMPP server connection to add your SMS provider to deliver one-time passwords via SMS.
  • Specify the path to the license file. Please note that the path to the license file should be indicated with double backslashes
    (eg. C:\\some\\path\\file).

Available properties that you can add to the protectimus.platform.properties file include:

3.1. SSL Certificate Configuration

PROPERTY NAMEPROTERTY STANDS FOR
https.port
Port on which your application listens for HTTPS requests. Typically, platform uses port 8443 by default.
https.keystore.type
Type of keystore used to store SSL certificates and private keys. Types: JKS, PKCS12.
https.keystore.password
Password required to access the keystore.
https.keystore
Full path to the keystore file containing SSL certificates and private keys.
Please note that the keystore file should be located in the ..\\Protectimus\\Platform folder, in the same place as the .war and .properties files. The path should be indicated with double backslashes, for example C:\\Program Files\\Protectimus\\Platform\\keystore.jks.
Example:
https.port = 8443
https.keystore.type = JKS
https.keystore.password = **********
https.keystore = C:\\Program Files\\Protectimus\\Platform\\keystore.jks

3.2. Email Message Delivery Configuration

PROPERTY NAMEPROTERTY STANDS FOR
smtp.host
SMTP server’s hostname or IP address.
smtp.port
Port number for SMTP server.
smtp.user
Username or email account for authentication.
smtp.password
Password associated with the username or email account.
default.from.address
Allows you to set the address from which emails will be sent to the user.
Example:
smtp.host = smtp-server.com
smtp.port = 25
smtp.user = [email protected]
smtp.password = **********

3.3. SMPP Server Connection Configuration

PLEASE NOTE! Additionally, you can configure settings for SMSC and ALIBABA as well.
PROPERTY NAMEPROTERTY STANDS FOR
smpp.server.login
SMPP server login.
smpp.server.password
SMPP server password.
smpp.server.host
Host or IP address of the SMPP server.
smpp.server.port
Port for the SMPP server.
smpp.message.encoding
Encoding for SMPP messages.
smpp.from.address
Source or sender address for SMPP messages.
Example:
smpp.server.login = login
smpp.server.password = **********
smpp.server.host = smpp.example.com
smpp.server.port = 12000
smpp.message.encoding = UTF-8
smpp.from.address = Protectimus

If you have other questions, contact Protectimus customer support service.

Failure Response Plan for Protectimus On-Premise MFA Platform

In the event of a failure of the Protectimus On-Premise Platform, a quick and structured response is essential to minimize downtime and maintain security. This action plan in case of On-Premise Protectimus Platform failure outlines key failure scenarios, monitoring recommendations, recovery procedures, and preventive measures. By following these guidelines, administrators can efficiently detect, address, and prevent platform disruptions.

1. General Information

The Protectimus Two-Factor Authentication Platform is used in an on-premise configuration. It consists of the following main components:
  • Database (DB);
  • Application server and API.
These components can operate on a single server or be distributed across multiple machines. There is also the possibility of deploying a solution with a backup server or cluster for fault tolerance.

2. Possible Failure Scenarios

The main potential causes of failure for the Protectimus On-Premise Platform include:
  • Database failure;
  • Application server crash or malfunction;
  • Network failure – no access to the API;
  • Hardware failure.
Note: External attacks such as DDoS are not considered, as the platform does not have external access.

3. Monitoring Recommendations for Immediate Issue Detection

It is recommended to set up automatic monitoring (in the case of a cluster, each node must be monitored) at least every minute to check the system’s status by verifying:
  1. API responsiveness:
    • Request:
      [platform path]/api/v1/auth-service/balance

    • If successfully connected without authorization, a 401 response should be returned.

  2. Root URL accessibility (this method does not guarantee that the database is operational):
    • https://localhost:8443/ should respond with a 200 status code and the platform’s HTML page.

4. Failure Response Plan

4.1. Administrator Actions Upon Detecting an Incorrect Response:

  1. Resolve network issues (if applicable).
  2. Resolve hardware issues (if applicable).
  3. If previous steps do not help – restore from a virtual machine snapshot, database backup, or full system backup.

4.2. Backup Recommendations

To minimize data loss, the following backup scheme is recommended:
  • Daily incremental database backups;
  • Weekly full database backups;
  • Monthly full system backups.

Please note: When restoring from a backup, any data created after the last backup will be lost. This will primarily affect new users or resources, and event logs for that period will also be lost.

4.3. Clustered Platform

If a cluster is used, failover to a backup server occurs automatically, meaning most issues are resolved without impacting the end user. We recommend this option.

5. Post-Failure Recovery

To restore the platform to operational status, follow these steps:
  1. Perform recovery according to the selected procedure.
  2. Ensure all services are running and functional.
  3. Test authentication on client devices.
  4. Notify responsible personnel upon completion of recovery.

6. Preventing Future Failures

  • Regularly check the integrity of backups.
  • Perform test recoveries to verify the functionality of backup copies.
  • Conduct stress tests to assess platform load capacity.
  • Configure alerts for administrators about critical events.

This information is intended to minimize risks and help respond quickly in the event of issues with the Protectimus On-Premise MFA Platform.

If you have other questions, contact Protectimus customer support service.

How to Enable Protectimus Bots

Protectimus Bots are used for delivering one-time passwords (OTPs) and important notifications from the Protectimus Two-Factor Authentication System to end users. These chatbots, named Protectimus Bot, are available on Facebook Messenger, Telegram, and Viber. The list of supported messaging applications is constantly growing and can be expanded upon request from our clients. OTP delivery through messaging apps addresses several key issues: it is much more secure than SMS authentication, completely free, and easy to use.

1. Login to Your Protectimus Account and Add Resource

  1. Login to your account in Protectimus SAAS Service or On-Premise Platform and go to the Resources page.
Protectimus two-factor authentication sytem setup - Open the Resources page  
  1. Click the Add Resource button.
Protectimus two-factor authentication sytem setup - Add Resource  
  1. This will take you to the Resource adding page, where you’ll need to specify just a Resource Name and click Save, the remaining parameters are optional.
Protectimus two-factor authentication sytem setup - Add Resource Name  
  • Webhook URL. Whenever there is an update for the Resources, we will send a POST request containing a JSON update to the specified webhook URL. In case of an unsuccessful request, we will give up only after a reasonable amount of attempts. Currently, webhook is used to receive the result of INTERACTIVE authentications. INTERACTIVE authentications are supported by Protectimus Bot token.
  • SSL certificate. The public key certificate certifies the belonging of the public key to the indicated webhook. The certificate supplied should be PEM encoded (ASCII BASE64), The pem file must contain only the public key beginning with “—–BEGIN CERTIFICATE—– ” and end with “—– END CERTIFICATE —–“
  • Allowed IP Addresses. Allows you to restrict access to the system only from trusted IP addresses.
  • IP Verification is Enabled. Enables the restriction of access to the system only from trusted IP addresses.
  • Number of Unsuccessful Login Attempts before Locking. The value of this parameter should be specified between 3 and 10. If a User or Token is not authenticated successfully, the number of failed authentication attempts will be increased for this User. When the threshold number of failed attempts for the specified Resource is exceeded, this User will be locked. A User can be unlocked through the web interface or the API (the edit user method). If a User is authenticated successfully, the number of failed authentication attempts will be set at zero, if the threshold number of failed attempts for the specified resource is not exceeded, and if this User has not yet been locked.
  • Enabled. Allows you to enable or disable the Resource.

2. Activate Users’ Self-Service Portal

You can find the full detailed guide on enabling Protectimus Self-Service Portal and testing it here:
https://www.protectimus.com/guides/users-self-service-portal/.
  1. Go to the Resources tab, click on the resource name, and navigate to the Self-Service tab.
Set Up the Protectimus User's Self-Service Portal - Step 1 Set Up the Protectimus User's Self-Service Portal - Step 2

  1. If you haven’t enabled the Self-Service Portal for your users yet, click on Enable User’s Self-Service for your resource.
Set Up the Protectimus User's Self-Service Portal - Step 3

  1. Specify the address at which your users will access the Self-Service Portal.

    Enter just the final portion of the address, the portal alias, in the field. The full address to the portal will be the authentication server address plus the alias you specified. For example, if you’re using the Protectimus SaaS service, and you specify “portal” as the alias, the link you give to your users will look like this: https://service.protectimus.com/selfservice/portal

    If you are running your own instance of the authentication platform on your own premises, the “service.protectimus.com” portion of the address will be replaced with the address to your platform instance. For example: https://localhost:8080/selfservice/portal.
Set Up the Protectimus User's Self-Service Portal - Step 4

  1. Set up the list of actions available to your users in the self-service portal.

    You’ll see the list of actions available to your users, as shown in the image below. By default, all actions are disabled.

    Enable the action Register New Token. Then you’ll need to specify the Token types for enroll token, if your users will use only Protectimus Bots, leave only Protectimus Bot.
Set Up the Protectimus User's Self-Service Portal - Add Protetimus Bot

3. Add Users and Specify Their Passwords or Emails

  1. Go to the Users page.
Protectimus two-factor authentication sytem setup - Go to Users page  
  1. Click the Add User button.
Protectimus two-factor authentication sytem setup - Click Add Users

  1. Set the user Login. The User Login must contain only Latin letters, numbers, and symbols _-@∽!#%+.$. Spaces and any other symbols are not allowed.

    Also set a password or an email address. A verification code will be sent to the registered email address to allow your users to log into the Self-Service Portal. If a User has both a password and a registered email address, that User will use the password to log in. After a Token is issued for a User and assigned to a Resource, the User will also be asked for an OTP password from the Token when logging in to the Users’ Self-Service Portal.
Protectimus 2FA sytem setup - Add User password or email if you will activate Users's Self Service

PLEASE NOTE! You can import users. Detailed instructions on importing users are available here – https://www.protectimus.com/guides/users/#2-how-to-import-users. Make sure that your Users have specified passwords or email addresses.

4. Assign Users to the Resource

  1. Go to the Resources page.
Protectimus two-factor authentication sytem setup - Open the Resources page

  1. Find the Resource you need, click Assign, then Users. And assign all necessary Users to this Resource. Users must be assigned to an appropriate Resource in order to have access to the Self-Service Portal.
How to Assign Tokens With Users to a Resource - step 1

5. Provide Your Users With Instructions on How to Access the Protectimus Self-Service Portal

  1. Give your users a URL to access the Self-Service Portal.
URL to access the Protectimus Self-Service Portal

  1. Inform your users what usernames and passwords / emails should they use to access the Users Self-Service Portal.

6. Provide Your Users With Instructions on How to Add the Protectimus Bot

  1. Log into the Protectimus Self-Service Portal using your username and password or email (contact your administrator for more info if you have any questions).
  2. Choose Register New Token.
Choose Register New Token

  1. Then choose Bot Token.
Bot Token button

  1. Enter the token name (any name you want).
  2. Open the messaging app you prefer: Facebook Messenger, Telegram, or Viber.
  3. Find the ProtectimusBot chatbot using the built-in search (built-in search works only for Telegram) or use the link:

    Please note: To find the ProtectimusBot chatbot on Facebook Messenger and Viber, users will need to use a direct link, as the built-in search feature doesn’t work for these messaging apps.
    • For Facebook Messenger: http://m.me/ProtectimusBot
    • For Telegram: https://t.me/protectimusbot
    • For Viber: viber://pa?chatURI=Protectimus
  4. Send the command /getid to the ProtectimusBot to receive a unique chat ID.
  5. Input the received chat ID into the field User’s Chat ID.
  6. Indicate which messaging app you’ve chosen in the field Messenger.
  7. Don’t change anything in the field One-time Password Length.
  8. Click Save.
Enable Protectimus Bot

  1. After that, you will receive the one-time password in the messaging app you’ve chosen. Enter it into the field One-time Password and click Save.
Enter OTP into the field One-time Password and click Save

  1. If everything was done correctly, you will see the message: The token has been successfully created.
The token has been successfully created

NComputing vSpace 2FA

Here’s a simple guide to beefing up your NComputing vSpace with Protectimus multi-factor authentication (MFA or 2FA) using the RADIUS protocol.

To set up Protectimus two-factor authentication in NComputing vSpace through RADIUS, you’ll need either Protectimus Cloud 2FA Service or the On-Premise 2FA Platform. The connection is made via a connector called Protectimus RADIUS Server. NComputing vSpace acts as the RADIUS client.

Here’s how it works: The Protectimus RADIUS Server connector passes authentication requests from NComputing vSpace to the Protectimus multi-factor authentication (MFA) server. Depending on the response, access is either granted or denied.

Below, we’ll walk you through an example of integrating Protectimus 2FA with NComputing vSpace.

Protectimus NComputing vSpace 2FA integration via RADIUS - scheme

1. How to Enable Multi-Factor Authentication for NComputing vSpace

You can set up multi-factor authentication (2FA) for NComputing vSpace with Protectimus using the RADIUS protocol:
  1. Get registered with Protectimus SAAS Service or install the On-Premise 2FA Platform and configure basic settings.
  2. Install and configure Protectimus RADIUS Server.
  3. Add Protectimus as RADIUS Server for NComputing vSpace.

2. Get Registered and Configure Basic Protectimus Settings

  1. Register with the Protectimus Cloud Service and activate API or install the Protectimus On-Premise Platform (if you install Protectimus Platform on Windows, check the RProxy box during the installation).
  2. Add Resource.
  3. Add Users.
  4. Add Tokens or activate Users’ Self Service Portal.
  5. Assign Tokens to Users.
  6. Assign Tokens with Users to the Resource.
 

3. Install and Configure Protectimus RADIUS Server

Detailed instructions for installing and configuring the Protectimus RADIUS Server for NComputing vSpace two-factor authentication using RADIUS are available here.

4. Add Protectimus as RADIUS Server for NComputing vSpace

  1. Access your NComputing vSpace dashboard and navigate to the RADIUS Server Settings section.

  2. Input the details as specified below:
    LabelCome up with a name for your RADIUS server.
    Hostname/AddressIP of server where the Protectimus RADIUS Server component is installed.
    Authentication PortIndicate 1812 (or whichever port you configured in the Protectimus radius.yml file when configuring Protectimus RADIUS Server).
    Authentication TypePAP authentication is required.
    Shared Secret CodeIndicate the shared secret you created in the Protectimus radius.yml file (radius.secret property) when configuring Protectimus RADIUS Server.
    Server Timeout (in seconds)Set to 90 seconds.
    Max AttemptsThis specifies how many times the authentication request should be sent. Set to 1.

  3. Click Save and test the integration.

Integration of two-factor authentication (2FA/MFA) for your NComputing vSpace is now complete. If you have other questions, contact Protectimus customer support service.

Nerdio 2FA

This guide details the steps to set up Protectimus multi-factor authentication (MFA or 2FA) for Nerdio using the RADIUS protocol.

When integrating Protectimus two-factor authentication with Nerdio via RADIUS, the Protectimus Cloud 2FA Service or On-Premise 2FA Platform acts as a RADIUS server through a dedicated connector named Protectimus RADIUS Server. Conversely, Nerdio functions as a RADIUS client.

Here’s how it works: the Protectimus RADIUS Server connector forwards authentication requests from Nerdio to the Protectimus multi-factor authentication (MFA) server. Access is granted or denied based on the response received.

Below, we provide an example of how to integrate Protectimus 2FA with Nerdio.

Protectimus Nerdio 2FA integration via RADIUS - scheme

1. How to Enable Multi-Factor Authentication for Nerdio

You can set up multi-factor authentication (2FA) for Nerdio with Protectimus using the RADIUS protocol:
  1. Get registered with Protectimus SAAS Service or install the On-Premise 2FA Platform and configure basic settings.
  2. Install and configure Protectimus RADIUS Server.
  3. Add Protectimus as RADIUS Server for Nerdio.

2. Get Registered and Configure Basic Protectimus Settings

  1. Register with the Protectimus Cloud Service and activate API or install the Protectimus On-Premise Platform (if you install Protectimus Platform on Windows, check the RProxy box during the installation).
  2. Add Resource.
  3. Add Users.
  4. Add Tokens or activate Users’ Self Service Portal.
  5. Assign Tokens to Users.
  6. Assign Tokens with Users to the Resource.
 

3. Install and Configure Protectimus RADIUS Server

Detailed instructions for installing and configuring the Protectimus RADIUS Server for Nerdio two-factor authentication using RADIUS are available here.

4. Add Protectimus as RADIUS Server for Nerdio

  1. Access your Nerdio dashboard and navigate to the RADIUS Server Settings section.

  2. Input the details as specified below:
    LabelCome up with a name for your RADIUS server.
    Hostname/AddressIP of server where the Protectimus RADIUS Server component is installed.
    Authentication PortIndicate 1812 (or whichever port you configured in the Protectimus radius.yml file when configuring Protectimus RADIUS Server).
    Authentication TypePAP authentication is required.
    Shared Secret CodeIndicate the shared secret you created in the Protectimus radius.yml file (radius.secret property) when configuring Protectimus RADIUS Server.
    Server Timeout (in seconds)Set to 90 seconds.
    Max AttemptsThis specifies how many times the authentication request should be sent. Set to 1.

  3. Click Save and test the integration.

Integration of two-factor authentication (2FA/MFA) for your Nerdio is now complete. If you have other questions, contact Protectimus customer support service.

NetApp Virtual Desktop Service 2FA

This guide outlines the process of setting up Protectimus multi-factor authentication (MFA or 2FA) for NetApp Virtual Desktop Service (VDS) using the RADIUS protocol.

When integrating Protectimus two-factor authentication with NetApp Virtual Desktop Service via RADIUS, the Protectimus Cloud 2FA Service or On-Premise 2FA Platform serves as a RADIUS server through a dedicated connector known as Protectimus RADIUS Server. On the other hand, NetApp VDS operates as a RADIUS client.

Here’s how it functions: the Protectimus RADIUS Server connector forwards authentication requests from NetApp VDS to the Protectimus multi-factor authentication (MFA) server. Depending on the response received, access is either granted or denied.

Below, we offer an example of how to integrate Protectimus 2FA with NetApp Virtual Desktop Service for seamless NetApp VDS MFA.

Protectimus NetApp Virtual Desktop Service 2FA integration via RADIUS - scheme

1. How to Enable Multi-Factor Authentication for NetApp Virtual Desktop Service

You can set up multi-factor authentication (2FA) for NetApp VDS with Protectimus using the RADIUS protocol:
  1. Get registered with Protectimus SAAS Service or install the On-Premise 2FA Platform and configure basic settings.
  2. Install and configure Protectimus RADIUS Server.
  3. Add Protectimus as RADIUS Server for NetApp Virtual Desktop Service.

2. Get Registered and Configure Basic Protectimus Settings

  1. Register with the Protectimus Cloud Service and activate API or install the Protectimus On-Premise Platform (if you install Protectimus Platform on Windows, check the RProxy box during the installation).
  2. Add Resource.
  3. Add Users.
  4. Add Tokens or activate Users’ Self Service Portal.
  5. Assign Tokens to Users.
  6. Assign Tokens with Users to the Resource.
 

3. Install and Configure Protectimus RADIUS Server

Detailed instructions for installing and configuring the Protectimus RADIUS Server for NetApp Virtual Desktop Service two-factor authentication using RADIUS are available here.

4. Add Protectimus as RADIUS Server for NetApp VDS

  1. Access your NetApp Virtual Desktop Service dashboard and navigate to the RADIUS Server Settings section.

  2. Input the details as specified below:
    LabelCome up with a name for your RADIUS server.
    Hostname/AddressIP of server where the Protectimus RADIUS Server component is installed.
    Authentication PortIndicate 1812 (or whichever port you configured in the Protectimus radius.yml file when configuring Protectimus RADIUS Server).
    Authentication typePAP authentication is required.
    Shared secret codeIndicate the shared secret you created in the Protectimus radius.yml file (radius.secret property) when configuring Protectimus RADIUS Server.
    Server timeout (in seconds)Set to 90 seconds.
    Max attemptsThis specifies how many times the authentication request should be sent. Set to 1.

  3. Click Save and test the integration.

Integration of two-factor authentication (2FA/MFA) for your NetApp Virtual Desktop Service is now complete. If you have other questions, contact Protectimus customer support service.