12.2 IdP Connector Configuration Examples 66 ......................................................................................
13 RADIUS server and VPN Protection 74 ...............................................................................................
13.1 RADIUS Configuration 74 ..............................................................................................................
13.2 RADIUS Usage 78 ........................................................................................................................
13.3 VPN Authentication Options 78 .....................................................................................................
13.3 SMS-based OTPs 78 .....................................................................................................................
13.3 Mobile Application 79 ...................................................................................................................
13.3 Hard Tokens 79 .........................................................................................................................
13.3 Migration from SMS-Based OTPs to Mobile Application 80 ............................................................................
13.3 Non-2FA Pass-through 80 ...............................................................................................................
13.4 ESA Authentication Methods and PPP Compatibility 80 ....................................................................
13.5 Verifying ESA RADIUS functionality 81 ...........................................................................................
13.5 Make sure your ESA RADIUS Service is running 81 ...................................................................................
13.5 Configure your RADIUS Server 82 ......................................................................................................
13.5 Verify functionality (localhost) 83 ......................................................................................................
13.5 Verify network connectivity from another machine (optional) 84 ....................................................................
13.5 I received an Access-Reject 85 .........................................................................................................
13.5 I received a connection error 86 .......................................................................................................
13.5 I experienced timeouts 87 ..............................................................................................................
14 RADIUS PAM modules on Linux/Mac 88 ..............................................................................................
14.1 Create ESA RADIUS clients via API 88 ............................................................................................
14.2 PAM configuration 92 ..................................................................................................................
14.3 Other RADIUS configurations 95 ....................................................................................................
15 IP address whitelisting 97 ..................................................................................................................
16 AD FS 99 ............................................................................................................................................
16.1 AD FS Policies 101 ......................................................................................................................
17 Custom integration via API and SDK 102 ...........................................................................................
17.1 API 103 ......................................................................................................................................
17.1 Integration Overview 103 ..............................................................................................................
17.1 Configuration 103 ......................................................................................................................
17.2 SDK 105 .....................................................................................................................................
17.2 Integration Overview 106 ..............................................................................................................
17.2 SDK License Activation 106 ............................................................................................................
17.2 SDK in practice 107 ....................................................................................................................
17.2 Using the SDK 107 .....................................................................................................................
17.2 SDK System Integration 107 ...........................................................................................................
17.2 Database requirements 108 ...........................................................................................................
17.2 Reading and Writing 2FA Data 108 ....................................................................................................
17.2 Update Login UI With 2FA Methods 109 ...............................................................................................
17.2 Update the Management UI to Enable/Disable 2FA For Users 111 ...................................................................
17.2 Additional Components 111 ...........................................................................................................
17.3 Summary of differences 111 .........................................................................................................
18 Auditing and Licensing 112 ................................................................................................................
18.1 Reports 112 ...............................................................................................................................
18.2 Auditing 114 ...............................................................................................................................
18.3 License Overview 115 ..................................................................................................................
18.4 License States 115 ......................................................................................................................
18.5 License Enforcement 116 .............................................................................................................
19 Troubleshooting 116 ..........................................................................................................................
19.1 Windows Login protection does not work 117 ................................................................................