TOTPRadius VPN Portal - Client Authentication flow
No special VPN client installation is required for VPN Portal-based authentication to function, although we have released a special VPN helper app to simplify the user experience and make the process as fast as possible; one click will be enough to establish a VPN link. The VPN Portal will support systems relying on standard VPN protocols (LT2TP and L2TP/IPSec), such as Meraki Client VPN and Fortinet VPN solutions.The data flow diagram below illustrate the principle of the VPN Portal
User logs in to a web interface where several files are generated. The user chooses to download a file named username.t2vpn and double-clicks on it (in some browsers it is possible to configure to "always open the file of this type" - this will save an extra click). If installed, our VPN Helper app (T2VPN) launches, parses the t2vpn file, extracts the VPN info (host, connection type, username and password) and initiates VPN connection. Once the connection is successful, the t2vpn file is removed for security purposes. Here is how the process looks like under Windows 10:
Using T2VPN app is optional, there are possibilities to use a batch file for Windows, or .mobileconfig files for iOS and MacOS machines - however executing these options require additional user actions.
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.
24-05-2024
Reminder: Our management tools for FIDO2.1 Security Keys are Open Source!
Just a quick reminder: our FIDO2.1 Manager tool, your go-to solution for managing FIDO2 credentials securely, is fully open source! Both the Windows version, created with PowerShell, and a Linux (C++ and Python) version are available.