07-Sep-2017 02:27
Hi team, has anyone tested Microsoft Authenticator with F5 APM for 2FA? Lot of articles are there for google Authenticator, but none for Microsoft Authenticator, pls let me know or point me in right direction if anyone has ever tested it??
07-Sep-2017 02:37
Hi,
Microsoft Authenticator algorithm is the same as Google Authenticator.
You can use existing Google authenticator codes.
07-Sep-2017 04:49
Thank YOu it works same as google 🙂
06-Feb-2018 02:25
Hi Rohit,
I've got google authenticator working but I'm unsure of what I need to change in the code to use mircosoft authenticator.
Any help would be greatly appreciated.
06-Feb-2018 07:32
Like explained above, there is nothing to do!
Both apps generate same time-based password for same key!
06-Feb-2018 08:02
yes just scan the qrcode using any app , google, microsoft, authy all works fine
07-Feb-2018 09:20
thanks, spot on, all working!
10-Jan-2019 00:32
Can I use Microsoft Authenticator (SmartPhone MS-Authenticator-APP) with a kind of Challenge Response. Because I will not ask for the Token within my APM-Logon-Page. User should only do "accept the Authentication with the MS-Authenticator APP".
11-Jan-2019 10:12
I have the same requirement, using AzureMFA (Challenge Response) with APM.
One solution that works is to use MS NPS Server with AzureMFA Plugin. You can authenticate with AD / Kerberos / LDAP to your local domain on APM and then request MFA with username (password can be empty) via Radius to the NPS.
I'm unhappy with that solution cause I can't provide any feedback to the user. As soon as I trigger the Radius Request in APM, the page waits in "Loading" state. A solution with better user experience would be nice.
Any hints appreciated.
14-Jan-2019 00:03
Now I have the Solution with Microsoft NPS implemented and it works with the Microsoft Authenticator APP. It's important to setup the right options in Azure for the users to use the Authenticator APP. You can configure inside the azure-user-accounts how the requests from the OnPremis-NPS (Radius) will be handled. So you can use "enable", "disable" and "restrict". And the user have to configure his own Microsoft Authenticator APP during the initial installation and setup process. The user sccount in active directory (OnPrem) have to setup for remote access and the NPS-options (setting inside the AD-user-account). Your F5-APM-Policy should have a Radius-Auth after the AD-Auth. The Radius-Auth connects the OnPrem-Radius (NPS). And on the NPS your have to configure a Policy for the F5-Access as a radius-client (don't forget to configure a NAS-ID, e.g.) and a Policy for the radius-flow. I use https://docs.microsoft.com/de-de/azure/active-directory/authentication/ for MFA-Setup in Azure.
20-Dec-2021 02:44
Hello
Since NPS is end of life, are there any other alternatives?
20-Dec-2021 06:01
Hello,
You could setup your BIG-IP as an IDP for microsoft Azure. And as an SP for the App. Create the application plus authentication (Azure MFA with SAML, BIG-IP is the IdP for the Azure authentication, Azure will handle the 2nd factor via the app).
Once you have that up and running point your SP to the Azure IdP.
https://docs.microsoft.com/nl-nl/azure/active-directory/manage-apps/f5-big-ip-forms-advanced
Or use Azure AD without the BIG-IP being the IdP.
Cheers,
Kees
20-Dec-2021 06:10
Hello Kees
My client is not a web app, its vmware horizon client (VDI) and I think it doesn't support SAML.any recommendations?
20-Dec-2021 06:28
Hello,
I think the Horizon client does support SAML, have a look at this example. So I think that with the BIG-IPO being both IdP and SP (global context) you should be able to perform SSO and use MS authenticator.
Cheers,
Kees
20-Dec-2021 06:37
wow first time to see that, but shouldn't APM act as SP and Azure as IDP ? does that have to happen within the common partition ?
20-Dec-2021 06:48
Correct. But for SSO you need the username and password on the BIG-IP.
In order to get this you need the BIG-IP also to be setup as an IdP for the Azure IdP.
It can happen in any partition. See K20465715 for the APM route domain limitations.
Cheers,
Kees
20-Dec-2021 07:03
Hello Kees
Do you have any example for BIG-IP setup as an IdP for the Azure IdP?
20-Dec-2021 07:37
I have been searching for examples:
The key is azure ad idp chaining and run azure in federated mode.
https://www.youtube.com/watch?v=6edKekKIdMg
https://clouddocs.f5.com/training/community/access-solutions/solution15/solution.html
https://clouddocs.f5.com/training/community/iam/html/class3/module1/lab06.html
BIG-IP IdP and Azure AD configuration looks similar to Azure/ADSF federation: https://techdirectarchive.com/2020/02/02/federating-with-adfs-with-azure-active-directory/
Cheers,
Kees