Authentication methods

Pointsharp ID offers several types of authentication methods for user authentication, ranging from username/password to strong two-factor authentication.

All authentication methods will be stored under the Authentication tab. You can add new methods, edit, or remove existing.

A default set of authentication methods are already configured.

Add new methods if none of the pre-configured authentication methods suits the setup.

Pre-configured authentication methods

The combination of IP Address and Port must be unique for Pointsharp ID due to the nature of server software accepting requests on sockets.

Below are all pre-configured authentication methods:

OATH

The OATH authentication performs authentication according to the OATH standard. The user enters an OTP received from the token, and the server validates the received OTP.

Pointsharp delivers software-based OATH tokens for all mobile platforms including Windows Phone, Android, iPhone and Java Mobile Edition. Additionally, Pointsharp also market hardware-based OATH tokens in various form factors.

Password

The user enters username and password. Pointsharp ID will authenticate the user towards the configured User Storages.

This method can be used (in conjunction with Username Domain Removal function) when using Active Sync or to protect the Directory users from brute-force attacks.

RADIUS

The user enters credentials for a legacy RADIUS-based authentication system, for example, RSA SecurID.

Pointsharp ID acts in this case as RADIUS proxy.

SDK

Pointsharp SDK offers the ability to integrate and develop customer-defined authentication methods.

For further information on developing and deploying custom-built authentication methods consult the Pointsharp SDK documentation.

SmartAuth

SmartAuth is a policy-driven authentication method, which decides what authentication method to authenticate the user with based on a policy framework.

SMS

The user enters username and password, then a One-Time Password (OTP) is sent to the user. The user enters the OTP and is authenticated.

Add an authentication method

  1. Start Pointsharp ID Admin GUI as an administrator.

  2. Go to the Authentication tab.

  3. Click Add and select the Authentication method in the menu.

  4. Listener

    • Name: Set a name for the authentication method. This name is used in the Pointsharp ID audit log. The name is read only when the method is in use by a SmartAuth method.

    • IP Address: Set the IP address on which to accept the incoming authentication requests. (0.0.0.0 means all local addresses).

    • Port: Set the port for this authentication method to accept incoming authentication requests on. Ports are assigned from 18120 and up. An example of the port on the authentication method itself; this one is using "18134" but can be set to any port needed:

      authentication port

    • SmartAuth Only: Enable this to restrict the use of this method to only be from a SmartAuth-based authentication method. This will disable this method for RADIUS clients as well as all Pointsharp Web API clients. Default value is false, the SmartAuth Only function is disabled.

  5. AD Account Check: Check this for enabling the Directory account status check. See AD account check.

  6. Reply Message: Press this button to configure the reply messages that Pointsharp ID will communicate when challenging the user for further credentials. See Reply messages.

  7. Under Additional settings, choose if Pointsharp password is to be used (if not, the Directory passwords will be used).

  8. Enable User Domain Removal functionality if Pointsharp ID should remove any UPN suffix or DOMAIN\ prefixes in the incoming username.

  9. It is possible to delimit the allowed users for certain authentication methods in the Advanced Options. See Advanced options.

  10. Use Cache Settings to configure Pointsharp ID to re-use past authentication decisions. This is useful if there is no need for the user to enter a new OTP in every authentication attempt. See Cache settings.

  11. Click OK.

  12. Click Apply.

  13. Go to the General tab, click Restart. A Restart can be done from anywhere in the GUI by pressing CTRL-R.

Press the Help button for detailed information on each field and function.

SmartLock — User lock and time lock configuration

AD account check

Check this for enabling the directory account status check.

This feature requires that Pointsharp ID is configured against a Directory as User Storage, and that the communication is secured with SSL (LDAPS).

When this is enabled and the Directory account is in the must change password state, the user will be challenged for the old password once again and challenged twice for a new password. The user will be authenticated and the password will be changed, if the old password was valid and the new password fulfill the password complexity policy.

Reply messages

Press this button to configure the textual reply messages that Pointsharp ID will communicate when challenging the user for further credentials, both in normal stateful authentication of a user’s identity, and in the password change challenge flow.

This message is set in the AuthenticationReply object received when calling the authentication service in Pointsharp ID Web services, as well as it is received in the RADIUS attribute Reply-Message when Pointsharp ID challenges the user for further credentials.

Parameter Description

Challenge Message

This is the reply message used when challenging the user for further credentials. For example the one-time password, either sent to the user in an SMS or obtained from the user’s OATH token. This value is used in the stateful SMS and OATH authentication.

Default this is set to: Pointsharp ID challenged {username}, and the text {username} will be replaced with the username.

Must Change Password

This is the reply message used when the Directory account is in password change state. This message asks for the old password once more.

Default this is set to: User {username} must change password, enter current password again, and the text {username} will be replaced with the username.

New Password

This is the reply message used when the Directory account is in password change state. This message asks for the new password to set.

Default this is set to: User {username} must change password, enter a new password, and the text {username} will be replaced with the username.

New Password (again)

This is the reply message used when the Directory account is in password change state. This message asks for the new password again to set.

Default this is set to: User {username} must change password, enter new password again, and the text {username} will be replaced with the username.

Advanced options

It is possible to delimit the allowed users for certain authentication methods in Pointsharp ID, done in different ways depending on what User Storage a user resides in.

Parameter Description

User Storage List

Manage the allowed User Storages by clicking Add and Remove. Use the Move Up and Move Down to re-order the policies.

By default ALL_USER_STORAGES (built-in) is added to this list, which does not delimit the allowed users at all, i.e. all users are allowed to authenticate.

Alternate Username Attributes

Enable this to make it possible to generate a list of attributes in order to alternate usernames for a user.

If a user tries to authenticate with an alternate username, for example, an email address, then this list of attributes will be used to match the given username against all users' values for those attributes. If one match is found, then the matched user’s username will be used in the authentication procedure.

Example 1. Alternate username

User x have the alternate username x@y.com stored with attribute mail. If x@y.com is used as username, then x will be used as the username in the authentication procedure.

User Attributes

When enabled, the provided attributes are loaded for the authenticated user and sent back in the reply. This list is used to avoid too many calls to the user storage if the behaviour of the authentication procedure requires multiple values from the user.

This is not applicable for SmartAuth based authentication methods.

UPN Suffix

When enabled, the UPN suffix will be used to create a UPN for the authenticated user and sent back in the reply.

This is not applicable for SmartAuth based authentication methods.

Example 2. UPN suffix usage

If UPN Suffix example.com is defined, x@example.com will be created for user x.

Cache settings

The Authentication Cache is optional and offers a mean to cache a successful authentication request for a user. That is, when the user re-uses the same password (or password combined with OTP) and found in the cache, the cached authentication decision is re-used.

Parameter Description

Validity Interval (sec)

Set this to the number of seconds that the Authentication Cache entry is valid before it is assumed to be expired.

Default this is set to 86400 seconds (24 hours). Set this to 0 when the cache is to be valid forever.

Usage Counter

A cache entry is valid for a certain amount of authentications.

Default set to 0, meaning that the cache can be used unlimited times.

Re-authenticate when Expired

Enable this to re-authenticate the credentials that are stored in the Authentication Cache entry when the entry is expired or usage limit is reached. Beware using this for authentication methods that may cause user account lockout, for example, the Directory authentication method.

Legacy Cache

Enable this to use the legacy cache included in pre-4.6 versions. In Pointsharp ID 4.7 and later, the legacy cache is replaced by a new cache implementation.

Cache Length

Enabled when the Legacy Cache is off.

Enter number of cache entries that are allowed to serve as correct caches (default is 3).

Cache Group

Enabled when the Legacy Cache is off.

Set the cache group to a name that will be the key for the cache. This value can be set for multiple authentication method cache settings to share the cache between multiple authentication methods.

When this is enabled, the cache is always stored reversible (this can be overridden in the Reversible Cache setting).

By default, this is left blank and not in use.

Check Dropped Caches

Enabled when the Legacy Cache is off.

This is a helper function that is not changing the core functionality. The user authentication is rejected, but with this feature enabled it may for certain cases be possible to delimit the user locking function.

Enable this flag to check among dropped cache values when the user is rejected. If a match is found the user will be rejected, but without increasing the user locking counters. The number of available dropped cache values are defined in the Cache Length setting. This feature can be useful if users have mobile devices that frequently retry with old (i.e. cache is dropped) credentials, which would normally result in the user account being locked.

Enabled by default.

Check Other Caches

Enabled when the Legacy Cache is off.

This is a helper function that is not changing the core functionality. The user authentication is rejected, but with this feature enabled it may for certain cases be possible to delimit the user locking function.

Enable this flag to check cache values for all the other authentication methods when the user is rejected. If a match is found the user will be rejected, but without increasing the user locking counters. This feature can be useful if users accidentally use the wrong credentials for one method with credentials that have been used for another authentication method.

Enabled by default.

Cache OTP Only

Enabled when the Legacy Cache is off.

Applicable only for the OATH authentication method. Enable this flag to cache only the OTP, i.e. the password will be validated on all requests.

Renew Caches

Enable this to renew the timestamp on the valid cached credentials stored on the user.

Renew Cache Group

Set the name of the authentication method for which you want to enable the Renew Cache feature. This can also be set to the Cache Group name defined for other authentication methods.

Empty by default.

Email authentication

Similar configuration as for SMS can be also be done for email based authentication. See SMS authentication. The important part that differs from SMS is:

Parameter Description

Type

Select Email from the drop-down menu.

Email Attribute

Set this to mail.

The notification should be email based instead of SMS based notification.

Enrollment

The Enrollment method can either perform authentication with configured authentication method for existing PSID user, or start a new user enrollment by setting a new Pointsharp password. After user setup, and login, a PointsharpLogin token and a default Time-based One-Time Password token will be created and sent to the Login Application.

See Simplified enrollment of the Login App for the enrollment method configurations.

FIDO authentication

The FIDO authentication method performs authentication with username and passwordless/password towards the defined User Storages for the client in question. If these are valid, then the user is challenged for a FIDO security key verification. The user is authenticated if the user uses a valid FIDO security key.

Ongoing user requests are stateful, i.e. the same browser window needs to be used.

NTLM authentication

The NTLM authentication performs authentication with username and Pointsharp password towards the defined User Storages.

NTLM follows the NTLM authentication protocol, and must only be used with Reversible Pointsharp Password or OTP. Enable Store Reversible Passwords under the Password tab.

Password type

Pointsharp password

The user must enter the Pointsharp password.

Pointsharp password + OTP (appended)

The user must enter the Pointsharp password with a valid OATH OTP appended to it afterward.

Pointsharp password + OTP (auto)

The user must enter a valid OATH OTP and the Pointsharp password. The server validates both ways automatically, that is PP+OTP and OTP+PP.

OTP + Pointsharp password (prepended)

The user must enter a valid OATH OTP and the Pointsharp password appended to it afterward.

Pointsharp password

The user must enter the Pointsharp password with a valid OATH OTP prepended to it in front of the password.

OTP

The user must enter a valid OATH OTP.

For this case the Pointsharp password is not used, i.e. the Pointsharp password setting Store Reversible Passwords is of no interest.
Windows password

The user must enter the Windows Password for authentication.

Pointsharp password/Windows password

The user can enter the Pointsharp password or Windows password for authentication.

Parameter Description

OATH Window Size

Set to the number of OATH OTPs that should be tested prior Pointsharp ID decides to reject the user. For example, by setting this to a value 100, Pointsharp ID calculates the next 100 OTPs and compares with the received OTP. If no match is found, the user is not authenticated.

Default value is set to 25.

Serial No Attribute

Enable Live Provisioning by setting this attribute to a Directory attribute on the user object, containing serial numbers or OATH token types for all the OATH tokens to be deployed for the user. This multivalued attribute value is separated with the character |, for example value:

windowsmobile|hardware:12345|javaunsigned

Windows Password URL

Set the URL for Windows password authentication, the website can be an empty default site protected by Windows Authentication.

Port (Windows Password URL)

Set the port for Windows password URL to perform authentication on.

Reject Windows Password

Reject all positive Windows password and don’t lock user account.

State Timeout (min)

Timeout timer for NTLM handshake. Expire time for NTLM Type 2 challenge.

OATH authentication

OATH is an open standard for strong authentication using one-time passwords. OATH authentications use a HMAC-based OTP algorithm. There are event based tokens which uses HOTP (RFC 4226), as well as time based tokens which uses TOTP (RFC 6238), to calculate the OTP. For more information about OATH, visit https://openauthentication.org.

Token

OATH-based authentication requires a token to provide the OTP needed for a successful authentication. Each user needs to have a personalized token. For more information about tokens and the distribution of tokens to users, see separate section about Tokens.

Press the Help button for detailed information on each field and function.
Parameter Description

OATH Window Size

Set to the number of OATH OTPs that should be tested prior Pointsharp ID decides to reject the user. For example, by setting this to a value 100, Pointsharp ID calculates the next 100 OTPs and compares with the received OTP. If no match is found, the user is not authenticated.

Default value is set to 25.

Password Type

Select the type of password mechanism to use, if any. Possible values are:

Stateless: Password + OTP

The user must enter the Windows password in front of the OATH OTP in the password field.

Stateless: OTP + Password

The user must enter the OATH OTP first and then the Windows password in the password field.

Stateless: OTP

The user uses only the OATH OTP as password.

Stateful: Password + OTP

The user is first required to enter username and Windows password, and then stateful challenge for the OATH OTP. Note that the setting OATH State Timeout (min) is enabled for this case.

Stateful: OTP + Password

The user is required to enter username and an OATH OTP, and then stateful challenge for the Windows password. Note that the setting OATH State Timeout (min) is enabled for this case.

Auto Mode

Enable this if appended password and OTP should be allowed both ways, i.e. password + OTP and OTP + password combined in the password field.

This is only supported by:

Stateless: Password + OTP

The user must enter the password in front of the OATH OTP in the password field.

Stateless: OTP + Password

The user must enter the OATH OTP first and then the password in the password field.

Serial No. Attribute

Enable Live Provisioning by setting this attribute to a Directory attribute on the user object, containing serial numbers and OATH Token types for all the OATH tokens to be deployed for the user. This multivalued attribute value is separated with the character |, for example value:

windowsmobile|hardware:12345|javaunsigned.

This function can also be overridden by entering a hardcoded value which will be applied for all users. For example setting the Serial No Attribute to value:MobileToken will send a Mobile Token to all users.

Live provisioning

Live Provisioning is initiated whenever the user tries to authenticate for the first time with a specific authentication method. The serial number attribute value may contain any of the following values:

MobileToken

An Android token is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

GoogleTOTP

A message of how to configure an Authenticator app is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

GoogleHOTP

A message of how to configure an Authenticator app is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

WindowsPhone

A Windows phone activation code is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

WindowsMobile

A Windows mobile token is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Java

A Java mobile token is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

JavaMobile

A Java mobile activation code is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

JavaStandard

A Java standard activation code is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

WindowsDesktop

A Windows desktop token is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

iPhone

An iPhone activation code is sent to the user by re-using the settings configured when sending an OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

Android

An Android token is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

AndroidMarket

An Android market activation code is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

Prefix the value with pin: if the OATH token should be PIN-protected.

MTP

A Multi-Time Password token is sent to the user by re-using the settings configured when sending a OATH token of this type to a user in Pointsharp ID Admin GUI.

hardware:_serialnumber_

A Hardware token is retrieved from the OATH token retrieval framework (PSKC file, CSV file or from a plugin based on OATH retrieval API) based on the _serialnumber_ value.

mtp:_serialnumber_

A Multi-Time Password token is retrieved from the OATH token retrieval framework (PSKC file, CSV file or from a plugin based on OATH retrieval API) based on the _serialnumber_ value.

A serial number for a OATH token

When the Serial No Attribute contains a value that is not detected to be in line with the above matching rules, it is assumed to be a serial number for an OATH token. The token is retrieved from the OATH token retrieval framework (PSKC file, CSV file, or a plugin based on the OATH retrieval API) based on the serial number.

Example 3. Serial number for OATH token

Use the attribute pager, which is not any of the matching rules listed above. The attribute value windowsmobile|12345|pin:iPhone is thereby deployed, and sends an OATH token of type WindowsMobile to the user. An OATH token with serial number 12345 is retrieved from the OATH token retrieval framework (PSKC file, CSV file, or a plugin based on the OATH retrieval API). Finally, it sends a PIN-protected OATH token to the iPhone.

Password authentication

The password authentication performs authentication with username and password towards the defined user storages.

Parameter Description

Failed Password Cache

Check this to enable the Last Failed Password cache on the user. This can be handy for example for ActiveSync devices that are incorrectly configured with an old password (or after a password change at the desktop PC). This user cache is persisted on the Pointsharp ID user and the cache is emptied by either authenticating with a new failed password, or by authenticating with the correct successful password.

Beware that certain Directory account states are not possible to detect, such as Opening Hours, which will lead to "correct" passwords added to the Last Failed Password cache.

Inject Pointsharp Password

Only applicable when the option Pointsharp Password is enabled for the authentication method.

If the user does not have a Pointsharp password stored, and the incoming credentials are correctly validated against the user storage, then that password will be injected as the user’s Pointsharp password.

Default this feature is disabled and set to false.

Device Check

Only applicable for Pointsharp Access Gateway Device authentication methods. If the user has no Access Gateway Devices stored in Pointsharp storage, then the user is always rejected for this authentication method (with no failed login counter increase).

By enabling this, the user will not be allowed to add any Access Gateway Devices automatically without forcing the use of the user portal or by permission by the administrator.

Default this feature is disabled and set to false.

PEAP (Wi-Fi) authentication

Protected Extensible Authentication Protocol (PEAP) is a protocol for authentication in use in many environments such as Wi-Fi, LAN and so on.

The PEAP authentication method implements the so-called protocol PEAPv0-EAP-MSCHAPv2. In short, PEAP uses TLS to negotiate a secure channel from the authenticating peer, for example, the user’s PC, and Pointsharp ID. When the TLS tunnel is established, the peer and Pointsharp ID performs MSCHAPv2 authentication.

Note that for this authentication method to function, Pointsharp ID must be able to reversibly decrypt the user’s password in order to perform the MSCHAPv2 authentication step. In the Password tab, it is required that the Store Pointsharp Password Reversibly is enabled. Also beware that if the users already have deployed Pointsharp Password prior this configuration change, the checkbox Migrate Hashed Pointsharp Password may help whenever the user authenticates with the password, it is restored reversibly.

Parameter Description

PEAP MSCHAPv2 Server certificate (*.pfx)

Pointsharp ID supports PEAP-MSCHAPv2 with an authentication method. PEAP uses certificates within the protocol; an SSL certificate with private key (and if needed the Certificate chain) must be configured.

Click the Browse button to select the server certificate to use as the server certificate in the first PEAP phase. This requires to be a PFX file (PKCS12). When a file is selected, the file is copied to the <INSTALLATION>/bin/peap folder.

Note that the issuer of the server certificate, that is the CA certificate, must be trusted at the authenticating peer. Either this CA must be installed by the user, or the user acknowledges it during authentication.

The PFX file must contain a certificate with its private key.

Password

Enter the password to use, if any, when opening the PFX file. When a password is entered (or empty) press the Test button to verify that the configured password and PFX works and that the Pointsharp ID will be able to use the server certificate in the first PEAP phase.

Password Type

Wi-Fi connections do not support challenge response authentication so everything needed must be posted in one post. This limits the authentication methods to:

Pointsharp Password

The user must enter the Pointsharp Password. Note (again) that the Pointsharp Password must be stored irreversibly encrypted in Pointsharp ID.

Pointsharp Password + OTP (appended)

The user must enter the Pointsharp Password with a valid OATH OTP appended to it afterward.

Pointsharp Password + OTP (auto)

The user must enter a valid OATH OTP and the Pointsharp Password. The server validates both ways automatically, that is PP+OTP and OTP+PP.

OTP + Pointsharp Password (prepended)

The user must enter a valid OATH OTP and the Pointsharp Password appended to it afterward.

Pointsharp Password

The user must enter the Pointsharp Password with a valid OATH OTP prepended to it in front of the password.

OTP

The user must enter a valid OATH OTP. For this case the Pointsharp Password is not used, i.e. the Pointsharp Password setting Store Reversible Passwords is of no interest.

Pointsharp Authentication cache can be used if the Wi-Fi network does a re-authentication often. The OTP will then be valid during the cache validity time and by that avoid forcing the user to re-authenticate. This problem does only occur when OTP is used.
The PEAP feature is an add-on to Pointsharp ID.

RADIUS (proxy) authentication

All RADIUS clients must be defined and configured under the Clients Tab, in order to use Pointsharp ID as an authentication server. The shared secret must be set on the client as well.

RADIUS Mschap authentication

Use the specific Radius Mschap method if Mschap is a requirement.

This method offers the ability to add two-factor authentication in addition to the RADIUS MS-CHAPv2 authentication which is performed with a compliant RADIUS server.

The main difference between PAP (Password Authentication Protocol) and Mschap configuration in the ID Server, is that the RADIUS client settings are needed in the authentication method itself.

SDK authentication

Pointsharp SDK leverages the possibility to integrate Pointsharp ID with any third-party application or other customer-specific system.

In order to deploy an authentication method, the plugin is developed with the SDK. All plugin dll files are placed in the /plugins folder in the /bin folder.

  1. Select the Plugin implementation to use for this authentication method.

SmartAuth authentication

SmartAuth is a policy-based authentication method. The SmartAuth policy-based framework is built on top of the existing authentication methods in Pointsharp ID, where the SmartAuth policies are evaluated and the user is dynamically re-directed to be authenticated based on the defined policy.

For example, users in a certain group are "allowed" authentication with a certain authentication method. All other users who do not meet this policy are authenticated using a different authentication method. Certain users may also be rejected due to too many authentication requests.

A few examples of what can be done:

  • Demand that users in a specific Organizational Unit must use OATH tokens, and users in another OU must use SMS (or other authentication options).

  • A specific user or users are only allowed a specific amount of devices.

  • A user’s specific device must use a certain authentication method.

  • Users that uses a specific country code are allowed or not allowed SMS, (+46 for example).

Press the Help button for detailed information on each field and function.
Parameter Description

Authentication Policy

Manage the Authentication Policy. Press Add, Edit and Remove to manage, and use Move Up and Move Down to re-order the authentication policies.

SmartAuth Policy Settings

This is the configuration for SmartAuth policy. SmartAuth offers a dynamic and versatile policy-based authentication framework which offers the possibility to authenticate users with different authentication methods based on user group memberships, user attributes, if the user has a Pointsharp password or if the user has a certain mobile phone with an installed OATH token. In the same policy list it is also possible to reject certain users or groups of users based on the same criteria.

Type

Select the type for this SmartAuth policy. Select one of the following:

AlwaysAuthenticate

This policy is always evaluated to a success for all users.

UserAttribute

Use this when the policy is to be evaluated for a user attribute stored on the user in User Storage. This policy supports multi-value attributes, such as memberOf, as well as single-value attributes, such as mail.

PsidUser

This policy evaluates to true when the user is an existing Pointsharp user.

PsidUsername

Use this when the policy is to be evaluated for the incoming username received in the authentication request. By using well-defined username prefixing, it is possible to select what authentication method a user wants to authenticate with. This can also be used when User Domain Removal is enabled, since the policy is evaluated on the username value prior that.

PsidPassword

This policy evaluates to true when the user has or has no Pointsharp password.

PsidToken

This policy is evaluated on the user’s OATH tokens. It is possible to determine if the user has a OATH token or not.

PsidDevice

Use this when the policy is to be evaluated for the user’s ActiveSync devices.

WindowsGroup

Use this policy to require the user to be a member of a group in the Windows Domain. Nested groups are also supported, i.e. a user can be a member of a nested group within the specified group. Enter the distinguished name of the group found in the Directory. A user is allowed if he is member of a nested group as well.

The Pointsharp ID Server must be domain joined for it to work fully.
The user storage must also be configured to enable Windows groups support. This is found by clicking Storage > User Storages > Edit > Advanced > Domain and Container and the configuration is described separately in LDAP pooling.
AlwaysReject

Use this when the policy is to be evaluated to reject all users. In order to delimit the users matching this it is also possible to enter a user attribute policy for this type. For example, reject all users with the mobile attribute set to +46.

Attribute Name

Set the attribute name to use when evaluating this policy for the user in user storage.

Matching Pattern

Enter the matching pattern to use when evaluating this policy for the user in user storage. The value can be combined with asterisks(\*) to configure Starts With, Ends With and Contains matches.

WindowsGroup policies

Must contain the distinguished name for the group in the Directory (no wildcard support).

that some advanced settings must be configured for the User Storage(s). This is found by clicking the Advanced button on the User Storage(s).
PsidToken policies

Must contain either OTP for all OATH-based tokens, TOTP for all time-based OATH tokens, or MTP for the MTP Tokens. It is also possible to specify the client platform value, for example PointsharpLogin. This can also be appended or prepended by a wildcard asterisk, for example, Hardware* will match both Hardware and HardwareTOTP and Google* will match both event-based and time-based authenticator apps. Wildcard rules can also be skipped and use separate policies per platform instead.

PsidDevice policies

Must contain a Device Type pattern, for example, WindowsMail for all Windows 8 clients. It is also possible to use wildcard matching, for example, i* for both iPad and iPhone.

Method

Select the authentication method to use when this policy is successfully evaluated. These methods are defined in the Authentication tab in the Pointsharp ID Admin GUI.

A SmartAuth authentication method can also be configured here, in order to perform another step of policy evaluation.

Example 4. Pattern examples

CN=VPN-Users* will match if a memberOf attribute equals CN=VPN-Users,CN=Users,DC=acme,DC=com.

*@company.com will match if a mail attribute equals user@company.com.

*VPN-Users* will match if a memberOf attribute equals CN=VPN-Users,CN=Users,DC=acme,DC=com.

*-Users,CN=Users,DC=acme,DC=com will match if a memberOf attribute equals CN=VPN-Users,CN=Users,DC=acme,DC=com.

domain* will match all users authenticating with the DOMAIN\<username> syntax for policy type PsidUsername.

Note that the matching is not case-sensitive.

SMS authentication

Pointsharp ID has multiple authentication methods that send an OTP to the users; the OTP is required in the authentication of the users. Commonly these methods send the OTP as a mobile text message (SMS) to the user’s mobile device. The OTPs can be delivered by other notifications as well, such as email and custom notifications.

The SMS authentication method performs authentication with username and password towards the defined User Storages for the client in question. If these are valid, then the user is challenged for a one-time password (OTP). The OTP is sent to the user according to the defined notification method. The user is authenticated if the user enters correct OTP.

Ongoing user requests are stateful, i.e. the same browser window must be used. This is done using the STATE attribute in RADIUS.
Press the Help button for detailed information on each field and function.
Parameter Description

Mobile Number Attribute

The user attribute to retrieve the mobile phone number (or email address) from.

Alphabet

The alphabet characters are used when random generating the OTP to the user. For example, if the OTPs should only contain random 1’s, 2’s, a’s and b’s, then set the alphabet to "12ab".

Some characters may look similar to each other when viewed on a low resolution screen (such as 1 and l).

OTP Length

The length of the OTP in number of characters.

OTP Message

The message used when distributing the OTP to the user. The {otp} is replaced with the OTP by Pointsharp ID.

Primary Notification

Notification used to send the OTP.

Secondary Notification

Notification used to send the OTP if the primary notification is unreachable.

State Timeout

The timeout in minutes for the state parameter. That is, the time interval until the user session is invalidated.

OATH Failover

If this value is set to something else than none, Pointsharp ID will allow an OATH OTP from the users token if the user did not receive the OTP via SMS.