Vous êtes sur la page 1sur 82

Defender 5.

6
Software Token User Guide

2010 Quest Software, Inc. ALL RIGHTS RESERVED.


This guide contains proprietary information protected by copyright. The software described
in this guide is furnished under a software license or nondisclosure agreement. This
software may be used or copied only in accordance with the terms of the applicable
agreement. No part of this guide may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying and recording for any purpose
other than the purchaser's personal use without the written permission of Quest Software,
Inc.
If you have any questions regarding your potential use of this material, contact:
Quest Software World Headquarters
LEGAL Dept
5 Polaris Way
Aliso Viejo, CA 92656 USA
www.quest.com
email: legal@quest.com
Refer to our Web site for regional and international office information.

TRADEMARKS
Quest, Quest Software, the Quest Software logo and iToken are trademarks and registered
trademarks of Quest Software, Inc. in the United States of America and other countries.
Gridsure and the Gridsure logos are trademarks and registered trademarks of Gridlock TS
Limited. All other trademarks and registered trademarks are property of their respective
owners.

Disclaimer
The information in this document is provided in connection with Quest products. No
license, express or implied, by estoppel or otherwise, to any intellectual property right is
granted by this document or in connection with the sale of Quest products. EXCEPT AS SET
FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT
FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY
EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE
FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL
DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS,
BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR
INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with
respect to the accuracy or completeness of the contents of this document and reserves the
right to make changes to specifications and product descriptions at any time without
notice. Quest does not make any commitment to update the information contained in this
document.

Defender Software Token User Guide


Updated - November 2010
Software Version - 5.6

Contents
ABOUT THIS GUIDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
QUEST ONE IDENTITY SOLUTION . . . . . . . . . . . . . . . . . . . . . . 6
ABOUT THIS GUIDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
AUDIENCE AND SCOPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
CONVENTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
ABOUT QUEST SOFTWARE . . . . . . . . . . . . . . . . . . . . . . . . . . 8
CONTACTING QUEST SOFTWARE . . . . . . . . . . . . . . . . . . . . . . 9
CONTACTING CUSTOMER SUPPORT . . . . . . . . . . . . . . . . . . 9
CHAPTER 1 DEFENDER TOKEN BASICS . . . . . . . . . . . . . . . . . . . .11
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
DEFENDER NETWORK PROTECTION . . . . . . . . . . . . . . . . . . . . .13
WHAT IS A TOKEN? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
SOFTWARE TOKENS . . . . . . . . . . . . . . . . . . . . . . . . . . .13
HOW A TOKEN WORKS. . . . . . . . . . . . . . . . . . . . . . . . . . . .15
CHAPTER 2 DEFENDER DESKTOP TOKEN . . . . . . . . . . . . . . . . . . .17
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
SYSTEM HARDWARE AND SOFTWARE REQUIREMENTS . . . . . . . . . .20
FOR A MOBILE DEVICE . . . . . . . . . . . . . . . . . . . . . . . . .20
WHAT YOU NEED FROM THE SECURITY ADMINISTRATOR . . . . .20
INSTALLING THE DEFENDER DESKTOP TOKEN SOFTWARE ON A PC .21
ACTIVATING YOUR DEFENDER DESKTOP TOKEN . . . . . . . . . . . . .24
AUTHENTICATING WITH A DEFENDER DESKTOP TOKEN . . . . . . . . .32
SYNCHRONOUS MODE . . . . . . . . . . . . . . . . . . . . . . . . .32
ASYNCHRONOUS MODE . . . . . . . . . . . . . . . . . . . . . . . .34
SIMPLIFYING THE AUTHENTICATION PROCESS . . . . . . . . . . .37
TOKEN MANAGEMENT OPTIONS . . . . . . . . . . . . . . . . . . . . . . .38
CHANGING THE PASSPHRASE . . . . . . . . . . . . . . . . . . . . .39

iii

Defender Software Token User Guide

INSTALLING THE DEFENDER DESKTOP TOKEN ON A BLACKBERRY . .43


DISTRIBUTING THE QUEST SOFT TOKEN FOR
BLACKBERRY USING THE JAD FILE . .50
INSTALLING ON THE BLACKBERRY DEVICE . . . . . . . . . . . . .52
ACTIVATING THE DEFENDER TOKEN . . . . . . . . . . . . . . . . .56
USING THE TOKEN . . . . . . . . . . . . . . . . . . . . . . . . . . .56
DELETING A TOKEN . . . . . . . . . . . . . . . . . . . . . . . . . . .56
INSTALLING THE PALM TOKEN SOFTWARE . . . . . . . . . . . . . . . .57
ACTIVATING THE DEFENDER TOKEN . . . . . . . . . . . . . . . . .57
INSTALLING THE WINDOWS MOBILE/IPAQ TOKEN SOFTWARE . . . . .58
ACTIVATING THE DEFENDER TOKEN . . . . . . . . . . . . . . . . .61
USING THE TOKEN . . . . . . . . . . . . . . . . . . . . . . . . . . .61
DELETING THE TOKEN . . . . . . . . . . . . . . . . . . . . . . . . .62
AUTHENTICATING WITH A DEFENDER TOKEN ON A
MOBILE DEVICE . . .63
ASYNCHRONOUS MODE . . . . . . . . . . . . . . . . . . . . . . . .63
SYNCHRONOUS MODE . . . . . . . . . . . . . . . . . . . . . . . . .64
QUEST ITOKEN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
WHAT IS THE QUEST ITOKEN . . . . . . . . . . . . . . . . . .65
INSTALLING THE QUEST ITOKEN SOFTWARE . . . . . . . . .66
ACTIVATING THE QUEST ITOKEN . . . . . . . . . . . . . . . .74
AUTHENTICATING WITH THE QUEST ITOKEN . . . . . . . . .78
AUTHENTICATION PROCEDURE . . . . . . . . . . . . . . . . . . . .79
REPLACING AN EXISTING ITOKEN . . . . . . . . . . . . . . . . . .81
CHAPTER 3 DEFENDER SMS TOKEN . . . . . . . . . . . . . . . . . . . . . .83
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
SYSTEM HARDWARE AND SOFTWARE REQUIREMENTS . . . . . . . . . .84
AUTHENTICATING WITH A DEFENDER SMS TOKEN . . . . . . . . . . .85

iv

About this Guide


Quest One Identity Solution
RADIUS Authentication
Communications Protocol
Defender Tokens
Audience and Scope
Conventions
About Quest Software
Contacting Quest Software

Defender Software Token User Guide

Quest One Identity Solution

Defender is a component of the Quest One Identity Solution, a set of enabling


technologies, products, and integration that empowers organizations to simplify
identity and access management by:

Reducing the number of identities

Automating identity administration

Ensuring the security of identities

Leveraging existing investments, including Microsoft Active Directory

Quest One improves efficiency, enhances security and helps organizations


achieve and maintain compliance by addressing identity and access
management challenges as they relate to:

Single sign-on

Directory consolidation

Provisioning

Password management

Strong authentication

Privileged account management

Auditandcompliance.

About

About this Guide


This manual contains the information that users need to authenticate to a
Defender-protected network using one of the following tokens:

Quest iToken

Defender Desktop Token

Defender Mobile.

Audience and Scope


This book is intended for administrators and users who want to use Defender
tokens for authentication.
This book does not provide tutorial information on the use of the Windows
operating system or on network communication concepts. Users must have
experience in using the specified operating system and an understanding of
networking concepts

Conventions
In order to help you get the most out of this guide, we have used specific
formatting conventions. These conventions apply to procedures, icons,
keystrokes, and cross-references.
ELEMENT

CONVENTION

Select

This word refers to actions such as choosing or


highlighting various interface elements, such as files
and radio buttons.

Bolded text

Used to highlight installation questions and


responses.

courier text

File, daemon, utility, option, attribute names.

Italic text

Used for comments.

Bold Italic text

Used for emphasis.

Blue text

Indicates a cross-reference. When viewed in Adobe


Acrobat, this format can be used as a hyperlink.

Defender Software Token User Guide

ELEMENT

CONVENTION
Used to highlight additional information pertinent to
the process being described.
Used to provide Best Practice information. A best
practice details the recommended course of action for
the best result.
Used to highlight processes that should be performed
with care.

A plus sign between two keystrokes means that you


must press them at the same time.

A pipe symbol (vertical bar) between elements means


that you must select the elements in that particular
sequence.

The back slash, immediately followed by a new line,


indicates a Unix command line continuation.

<version>.<build number>

References to the product version you are installing


are displayed with <version>.<build number> in
angle brackets.

About Quest Software


Quest Software, Inc., a two-time winner of Microsofts Global Independent
Software Vendor Partner of the Year award, delivers innovative products that
help organizations get more performance and productivity from their
applications, databases Windows infrastructure and virtual environments.
Through a deep expertise in IT operations and a continued focus on what works
best, Quest helps more than 100,000 customers worldwide meet higher
expectations for enterprise IT. Quests Windows management solutions simplify,
automate secure and extend Active Directory, Exchange Server, SharePoint,
SQL Server, .NET and Windows Server as well as integrating Unix, Linux and
Java into the managed environment. Quest Software can be found in offices
around the globe and at www.quest.com.

About

Contacting Quest Software


Phone

949.754.8000 (United States and Canada)

Email

info@quest.com

Mail

Quest Software World Headquarters


5 Polaris Way
Aliso Viejo, CA 92656

Web site

www.quest.com

Please refer to our Web site for regional and international office information.

Contacting Customer Support


Quest Software's world-class support team is dedicated to ensuring successful
product installation and use for all Quest Software solutions.
SupportLink

www.quest.com/support

Email at

support@quest.com

You can use SupportLink to do the following:

Create, update, or view support requests

Search the knowledge base

Access FAQs

Download patches

1
Defender Token Basics
Introduction
Defender Network Protection
What is a Token?
Software Tokens
How a Token Works

11

Defender Software Token User Guide

Introduction
If you are a remote user who must access a Defender-protected network, you
need a Defender token to access your network. This token is configured for you
by your security administrator. This chapter provides a description of what
tokens are and how they work.
This chapter contains the following information:

Defender network protection

What is a token?

How does a token work?

After reading this overview, see the following chapters for information on how to
use the different token types:

12

Chapter 2, Defender Desktop Token

Blackberry

Palm

Windows Mobile/iPaq device

Quest iToken installed on an Apple iPhone or iPad

Chapter 3, SMS Token

GrIDsure - refer to the guide entitled Defender - Configuring for Use


with GrIDsure Tokens

Quest Soft Token for Android - refer to the Quest Soft Token for
Android Administration and User Guide.

Introduction

Defender Network Protection


A Defender Security Server resides on your network and authenticates
remote users who connect to the network, thereby ensuring that the network is
accessed only by authorized users.
Remote users require an authorized token and, optionally, an appropriate
personal identification number (PIN) before they can access the network.

What is a Token?
A token implemented in software or hardware helps remote users gain access to
computer resources on a Defender-protected network. The process of gaining
access to a secure network through the use of passwords, challenge/response
methods, and synchronous methods is called authentication.
The Defender solution supports a variety of token options. All provide strong
two-factor authentication.
Before a token can be used, its security record is created in the Defender
Administration Console by the supervisor and then stored in Active Directory.
Some tokens must be initialized by the supervisor, while others can be initialized
remotely by the user.

Software Tokens
This guide describes the software tokens available for use with Defender 5.

Defender Desktop Token


The Defender Desktop Token is a software token that is created and activated in
Defender 5. For convenience, the Defender Desktop Token can be stored locally
on your machine, on a removable disk for extra security and portabililty, or on
a Blackberry, Palm, Windows Mobile/iPaq device, iPhone or Android. The
Defender Desktop Token allows authentication via asynchronous
(challenge/response) and/or synchronous (internal challenge) authentication.

13

Defender Software Token User Guide

Defender SMS Token


Defender SMS is a token that uses your cell phones to provide secure, two-factor
authentication. The Defender SMS Token allows authentication via an
automatically generated one-time password that is sent to the specified mobile
number.

Migrating Defender Software Tokens


The tokens listed below can be migrated from Defender 4 and used for
authentication in Defender 5. The tokens must be created and activated in the
earlier version of Defender, before they are migrated to Defender 5. These
tokens cannot be created in Defender 5.

Defender Electronically Distributed Software Token authentication software installed on the users computer which allows
the remote user to access a Defender-protected network and
authenticate to the Defender Security Server.

Defender Software Token - this token is initialized with the users


security record by the supervisor prior to distribution.

Self-Registering Defender Software Token - authentication


software installed on the users computer which allows the remote
user to access a Defender-protected network and authenticate to the
Defender Security Server.

The Defender Client Software enables the use of the Defender Software Token,
Defender Electronically Distributed Software Token and Self-Registering
Defender Software Token. It is provided as a self-extracting file which the token
administrator makes accessible to users prior to the distribution of the user
unique token information.
The Defender Electronically Distributed Software Token, Defender Software
Token and the Self-Registering Defender Software Token allow users to
authenticate to the Defender Security Server via an automatic
challenge/response dialog that initiates when the user enters a PIN on his
workstation. If authentication is successful, the Defender Security Server allows
the user to access the corporate network.
For further advice and assistance with token migration, please contact Customer
Support.

14

Introduction

How a Token Works


Your security supervisor determines your organizations security requirements
and programs your Defender token based on those security requirements. When
a token is programmed, information is saved to the token so that when the
Defender Security Server challenges you, the token generates the response or
one-time password expected by the Defender Security Server. If the PIN used
to unlock the token is incorrect, the generated response or password will not be
correct.

15

2
Defender Desktop Token
Introduction
System Hardware and Software
Requirements
Installing the Defender Desktop Token
Software on a PC
Activating your Defender Desktop Token
Authenticating with a Defender Desktop
Token
Token Management Options
Installing the Defender Desktop Token on a
BlackBerry
Installing the Palm Token Software
Installing the Windows Mobile/iPaq Token
Software
Authenticating with a Defender Token on a
Mobile Device
Installing the Quest iToken software
Activating the Quest iToken
Authenticating with the Quest iToken

17

Defender Software Token User Guide

Introduction
The Defender Desktop Token is software that you install on your Windows PC or
mobile device.
The Defender Desktop Token is supported on:

Windows Desktop

BlackBerry

Windows Mobile/iPaq

Palm

Quest iToken installed on the Apple iPhone or iPad.

When you attempt to access a Defender-protected network from a remote


location, the Defender network security system intercepts the call. The token is
used to communicate with the security system on the protected network. If your
credentials are accepted by the Defender security system, and if the
challenge/response dialog between the token and the Defender device is valid,
you are allowed to access the network. The Defender Desktop Token is
distributed to you by your Defender administrator.

18

Defender Desktop Token

This guide describes:

hardware and software requirements for the Defender Desktop Token

installing the Defender Desktop Token software on a PC or mobile


device

activating the Defender Desktop Token

authenticating using a Defender Desktop Token

token management options.

To use a Defender Desktop Token you must:

install the Defender Desktop Token software provided to you by your


Defender administrator

activate the Defender Desktop Token.

19

Defender Software Token User Guide

System Hardware and Software


Requirements
The Defender Desktop Token is designed to operate in the environment listed
below:
Table 1: Defender Desktop Token Hardware and Software Requirements

REQUIREMENT

DESCRIPTION

Memory

32 Mb RAM (minimum)

Hard Drive

2 Mb of free hard drive space

Operating System

Windows XP, Windows Vista, Windows 2003 Server, Windows


7, Windows 2008 Server, Windows 2008 R2 Server

For a Mobile Device


The Defender Desktop Token is designed to operate on mobile devices using
ARM processors running the Windows CE operating system.
The .NET Compact Framework software must be installed on the mobile device.
.NET Compact Framework software is available as a re-distributable item if it is
not already installed on the mobile device where the Defender Desktop Token
will be located. Contact your administrator for assistance.

What You Need from the Security


Administrator
Before installing the Defender Desktop Token software and activating your
Defender Desktop Token, you need the following information from your
Defender administrator:

20

location of the Defender Desktop Token software

location and name of the file that contains the activation key for your
Defender Desktop Token.

Defender Desktop Token

Installing the Defender Desktop


Token Software on a PC
Your system administrator will provide you with the Defender Desktop Token
software required to for your Token. This file may be made available to you
through a network share, a web site, or a CD.
To install the Defender Desktop Token software, perform the following steps:
1.

Locate and run the Defender Desktop Token Installer.exe file. The
Defender Desktop Token Installation Wizard starts:

Figure 1: Defender Desktop Token Installation Wizard

2.

Click Next. The Defender Desktop Token Installation Wizard (License


Agreement) page is displayed. Check the box to accept the License
agreement, then click Next. The Defender Desktop Token Installation
Wizard (Install Location) page is displayed:

21

Defender Software Token User Guide

Figure 2: Defender Desktop Token Installation Wizard (Install Location) dialog box

3.

Click Finish to accept the default location. Alternatively, click Browse to


choose a different location, then click Finish. The Installation Progress
dialog box is displayed:

Figure 3: Defender Desktop Token Installation Wizard (Installation Progress) dialog


box

22

Defender Desktop Token

4.

The Installation Complete dialog box is then displayed:

Figure 4: Defender Desktop Token Installation Wizard (Installation Complete) dialog box

5.

Click Finish.
On completion of the installation a Defender Desktop Token program
group is created.

23

Defender Software Token User Guide

Activating your Defender Desktop


Token
Before you can use your Defender Desktop Token for authentication, you must
activate it as described in the following steps:
1.

From the Start menu, select Programs, Defender Desktop Token. The
Token Activation Wizard (Welcome) dialog box is displayed:

Figure 5: Token Activation Wizard (Welcome) dialog box

2.

24

Click Next. The Enter Activation Code dialog box is displayed:

Defender Desktop Token

Figure 6: Token Activation Wizard (Enter Activation Code) dialog box

When the Defender Administrator generates a Defender Desktop Token for


a user, the username.txt file is automatically created. This file can
optionally contain the token details for a single user or token details for
multiple users. For further information, refer to the Defender Token
Administration Guide.
3.

Click Browse to select the required username.txt file. The activation key is
automatically copied from the username.txt file and pasted into the Code
field.

25

Defender Software Token User Guide

Alternatively, you can copy the activation code from the username.txt file
and paste it into the Code field.

4.

Click Next. The Token Activation Wizard - Select Storage dialog box is
displayed:

Figure 7: Token Activation Wizard (Select Storage) dialog box

5.

26

To store the activated Defender Desktop Token:

in your application data folder, click the Your application data


folder button

in a different folder, click the Another Folder radio button, then click
Browse to navigate to the required location

Defender Desktop Token

6.

on an attached device, such as an Aladdin USB token, click the


Attached Device button, then select the required device from the
list.

If you have more than one active Defender Desktop Token and want this
token to be selected for authentication by default, check the Make this
token the default token checkbox.
If you have more than one active Defender Desktop Token and do not want
to authenticate using the default token, you can specify an alternative
token during logon.

7.

Click Next. The Token Activation Wizard - Select Passphrase dialog


box is displayed:

Figure 8: Token Activation Wizard (Select Passphrase) dialog box

8.

In the New Passphrase field, type the passphrase that you will enter to
unlock the Desktop Token before authentication.

27

Defender Software Token User Guide

9.

In the Confirm Passphrase field, type the passphrase again to confirm


your choice.

Figure 9: Token Activation Wizard (Strong Passphrase) dialog box

28

Defender Desktop Token

As you type your passphrase, the strength box indicates the strength of the
passphrase by showing a red (weak) or green (strong) indicator. Quest
recommends the use of a strong passphrase.
A strong passphrase should contain a combination of uppercase and
lowercase letters, numbers and punctuation marks, and be at least eight
characters long.
If you choose a weak passphrase, the following message is displayed:

To use the passphrase you entered in the Token Activation Wizard Select Passphrase dialog box, click Yes.
To return to the Token Activation Wizard - Select Passphrase dialog
box and enter a different passphrase, click No.

Your Administrator can enforce the use of a strong password.


10. The Token Activation Wizard (Enter Token Name) dialog box is
displayed:

Figure 10: Token Activation Wizard (Enter Token Name) dialog box

29

Defender Software Token User Guide

11. In the Token Name field, type a name that will help you identify this
token. If you choose not to give the token a name, the token serial number
will be used as the token name.
12. Click Next. The Token Activation Wizard (Defender Desktop Token
Activation Complete) dialog box is displayed:

Figure 11: Token Activation Wizard (Defender Desktop Token Activation Complete)
dialog box

On completion of the activation procedure, the token can be managed from the
Start menu, Defender Desktop Token program group, shown below:

Figure 12: Defender Desktop Tokens (Token Management) dialog box

30

Defender Desktop Token

If you specified a default token during the activation procedure, the Enter
Passphrase dialog for the default token will be displayed when you select the
Defender Desktop Token program group from the Start menu. To display the
token management options, or select an alternative token for authentication,
click Tokens.
For authentication information, refer to Authenticating with a Defender Desktop
Token.

31

Defender Software Token User Guide

Authenticating with a Defender


Desktop Token
This section describes how to authenticate to a Defender protected network
using the Defender Desktop Token.

Synchronous Mode
If you are authenticating to a network that uses a response only method:
1.

Connect to your network using your usual communications software.


When the connection is made, a Defender Security Server intercepts the
call.

2.

When prompted by the Defender Security Server, enter your user ID in your
communications software.
From the Start menu, select Programs, Defender Desktop Token,
Defender Desktop Token.
If you have more than one Defender Desktop Token installed and have
specified one token as your default token, the Enter Passphrase dialog
box is displayed:

Figure 13: Enter Passphrase dialog box

32

Defender Desktop Token

If you do not want to use your default token for authentication, click
Tokens. The Defender Desktop Tokens dialog box is displayed:

Figure 14: Defender Desktop Tokens dialog box

Double-click the required token. The Enter Passphrase dialog box is


displayed:

Figure 15: Enter Passphrase dialog box

3.

In the Passphrase field, type your passphrase.

4.

Click OK. The Defender Desktop Token Response dialog box is


displayed:

Figure 16: Defender Desktop Token Response dialog box

33

Defender Software Token User Guide

5.

Click Get Response. The token response is displayed in the Response


field.
To automatically copy the token response to the clipboard and leave the
Defender Desktop Token Response window open, check the
Automatically copy response to the clipboard checkbox.
To automatically close the Defender Desktop Token Response window
after the response has been copied to the clipboard, check the
Automatically close this window checkbox.
If you chose not to automatically copy the token response to the clipboard,
click Copy to copy the response to the clipboard.
Click Cancel to close the Defender Desktop Token Response window.

6.

Paste the Defender Desktop Token response into your communications


software.
Place the cursor in the communication software window and press
Control-V to paste the response into the communication software window.

7.

Press Enter on your computer keyboard.

8.

Defender verifies the response.


If the response the Defender Security Server receives matches the one it
expects, you are connected and granted access to the protected network.

Asynchronous Mode
If you are authenticating to a network that uses a challenge/response method:
1.

Connect to your network using your usual communications software.


When the connection is made, a Defender Security Server intercepts the
call.

2.

34

When prompted by the Defender Security Server, enter your user ID in your
communications software.The Defender Security Server displays a
challenge value in your communications software.

Defender Desktop Token

3.

From the Start menu, select Programs, Defender Desktop Token,


Defender Desktop Token. If you:

have more than one Defender Desktop Token assigned to you, the
Defender Desktop Tokens dialog box is displayed.

Figure 17: Defender Desktop Tokens dialog box

Select the required token. Go to Step 4.

specified a default token during the activation procedure, the Enter


Passphrase dialog for the default token will be displayed when you
select the Defender Desktop Token program group from the Start
menu. To display the token management options, or select an
alternative token for authentication, click Tokens.
Select the required token. Go to Step 4.

4.

The Enter Passphrase dialog box is displayed:

Figure 18: Enter Passphrase dialog box

5.

In the Passphrase field, type your passphrase.

35

Defender Software Token User Guide

6.

Click OK. The Defender Desktop Token Response page is displayed:

Figure 19: Defender Desktop Token Response page

7.

In the Challenge field, type the challenge displayed by the Defender


Security Server.

8.

To automatically copy the token response to the clipboard and close the
Defender Desktop Token Response window, check the box, then click
Get Response.
If you chose not to automatically copy the token response to the clipboard,
click Get Response, then use the copy function to copy the response to
the clipboard. Click Cancel to close the Defender Desktop Token
Response window.

9.

Place the cursor in the communication software window and press


Control-V to paste the response into the window.

10. Press Enter on your computer keyboard.


11. Defender verifies the response.
If the response the Defender Security Server receives matches the one it
expects, you are connected and granted access to the protected network.

36

Defender Desktop Token

Simplifying the Authentication Process


The authentication process can be greatly simplified and performed
automatically if the Defender VPN Integrator component is installed.
The VPN Integrator is installed and configured on the end-users desktop, along
with the Desktop Token software. When a Defender protected VPN connection is
initiated, VPN Integrator communicates between the Defender Desktop Token
software and the third-party VPN client, to ensure that the secure, one-time
password authentication process is handled automatically. The entire operation
is seamless and very fast.
For installation and configuration details for the VPN Integrator, please refer to
the Defender VPN Integrator Installation and Configuration Guide.

37

Defender Software Token User Guide

Token Management Options


The following token management options are available from the Token
Management Console page
MENU OPTION

DESCRIPTION

File
click to display a list of folders that will be searched to
locate Defender Desktop Tokens.
Edit Folders

To remove a folder from the list, click the required folder,


then click Remove.
To add a new folder to the list, click Add then type the
location of the folder to be included in the token search.

Select and Close

select the token and enter the passphrase when prompted.


On completion the Defender Desktop Token program is
closed.

Close

click to close the Select Token page.

Token
Activate New Token

select Activate New Token to start the Desktop Token


Activation Wizard. For further information, refer to
Activating your Defender Desktop Token.

Default

click the required Defender Desktop Token then select


Default to set the token as your default token.

Rename

click the required Defender Desktop Token then select


Rename to change the name of the token.
select the required Defender Desktop Token, then select
Delete to remove the token.

Delete

Note: If you use this option to delete a Defender Desktop


Token, you must also ensure that the corresponding
Defender Desktop Token definition is deleted in Active
Directory. Contact your Defender administrator for
assistance.
select the required Defender Desktop Token, then select
Move to move the token to a different location.

Move

38

Note: If you use this option to move a token to a different


folder, the folder is automatically included in the list of
folders for searching.

Defender Desktop Token

MENU OPTION

DESCRIPTION

Change passphrase

select the required Defender Desktop Token, then select


Change passphrase to change the current passphrase.

Reset passphrase

select the required Defender Desktop Token, then select


Reset passphrase to reset a locked passphrase.

Properties

select the required Defender Desktop Token then select


Properties to display the token information page.

View
Icons
Details

click to display tokens as icons.


click to display tokens as details.

Options
Prompt for username
to unlock token

select the required Defender Desktop Token, then select


Options, Prompt for username to unlock token to
display the username at the passphrase prompt. The
passphrase is also required.

Centre Window at
Startup

select this option to ensure that the login dialog is always


positioned centrally on the users display.

Help
About Defender
Desktop Token

click Help, About to display version information for the


Defender Desktop Token program.

Changing the Passphrase


To change the passphrase for a Defender Desktop Token:
1.

From the Start menu, select Programs, Defender Desktop Token,


Defender Desktop Token. The Enter Passphrase page is displayed.

2.

Click Tokens to select the required token.

3.

On the menu bar, click Token, Change Passphrase. The Change


Passphrase Wizard starts.

4.

Click Next. You are prompted to enter your current passphrase for this
token. Enter the passphrase.

5.

Click Next. Enter your new passphrase for this token.

6.

Confirm the new passphrase.

7.

Click Next. The Change Passphrase Wizard confirms that the


passphrase was changed successfully.
39

Defender Software Token User Guide

If you forget your Passphrase


If you forget your passphrase or your token is locked because you have
exceeded the permitted number of incorrect passphrase attempts, the following
message is displayed:
Your passphrase is locked. You must reset your passphrase.
To begin the unlock procedure, which requires a dialog with the Defender
Administrator:
1.

Select Start, Programs, Defender Desktop Token, Defender Desktop


Token.

Figure 20: Defender Desktop Token - Enter Passphrase

2.

Click Tokens. The Defender Desktop Tokens dialog is displayed:

Figure 21: Defender Desktop Token - Reset Passphrase

40

Defender Desktop Token

3.

Right-click the token that you want to reset, then select Reset
Passphrase from the list. The Defender Desktop Token Wizard starts:

Figure 22: Defender Desktop Token Wizard

4.

Click Next.

Figure 23: Defender Desktop Token - Reset Passphrase

5.

Tell your Administrator the number displayed in the Challenge field. Your
Administrator will then reply with an unlock code.

6.

Enter the unlock code into the Unlock Code field.

7.

In the New Passphrase field, type your new passphrase.


41

Defender Software Token User Guide

8.

In the Confirm Passphrase field, type your new passphrase again to


confirm.

9.

Click Next. The Defender Desktop Token Passphrase Reset Complete


dialog is displayed:

Figure 24: Defender Desktop Token Passphrase Reset Complete

42

Defender Desktop Token

Installing the Defender Desktop


Token on a BlackBerry
Before you can activate and use the Defender Desktop Token on your
BlackBerry, you must install the BlackBerry Token Software. The following steps
describe how to install the BlackBerry Token Software using the BlackBerry
Desktop Manager.

in Defender 5.6 the BlackBerry Token Software can be downloaded from the
BlackBerry App World. The software can also be installed on the BlackBerry
device using the BlackBerry Enterprise Server.
1.

Determine which operating system is running on your Blackberry. This can


be found on the About dialog, from within Options.

2.

Download the latest version of the BlackBerry Token Software from the
Defender product pages of the Quest SupportLink site and save to either a
local or shared network drive.

The BlackBerry Token Software is available for different versions of the


operating system. Please ensure that you select the correct version for your
BlackBerry.

43

Defender Software Token User Guide

3.

Open the BlackBerry Desktop Manager:

Figure 25: Blackberry Desktop Manager

44

Defender Desktop Token

4.

Click Applications to load the token software onto your BlackBerry:

Figure 26: Blackberry Application Loader

45

Defender Software Token User Guide

5.

From the Applications dialog, choose Import files:

Figure 27: Blackberry Application Loader - Device application selection

6.

Browse to the location of your BlackBerry Token Software and select


DefenderBlackBerryToken4.alx.

7.

Click Open.

46

Defender Desktop Token

Figure 28: Blackberry Application Loader - BlackBerry Token selection

8.

Click Apply.

47

Defender Software Token User Guide

Figure 29: Blackberry Application Loader - Application Update

9.

48

The software installation starts.

Defender Desktop Token

Figure 30: Blackberry Application Loader - Applications

10. The Defender Token application is now installed and available from the
Downloads folder on your BlackBerry.

49

Defender Software Token User Guide

Distributing the Quest Soft Token for


BlackBerry using the JAD file
Defender versions 5.6 and later support the use of a JAD file for the distribution
of the Quest Soft Token for Blackberry. The JAD file,
DefenderBlackBerryToken4.jad, is included on the installation CD in the
Tokens\BlackBerry Token folder. Both the JAD and COD files are required for
web based deployment.
The following sections describe how to configure IIS 6 and IIS7 to deploy the
BlackBerry JAD file, and provide an example web page.

IIS 6
1.

Open IIS Manager and right-click the required web site.

2.

Select Properties.

3.

Select HTTP Headers.

4.

Select MIME Types.

50

Defender Desktop Token

1.

Add the following two new MIME types:

Extension
jad
cod

MIME Type
text/vnd.sun.j2me.app-descriptor
application/vnd.rim.cod

2.

Copy the DefenderBlackBerryToken4.jad and


DefenderBlackBerryToken4.cod files to your web site. The files should
be located in the same folder.

3.

Create or modify an existing web page to link to the


DefenderBlackBerryToken4.jad file. A simple example is provided
below:

<html>
<head><title>Quest Soft Token for Blackberry Download</title></head>
<body>
<a href="DefenderBlackBerryToken4.jad">Download
Software</a>
</body>
</html>
4.

Restart the web site for the changes to take effect.

IIS 7
1.

Open IIS Manager and select the required web site.

2.

Select MIME Types and Open Feature.

3.

Select Add and add the following two MIME types:

Extension
jad
cod

MIME Type
text/vnd.sun.j2me.app-descriptor
application/vnd.rim.cod

4.

Copy the DefenderBlackBerryToken4.jad and


DefenderBlackBerryToken4.cod files to your web site. The files should
be located in the same folder.

5.

Create or modify an existing web page to link to the


DefenderBlackBerryToken4.jad file. (See the above example).

6.

Restart the web site for the changes to take effect.

51

Defender Software Token User Guide

Installing on the BlackBerry Device


1.

Use a browser to access the web page that contains the link to the
DefenderBlackBerryToken4.jad file.

2.

Click the Download Software link.

3.

The token details are displayed:

4.

Select the Download button.

52

Defender Desktop Token

5.

A message tells you that the application was installed successfully.

6.

Click OK.

53

Defender Software Token User Guide

7.

The Quest Soft Token for BlackBerry is now installed.

8.

When you select the token software for the first time, an Applications
Permissions prompt may be displayed. Click Yes to continue.

54

Defender Desktop Token

9.

The token must be activated with an activation code before it can be used
for authentication. Please refer to Activating the Defender Token on
page 56.

55

Defender Software Token User Guide

Activating the Defender Token


1.

On your BlackBerry, select Applications, then Defender Token.


You are prompted to enter the Defender Token activation key.
The activation key is supplied to you separately by your Defender
administrator.

2.

At the prompt, type the key or use copy and paste.

3.

Click OK to activate the token.


A message tells you that the token was activated successfully.

Using the Token


To use the Defender Token on your BlackBerry:
1.

From Applications on your BlackBerry, select the Defender Token application.

2.

A token response is displayed.

3.

Enter this response into the login page on your PC.

Deleting a Token
To de-activate a Defender Token on your BlackBerry:
1.

From Applications on your BlackBerry, select the Defender Token application.

2.

Press Menu to display the Defender menu.

3.

Select Delete Token from the menu.

56

Defender Desktop Token

Installing the Palm Token Software


Before you can activate the Defender Token on your Palm, you must install the
Palm Token Software on a workstation as described in the following steps:
1.

Download the latest version of the Palm Token Software from the Defender
product pages of the Quest SupportLink site.

2.

Run the DefenderPalmToken_Installer.exe.

3.

Select your username and click OK.

4.

Connect your Palm device to your PC and press the HotSync button. The
token software is transferred to your Palm device.

The Palm HotSync Manager is required to install the token software on your
Palm device.

Activating the Defender Token


1.

On your Palm, select the Defender Token. You are prompted to enter the
Defender Token activation key. The activation key is supplied separately.

2.

At the prompt, type the key.

3.

Click OK to activate the token.


A message tells you that the token was activated successfully.

57

Defender Software Token User Guide

Installing the Windows Mobile/iPaq


Token Software
Before you can activate the Defender Token on your Windows Mobile/iPaq
device, you must install the Windows Mobile/iPaq Software. Download the latest
version of the Windows Mobile Token Software from the Defender product pages
on the Quest SupportLink site, then perform the following steps:
1.

Connect your Windows Mobile/iPaq device to your PC and place it in the cradle with Microsoft ActivSync running. On your PC, the ActivSync dialog box
displays Connected.

2.

From your PC, run either setup.exe, or Defender Windows Mobile


Token Setup.msi, and follow the prompts.

Figure 31: Defender Windows Mobile Token Wizard

3.

58

Click Next. The Defender Windows Mobile Token (Select Installation


Folder) page is displayed:

Defender Desktop Token

Figure 32: Defender Windows Mobile Token (Select Installation Folder) page

4.

Click Next to accept the default location. Alternatively, click Browse to


choose a different location.

5.

If you want the token software for your use only, click the Just me button.
If you want the token to be available to anyone who uses this computer,
click the Everyone button.

59

Defender Software Token User Guide

6.

Click Next. The Defender Windows Mobile Token (Confirm Installation)


page is displayed:

Figure 33: Defender Windows Mobile Token (Confirm Installation) page

7.

Click Next to start the installation:

Figure 34: Defender Token (Installing Defender Token) page

60

Defender Desktop Token

8.

On completion of the installation, click Next to continue. The Installing


Applications dialog box is displayed. Select Yes to install the Defender
Palm Token software into the default directory on your mobile device.
Alternatively, click No to choose a different directory.
The Application Downloading Complete dialog box is then displayed.

9.

Perform any further steps that may be required by your mobile device to
complete the installation.

Activating the Defender Token


1.

On your device, select Defender Token.

2.

You are prompted to enter an Activation Key.


Locate the Activation Key supplied to you by your Defender Administrator
and enter it into the Activation Key field.

3.

Click OK.

4.

The Defender Token application is now ready to use.

Using the Token


To use the Defender Token on your device:
1.

Select the Defender Token application from the menu on your device.

2.

A token response is displayed.

3.

Enter this response at the authentication prompt.

61

Defender Software Token User Guide

Deleting the Token


To delete the Defender Token from your device and remove the Defender Token
software from your PC:
1.

Connect your device to your PC and place it in the cradle with Microsoft
ActivSync running. On your PC, the ActivSync dialog box displays Connected.

2.

From the Control Panel, select Add/Remove Programs.

3.

Locate Defender Token in the list of applications, then click Remove.

4.

The Microsoft ActivSync dialog box displays a list of applications.

5.

Select Defender Token.

6.

Click Remove.
The Defender Token is removed from your PC and device.

62

Defender Desktop Token

Authenticating with a Defender


Token on a Mobile Device
This section describes how to authenticate to a Defender protected network
using the Defender Desktop Token on a mobile device.

Asynchronous Mode
If you are authenticating to a network that uses a challenge/response method:
1.

Connect to your network using your usual communications software.


When the connection is made, a Defender Security Server intercepts the
call.

2.

When prompted by the Defender Security Server, enter your user ID in your
communications software.
The Defender Security Server displays a challenge value in your
communications software.

3.

On your mobile device, select Start, then Defender Token.

4.

In the Challenge field, type the challenge issued by the Defender Security
Server.

5.

Click Get Response.

6.

A response is displayed in the Response field.

7.

Type the response in the Response field in your communications software.

8.

Press Enter on your computer keyboard.

9.

Defender verifies the response.


If the response the Defender Security Server receives matches the one it
expects, you are connected and granted access to the protected network.

63

Defender Software Token User Guide

Synchronous Mode
If you are authenticating to a network that uses a response only method:
1.

Connect to your network using your usual communications software.


When the connection is made, a Defender Security Server intercepts the
call.

2.

When prompted by the Defender Security Server, enter your user ID in your
communications software.
The Defender Security Server displays a challenge value in your
communications software.

3.

On your mobile device, select Start, then Defender Token.

4.

A response is displayed in the Response field.

5.

Type the response in the Response field in your communications software.

6.

Press Enter on your computer keyboard.

7.

Defender verifies the response.


If the response the Defender Security Server receives matches the one it
expects, you are connected and granted access to the protected network.

64

Defender Desktop Token

Quest iToken
This section describes how to install, activate and use the iToken on the Apple iPhone.

What is the Quest iToken


The Quest iToken is an OATH-compliant two-factor authentication token that
can be used with any OATH-compliant authentication server, such as Quest
Defender, to gain secure access to network, web, and applications-based
resources.

Figure 35: Quest iToken on the iPhone

The picture above shows an example of the Quest iToken displayed on the
iPhone. The token response 555476 is entered as the One Time Password (OTP)
into the authentication login dialog.
65

Defender Software Token User Guide

Installing the Quest iToken software


This section describes how to install the Quest iToken software onto the
iPhone. The iToken can be downloaded and installed in the same way as any
other iPhone application and is available (free of charge) from the iTunes App
store.
1.

From the iPhone menu, select App Store to browse to the iTunes App
Store.

Figure 36: iPhone menu

2.

66

Use the Search facility to search for iToken:

Defender Desktop Token

3.

In the App Store, enter iToken into the search box.

Figure 37: iPhone App Store Search

4.

Select Search.

Figure 38: iPhone App Store Search

67

Defender Software Token User Guide

5.

The iToken information screen is displayed:

Figure 39: iToken Information Screen

6.

Select Free.

Figure 40: iToken Information Screen

7.

68

Select Install.

Defender Desktop Token

8.

The iToken software is selected for loading onto the iPhone.

Figure 41: iPhone - Loading Application

9.

On completion, the iToken icon is available on the iPhone.

Figure 42: iPhone - iToken Application Loaded

69

Defender Software Token User Guide

Alternative Installation Method


The iToken software can be downloaded to your desktop from the App Store. To
do this:
1.

Browse to the iTunes App Store.

2.

Locate the iToken software (search for iToken).

3.

Select Get App.

Figure 43: App Store - Quest iToken Software Installation

4.

70

Follow the prompts provided by the App Store to download the iToken
software.

Defender Desktop Token

Your token will appear in Library, Applications.

Figure 44: App Store - Applications Library

71

Defender Software Token User Guide

5.

Select your iPhone from Devices, then select the Applications tab.

Figure 45: App Store - Devices, Applications

72

Defender Desktop Token

6.

Select Apply.

Figure 46: App Store - Sync Applications

7.

Select Sync to install the iToken software onto your iPhone.

73

Defender Software Token User Guide

Activating the Quest iToken


1.

To activate the iToken, you need to import the activation code provided to
you by the Defender Administrator onto the iPhone. To do this:

Figure 47: iPhone menu

1.

On the iPhone, select the iToken application to display the iToken screen,
as shown in the example below.

Figure 48: iPhone - Quest iToken


74

Defender Desktop Token

2.

Select Activate Token, located in the bottom left-hand corner.

Figure 49: iPhone - Activate Quest iToken

You will now see the following message:


Are you sure you wish to remove the existing token and activate a
new token?
The existing iToken is pre-installed for demonstration purposes only and
cannot be used for authentication.
3.

Select Activate. You are then prompted to enter the activation code
provided by the Defender Administrator.

75

Defender Software Token User Guide

Figure 50: iPhone - Quest iToken Activation Code

4.

76

Type in the code at the Enter Activation Code prompt.

Defender Desktop Token

5.

Press Done. On completion, the Activation successful message is


displayed.

Figure 51: iPhone - Quest iToken Activation Successful

6.

Press OK to continue.

Please ensure that the activation code is entered correctly. If it is not entered
correctly, you will receive incorrect token responses that will not be valid for
authentication to the Defender Server.

77

Defender Software Token User Guide

Authenticating with the Quest iToken


Once the iToken has been activated, the token response is displayed on the
iToken screen.

Figure 52: iPhone - Quest iToken Response

Press the

button to generate the next response.

The 6 digit value is your One Time Password (OTP). You will be prompted to
enter the OTP during the authentication process.

78

Defender Desktop Token

Authentication Procedure
The following example takes you step-by-step through the user authentication
procedure:
1.

The user attempts to access a website protected by Defender and is


prompted to authenticate.

Figure 53: Authentication Login Screen

2.

The user now enters the OTP response displayed on the iToken, e.g
239174, into the Defender Authentication field.

79

Defender Software Token User Guide

If the response is entered correctly, the user is authenticated by Defender and


allowed access to the protected website.

80

Defender Desktop Token

Replacing an Existing iToken


To replace an iToken that you have used previously for authentication, follow the
procedure described in Activating the Quest iToken. However, please note
that the Activate button will now appear on the Information screen, located
in the bottom left-hand corner as shown below:

Figure 54: iPhone - Quest iToken Information Screen

81

3
Defender SMS Token
Introduction
System Hardware and Software
Requirements
Authenticating with a Defender SMS Token

83

Defender Software Token User Guide

Introduction
Defender SMS is a low cost, easy to deploy solution that uses your cell phones
to provide secure, two-factor authentication.
Defender SMS is a token backup solution and a simple way to ensure secure
two-factor authentication when accessing the network from multiple remote
locations. Defender SMS works with all devices capable of receiving SMS, from
Cell phones to PDAs.
Defender SMS:

requires no additional software or hardware

works with any device capable of receiving SMS (Short Message


Service)

sends a one-time password (OTP) directly to a specified cell phone

supports all applications protected by Defender.

System Hardware and Software


Requirements
Defender SMS requires no additional hardware or software. The details of your
mobile provider are defined in Defender by the system administrator.
For information on programming the Defender SMS token, refer to the Defender
Token Administration Guide.

84

Defender Mobile Token

Authenticating with a Defender


SMS Token
This section describes how to authenticate to a Defender protected network
using the Defender SMS Token.
To authenticate using the Defender SMS token:
1.

At the prompt, type your user name.

2.

Enter your Defender Token PIN or keyword if required, as defined by your


System Administrator.
Defender processes your authentication request, generates a one-time
password, and then automatically sends the password to your mobile
number as a SMS.

3.

When prompted, enter your Defender PIN if required, and token response.
If the information you enter is correct, you are authenticated by Defender
and granted access to the systems/information that you are authorized to
access.

85

Vous aimerez peut-être aussi