HP Anyware-Okta MFA Integration in GCP (2024)

Overview

This document describes the steps to integrate Okta MFA with an existing HP Anyware deployment on Google Cloud Platform (GCP). The process involves installing an Okta Active Directory (AD) agent and an Okta RADIUS agent in a Windows virtual machine (VM) in the HP Anyware deployment and configuring the Okta service from the Okta Administrator Dashboard. At the end of the process, a HP Anyware user will need to authenticate using both their AD credentials as well as a code from their Google Authenticator app before starting a PCoIP session.
This article contains the following sections:

  • Prerequisites
  • Creating an Okta Agent Host (Optional)
  • Configure Okta
  • Install the Okta AD agent
  • Import AD Users
  • Install the Okta RADIUS agent
  • Open Port in Windows Firewall
  • Configure Okta RADIUS Application
  • Update the HP AnywareConnector
  • User Registers MFA

Prerequisites

For more details of the architecture, please refer to HP Anyware Manager as a Service Documentation, or create a HP Anyware deployment using Terraform.

  1. A working HP Anywaredeployment on GCP managed by HP AnywareConnectors. There should be:
    • A domain controller running AD

    • One or more HP AnywareConnectors

    • One or more remote workstations

  2. An Okta Workforce Identity account.

The steps described in this document assumes a new Okta account. For organization accounts with an existing Okta account and existing configurations, adjust the steps accordingly.

Creating an Okta Agent Host (Optional)

The Okta AD Agent and the Okta RADIUS agent need to be installed in a Windows VM. For a simple proof-of-concept deployment or to save on compute costs, these agents can be installed together and directly in the Domain Controller. Alternatively, a separate Windows VM can be dedicated to running these agents. This guide will assume the latter option.

Create a Windows Server 2016 Datacenter VM and ensure that it has network connectivity with the domain controller and the HP Anyware Connector.

Note: This does NOT work on Server 2019, see https://social.technet.microsoft.com/Forums/en-US/cf047df5-ed4a-46b9-9564-c9db5a9bc8dc/windows-server-2019-default-nps-firewall-rules-port-1812-udp-not-working?forum=ws2019

  • Ensure UDP port 1812 is open internally in the firewall settings as this VM will act as the RADIUS server.
  • Ensure TCP port 3389 is open to the appropriate IP addresses in the firewall settings to allow configuration of the VM via RDP

This VM will also need access to the internet, and should have a public IP address for initial configuration.

In the GCP console, create a VM with the following properties:

  • Name: Name of this VM
  • Region: Recommendation is to select a region where the domain controller is located
  • Machine type: At least n1-standard-2
  • Boot disk: Windows Server 2016 Datacenter
  • Disk size: At least 50 GB
  • Networking: Select the network and subnet which provides connectivity to the Domain Controller and HP AnywareConnectors
  • External IP: Required for initial configuration

After the VM has been created, click on Set Windows Password on the GCP console to set a password for this VM. Then click on RDP to access the desktop of this VM.

The Okta agents requires that the host VM be joined to the domain being managed. To join the domain:

  1. Navigate to Control Panel > System and Security > System and click on Change Settings under Computer name, domain and workgroup settings.HP Anyware-Okta MFA Integration in GCP (1)
  2. From the Computer Name tab, click the Change button.

HP Anyware-Okta MFA Integration in GCP (2)

3. Select Domain in the Member of section and enter your domain name and click OK.

HP Anyware-Okta MFA Integration in GCP (3)

4. On the next screen, enter the user credentials of an AD user with permission to add Computers to the domain.

5. Restart the VM.

Configure Okta

  1. From any computer, log into the Okta Administrator Dashboard at https://<your-domain>-admin.okta.com/admin/getting-started with a super admin account.

  2. Navigate to Security > Multifactor > Factor Types > Google Authenticator and change Inactive to Active.HP Anyware-Okta MFA Integration in GCP (4)

    HP Anyware-Okta MFA Integration in GCP (5)

  3. (Optional) Navigate to Security > Multifactor > Factor Enrollment and click on Edit and change Google Authenticator to Required.HP Anyware-Okta MFA Integration in GCP (6)

    HP Anyware-Okta MFA Integration in GCP (7)

  4. Navigate to Security > Authentication > Sign On and in the Default Policy (which is assigned to Everyone by default) click on Add Rule.HP Anyware-Okta MFA Integration in GCP (8)

    HP Anyware-Okta MFA Integration in GCP (9)

  5. Ensure the configuration includes the following options before clicking the Create Rule button.

    HP Anyware-Okta MFA Integration in GCP (10)

    • Rule Name: Give the rule a name.
    • Authenticates via: RADIUS
    • Prompt for Factor: checked
    • Access is: Allowed

HP Anyware-Okta MFA Integration in GCP (11)

Install the Okta AD agent

To install the Okta AD agent, RDP into the Windows VM where the agent is to be installed, download the agent from Okta’s Administrator Dashboard and run the installer. For detailed instructions, refer to https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-new-integration.htm

  1. RDP into the Windows VM where the Okta AD agent will be installed.

  2. Using a web browser, log into the Okta Administrator Dashboard at https://<your-domain>-admin.okta.com/admin/getting-started with a super admin account.

  3. Navigate to Directory > Directory Integrations and perform the following steps:

a. Select the Add Directory drop down button and then click Add Active Directory.HP Anyware-Okta MFA Integration in GCP (12)

HP Anyware-Okta MFA Integration in GCP (13)

b. Click on Set up Active Directory.

HP Anyware-Okta MFA Integration in GCP (14)

HP Anyware-Okta MFA Integration in GCP (15)

c. Click on Download agent.

HP Anyware-Okta MFA Integration in GCP (16)

HP Anyware-Okta MFA Integration in GCP (17)

d. Note the location of the saved file.

HP Anyware-Okta MFA Integration in GCP (18)

4. Run the downloaded file to start installing the Okta AD agent and follow the on-screen instructions

a. Enter the domain name when prompted and click Next.

b. Create a new AD account for Okta and click Next.

HP Anyware-Okta MFA Integration in GCP (19)

HP Anyware-Okta MFA Integration in GCP (20)

c. Type in a new password for the new AD account and click Next.

HP Anyware-Okta MFA Integration in GCP (21)

HP Anyware-Okta MFA Integration in GCP (22)

d. Set up the proxy server, if any and click Next.

HP Anyware-Okta MFA Integration in GCP (23)

HP Anyware-Okta MFA Integration in GCP (24)

e. Select Production, then enter the sub-domain registered with Okta and click Next.

HP Anyware-Okta MFA Integration in GCP (25)

HP Anyware-Okta MFA Integration in GCP (26)

f. The installer will now bring the user to a screen to sign in with the super admin Okta account in order to link this Okta AD Agent with the Okta account. Authenticate with the Okta admin credentials.

NOTE: The resulting popup is forced in Internet Explorer (IE), even if another browser is set to default. Ensure IE Enhanced Security Configuration is set to OFF in the Server Manager, otherwise you'll get a 404 error.

HP Anyware-Okta MFA Integration in GCP (27)

HP Anyware-Okta MFA Integration in GCP (28)

g. After signing in, allow the Okta AD Agent access by clicking Allow Access.

HP Anyware-Okta MFA Integration in GCP (29)

HP Anyware-Okta MFA Integration in GCP (30)

h. Click Finish after the Installation completed message appears.

HP Anyware-Okta MFA Integration in GCP (31)

HP Anyware-Okta MFA Integration in GCP (32)

5. After successfully installing the Okta AD Agent, the administrator will be brought back to the Okta Administrator Dashboard in the browser to complete importing AD users to Okta. Select the Organizational Units (OU) from which users and groups are to be sync’ed and click Next.

HP Anyware-Okta MFA Integration in GCP (33)

HP Anyware-Okta MFA Integration in GCP (34)

6. Click Next after the Okta Administrator Dashboard confirms the agent has been successfully configured.

HP Anyware-Okta MFA Integration in GCP (35)

HP Anyware-Okta MFA Integration in GCP (36)

7. Select the required attributes from AD to build the Okta profile and click Next.

HP Anyware-Okta MFA Integration in GCP (37)

HP Anyware-Okta MFA Integration in GCP (38)

8. Click Done after Okta confirms that AD has been imported successfully.

HP Anyware-Okta MFA Integration in GCP (39)

HP Anyware-Okta MFA Integration in GCP (40)

Import AD Users

  1. From any computer, log into the Okta Administrator Dashboard athttps://<your-domain>-admin.okta.com/admin/getting-startedwith a super admin account

  2. Navigate toDirectory > Directory Integrationsandclickon the directory that was just set up.


    HP Anyware-Okta MFA Integration in GCP (41)
  3. Click on theImporttab, then click onImport Now.

    HP Anyware-Okta MFA Integration in GCP (42)
  4. SelectFull importand then clickImport.

    HP Anyware-Okta MFA Integration in GCP (43)

  5. ClickOKwhen Okta displays the number of users and groups imported from the AD.

    HP Anyware-Okta MFA Integration in GCP (44)

  6. Under theImporttab, there should now be a list of users imported. Select the users for which to set up a new Okta account. ClickConfirm Assignments.Note: if an AD user matches or partially matches the Okta super admin account,DO NOTassign the user as it will overwrite the super admin account’s password with the corresponding password on the AD. It is recommended to keep the Okta super admin account and the AD account separate.

    HP Anyware-Okta MFA Integration in GCP (45)

  7. Click onAuto-activate users after confirmationto skip manual activation of the new users and then clickConfirm.

    HP Anyware-Okta MFA Integration in GCP (46)

  8. New Okta users have now been created for each selected AD user.

Install the Okta RADIUS agent

To install the Okta RADIUS agent, RDP into the Windows VM where the agent is to be installed, download the agent from Okta’s Administrator Dashboard and run the installer. For detailed instructions, refer tohttps://help.okta.com/en/prod/Content/Topics/Directory/Agent_Installing_the_Okta_Radius_Agent.htm

  1. RDP into the Windows VM where the Okta AD agent will be installed.

  2. Using a web browser, log into the Okta Administrator Dashboard athttps://<your-domain>-admin.okta.com/admin/getting-startedwith a super admin account

  3. Navigate toSettings > Downloads > Okta RADIUS Server Agentand clickDownload Latest.

    HP Anyware-Okta MFA Integration in GCP (47)

  4. Run the installer and follow the on-screen instructions shown next.

    1. Enter aRADIUS Shared Secretand clickNext. This secret is needed when updating the HP AnywareConnector later.

      HP Anyware-Okta MFA Integration in GCP (48)

    2. Configure your Proxy, if one is in use.

      HP Anyware-Okta MFA Integration in GCP (49)

    3. SelectProductionand enter the sub-domain registered with Okta and clickNext.

      HP Anyware-Okta MFA Integration in GCP (50)

    4. Sign in to the Okta account using the Super Admin credentials

      HP Anyware-Okta MFA Integration in GCP (51)

    5. After signing in, allow the Okta AD Agent access by clickingAllow Access.

      HP Anyware-Okta MFA Integration in GCP (52)

    6. ClickFinishwhen the Installation completed message appears.

      HP Anyware-Okta MFA Integration in GCP (53)

Open Port in Windows Firewall

In the Windows VM where the Okta RADIUS agent is installed, a firewall rule must be added to open UDP port 1812.

  1. Open the applicationWindows Firewall with Advanced Security.

  2. Click onInbound Ruleson the left panel, then selectNew Rulefrom the right panel.

    HP Anyware-Okta MFA Integration in GCP (54)

  3. SelectPortand then clickNext.

    HP Anyware-Okta MFA Integration in GCP (55)

  4. SelectUDPand enter1812for the specific local port and then clickNext.

    HP Anyware-Okta MFA Integration in GCP (56)

  5. SelectAllow the Connectionand clickNext.

    HP Anyware-Okta MFA Integration in GCP (57)

  6. Select the appropriate domains and clickNext.

    HP Anyware-Okta MFA Integration in GCP (58)

  7. Give the rule a name and description and clickFinish.

    HP Anyware-Okta MFA Integration in GCP (59)

Configure Okta RADIUS Application

An Okta Application must be created in the Administrator Dashboard to configure the RADIUS agent. Users using this application must then be assigned to the application. For details, please refer tohttps://help.okta.com/en/prod/Content/Topics/Security/Okta_Radius_App.htm

  1. From any computer, log into the Okta Administrator Dashboard athttps://<your-domain>-admin.okta.com/admin/getting-startedwith a super admin account
  2. Navigate toApplications > Applicationsand click onAdd Application.
  3. In the search field, search forradius, and selectRADIUS Applicationby clicking theAddbutton.
  4. Enter an application label
    HP Anyware-Okta MFA Integration in GCP (60)
  5. UnderSign-On Options, select the following and clickDone.
    HP Anyware-Okta MFA Integration in GCP (61)
    • Okta performs primary authentication: unchecked
    • UDP Port: 1812
    • Secret Key: The shared secret used previously
    • Application username format: AD SAM account name
    • Update application username on: Create and update
  6. Navigate toRADIUS Application > Assignmentsand click on theAssigndrop down button and then selectAssign to People.
    HP Anyware-Okta MFA Integration in GCP (62)
  7. Select the users to assign the RADIUS application to. Ensure that theUser Nameis the AD SAM account name without the domain name (e.g. useuser1for a user with the accountuser1@example.com)
  8. The Okta application configuration and user assignment is now complete.

Update the HP Anyware Connector

All existing HP Anyware Connectors in the HP Anyware deployment need to be updated to make use of the Okta RADIUS server. Refer to the HP Anyware Connector documentation for details:https://www.teradici.com/web-help/cas_manager/cloud_access_connector/cac_update/

  1. SSH into the Anyware Connector.
  2. Locate the anyware-connector binary (e.g. /root).
  3. Run the anyware-connector configure command using sudo. The command will prompt for the RADIUS server’s IP and shared secret. Enter the internal IP address of the Windows VM running the Okta RADIUS agent and the previously entered RADIUS shared secret, respectively.
    sudo ./anyware-connector configure --enable-mfa
  4. The update should indicateConnector update complete.

User Registers MFA

Each user must register their MFA device, in this case Google Authenticator, before they can start a PCoIP session.

  1. As the end-user, visithttps://<your-domain>.okta.com.
  2. Enter the AD username and credentials. ClickCreate my account.
  3. Click on the username on the top right of the Okta Dashboard, selectSettings.
    HP Anyware-Okta MFA Integration in GCP (63)
  4. Scroll down toExtra Verificationand clickSetup.
    HP Anyware-Okta MFA Integration in GCP (64)
  5. Follow the instructions to set up Google Authenticator.

Once this step is completed, the user is now set up for MFA with Google Authenticator and may now log in to HP Anyware Connector using MFA.

HP Anyware-Okta MFA Integration in GCP (2024)
Top Articles
St. John Fisher Announces Athletic Hall of Fame Class of 2024 - St. John Fisher University Athletics
| Resultados da pesquisa | Ciência em Casa
Best Pizza Novato
Nfr Daysheet
Tj Nails Victoria Tx
The Realcaca Girl Leaked
Giovanna Ewbank Nua
Zachary Zulock Linkedin
Progressbook Brunswick
Our Facility
Arboristsite Forum Chainsaw
State HOF Adds 25 More Players
Mani Pedi Walk Ins Near Me
Mflwer
Billionaire Ken Griffin Doesn’t Like His Portrayal In GameStop Movie ‘Dumb Money,’ So He’s Throwing A Tantrum: Report
Wicked Local Plymouth Police Log 2022
Ess.compass Associate Login
Kp Nurse Scholars
Officialmilarosee
Race Karts For Sale Near Me
Nhl Tankathon Mock Draft
Outlet For The Thames Crossword
Viha Email Login
Sussur Bloom locations and uses in Baldur's Gate 3
Military life insurance and survivor benefits | USAGov
Highmark Wholecare Otc Store
Valic Eremit
Bidevv Evansville In Online Liquid
Does Hunter Schafer Have A Dick
Coindraw App
Lindy Kendra Scott Obituary
Gopher Carts Pensacola Beach
The Procurement Acronyms And Abbreviations That You Need To Know Short Forms Used In Procurement
Busch Gardens Wait Times
Guide to Cost-Benefit Analysis of Investment Projects Economic appraisal tool for Cohesion Policy 2014-2020
Urban Blight Crossword Clue
Rocksteady Steakhouse Menu
Gas Prices In Henderson Kentucky
Rocketpult Infinite Fuel
Magicseaweed Capitola
Restored Republic December 9 2022
Craiglist Hollywood
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
062203010
Pokemon Reborn Gyms
Executive Lounge - Alle Informationen zu der Lounge | reisetopia Basics
Frigidaire Fdsh450Laf Installation Manual
Cleveland Save 25% - Lighthouse Immersive Studios | Buy Tickets
Food and Water Safety During Power Outages and Floods
Psalm 46 New International Version
211475039
Bellin Employee Portal
Latest Posts
Article information

Author: Duncan Muller

Last Updated:

Views: 6234

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.