S 4.113 Use of an authentication server for remote access VPNs

Initiation responsibility: IT Security Officer

Implementation responsibility: Administrator

For remote access VPNs (RAS VPNs) with numerous users, consideration should be given to how remote access users can be administrated efficiently. In general, every RAS user needs to be given a system identifier (user account of the operating system) and must provide identification and authentication when using such a user account. RAS functionality and a common user administration system are already integrated into some operating systems (e.g. in current versions of Windows). In many cases, there is a problem with medium-sized and large networks, which are usually organised by dividing them into several different subnetworks (domains, administration areas), because the user data from each administration area needs to be administered separately. If users are also able to log in to other subnetworks, it is necessary to set up cross-certificates (trust relationships) or to set up and maintain a central directory service. Another alternative is to set up an additional user account for every user in the other subnetwork, but this makes administration of the user data more difficult. For RAS in particular, special authentication systems have emerged that can also be used for the "normal" authentication process when logging in to the system. Typical examples of such systems include RADIUS, TACACS, TACACS+, and other LDAP-based directory services.

These systems have the following basic design:

The login process must support the use of external authentication servers in this case. Furthermore, the network address of the authentication server to be used must be entered correctly in the configuration data of the login process. If a user now wants to log in to the system, the following (highly simplified) procedure is followed, regardless of whether the user is using a RAS connection for this purpose or is located directly in the LAN:

Through the use of central authentication servers, it is possible to administrate the authentication data consistently on the one hand and, on the other hand, it allows for the use of authentication mechanisms that are better than those supported by default by the operating systems. Smart cards and token-based mechanisms are examples of such mechanisms. Depending on the system, the authentication mechanisms create one-time passwords that are shown once on the screen and the user must use as the password.

For medium-sized and large networks, the use of authentication servers is recommended, especially for RAS, because this offers a significantly higher level of security than user authentication. However, it is necessary to consider that this server needs to be administrated and maintained as well. On the one hand, an authentication server must be placed in the network so that it can be accessed performantly, but it also needs to be protected against unauthorised access on the other hand.

Review questions: