Managing the Network Configuration

ActivID Appliance Ports and Protocols

The following table lists the ports and protocols that you can choose to open on the network firewall(s) in front of the ActivID Appliance.

Port Type Direction Application Description
40 TCP Inbound sshd service Emergency SSH access for administrators
161 UDP Inbound SNMP Monitoring SNMP-based notification messaging (opened only if SNMP has been enabled)
443 TCP Inbound HTTPS, SOAP over HTTPS ActivID Management Console, Authentication Portal, Self Service Portal, Web Services (SAMLv2, OAUTH2.0, OpenID Connect, SCIM, legacy SOAP APIs)
1004 TCP Inbound OpenWire (AMQ) ActiveMQ Broker (JMS messaging)
1005 TCP Inbound HTTPS ActivID Console
1812 UDP Inbound RADIUS authentication For VPN, Routers, Network and Remote Access Device
8443 TCP Inbound HTTPS (mutual authn.) ActivID Management Console, Authentication Portal, Self Service Portal, Web Services
Important: In High Availability mode, ActivID Appliance requires reliable inter-node communication to replicate the data between the two nodes.
  • Make sure that the bandwidth and latency on the route between the two appliances are sufficient for replication.
  • If you have a VLAN between the two nodes, you have to be particularly careful with the resources dedicated to this VLAN.
  • ActivID Appliance uses IPSec to encrypt the communications over the channel.
  • If the appliances are not on the same subnet, then you have to open the IP Protocol ID 50 (required for Encapsulating Security Protocol (ESP) traffic to be forwarded) and the following ports for IPSec communication:
    PortTypeApplicationDescription
    500UDPIKEIPSec Channel
    4500UDPNAT-TransversalNAT

Set the System Date and Time

The ActivID Appliance uses the timestamp provided by the NTP server to set the system data and time to UTC time.

If the automatic synchronization is enabled, the ActivID Appliance automatically synchronizes with the first NTP server in the pre-configured list. If that server is unavailable, it tries the other servers according to the order in the list until it finds an available NTP server. If no server is available, then the time/date settings are not synchronized.

You can add additional NTP servers or, for hardware appliances only, you can manually set the Date and Time.

Warning! It is critical that the ActivID Appliance system time is correct for auditing and time-based OTP authentication. It is recommended that you use a NTP server to synchronize the time and date automatically.
Note:  
  • The times displayed in the ActivID Console are defined in Coordinated Universal Time (UTC).

  • When different appliance applications are accessed, the time displayed is based on the time zone of the client device.

Configure the Date/Time on a Hardware Appliance

  1. Log on to the ActivID Console and, under System in the menu, select Date / Time.

  2. To define a new server, select the synchronization method:

  3. Click Save to apply the configuration.

Configure the NTP Server on a Virtual Appliance

Note: You cannot manually set the date and time on a virtual appliance.

By default, the ActivID Appliance uses the host system tools for time synchronization. However, it is recommended that you use NTP.

  1. Log on to the ActivID Console and, under System in the menu, select Date / Time.

  2. Select Using Network Time Protocol.

  3. Click Add to define a new server.

  4. Enter the URL for the NTP Server and then click Save.

  5. Repeat the process for each NTP server that you want to configure.
  6. Click Save to apply the NTP server configuration.

Note: To remove the server from the list, select the server you want to delete, and then click Delete.

When the last NTP server is deleted, automatic synchronization is disabled.

View the Current Network Configuration

Depending on your deployment mode (Single or Dual), the Network Configuration screen enables you to view the current network configuration (that is, the hostnames, IP addresses, subnet masks, default gateways, and DNS servers).

You can also configure the port access to the ActivID Authentication Server and ActivID portals, and enable proxy (reverse and forward) support.

Log on to the ActivID Console and, under System in the menu, select Network.

The details of the current Network Configuration are displayed.

Modify the Network Configuration

  1. From the UNIX terminal, run the configure_network.sh script.

2. Modify the network settings as required:

  • Fully Qualified Hostname of the machine hosting the ActivID Appliance
    Important:
    • Make sure that this name does not contain the _ character as it is not supported by DNS

    • The maximum length of the hostname is 46 characters

  • IP Address of the machine
  • Netmask of the machine
  • Default Gateway
  • IP address of the DNS Server
  1. If you want to enter other DNS servers, enter y when prompted to configure more servers. Otherwise, enter n.
  2. Review the configuration.
  3. When prompted, enter y to confirm the configuration is correct, and then press Enter.

Configure Static Routes

A configured static route is bound to the public interface (bond0).

You can display the route table (the default routes from the network configuration when assigning an IP, netmask and default gateway to a network interface) or the manually configured static routes.

Note:  
  • For dual node deployments, the static route configuration should be performed on each node (this configuration is node-specific).
  • When adding a new route, you cannot insert a route at a specific line of the route table.
  • Only IPv4 addresses are supported, in the standard decimal format. When adding a new route, the validity of the address and netmask is checked.

Add a Static Route Configuration

You can configure a new static route by entering a destination network or host, the netmask or Classless Inter-Domain Routing (CIDR) prefix and the gateway to be used.

Note: You cannot override default routes.
  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, select the Static Routes tab and click Add.
  3. Enter the Destination network or host IP address to which you want to configure a static route.
  4. You can enter the address using the CIDR prefix to specify the netmask (for example, 11.16.102.85/32 for a route to a remote host 11.16.102.85) or only an IP address.

  1. If you did not enter the netmask CIDR prefix with the address, enter the Dot-decimal or CIDR Destination prefix of the remote network.
  2. If you want to add a route to a specific host, use a prefix of 32 (or netmask of 255.255.255.255).

  1. Enter the Gateway IP address and click Save.
  2. Note: Only IPv4 addresses are supported, in their dotted decimal form.

Delete a Static Route Configuration

  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, select the Static Routes tab.
  3. Select the route that you want to delete and click Delete Selected.

The entry is immediately removed from the routing table.

Configure Reverse Proxy Support

By default, the ActivID Authentication Portal is configured to be accessed directly for authentication requests.

If you want to use an SSL-enabled proxy server in front of the ActivID Authentication Portal, then configure the Identity Portal (proxy) hostname and port, and client certificate header.

  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, select the Reverse Proxy tab.
  3. Select Yes for Configure Reverse Proxy.
  4. Set the Proxy Hostname and Proxy Port of the ActivID Identity Portal except if the RADIUS Front End is installed on the appliance. This could be the address of a reverse proxy or that of another appliance.
  5. Enter the Client Certificate Header attribute.
  6. Important:  
    • If a reverse proxy is used to access the ActivID Appliance, make sure that you configure the proxy server TLS certificate (NOT the ActivID Appliance SSL certificate value).
    • In deployments with TLS mutual authentication, the dedicated port is 8443 so you must make sure that the:
    • Reverse proxy forwards the <public hostname:8443> requests to <appliance hostname:8443>.
    • Reverse proxy 8443 port is configured for mutual authentications (request a certificate, trust the client certificates).
    • End-user certificate is propagated to the ActivID IdP via a configurable HTTP header.

6. Click Save.

Configure Forward Proxy Support

In deployments with an outgoing/forward proxy (such outgoing HTTPS connections for push-based authentication), you need to configure the proxy in the ActivID Appliance.

  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, select the Forward Proxy tab.
  3. Select Yes for Configure Forward Proxy.
  4. Set the Proxy Hostname and Proxy Port of the ActivID Identity Portal except if the RADIUS Front End is installed on the appliance.
  5. This could be the address of a forward proxy or that of another appliance.

  6. If Proxy Authentication is required, select Yes and enter the:
    • Proxy User Name
    • Proxy User Password
  7. Click Save.

Configure the ActivID Application Ports

You can configure the URLs for the ActivID applications and services by defining the access ports.

The applications/services can be exposed on multiple ports.

Note: The configuration is node-specific and is, therefore, not replicated nor backed-up.
  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, select the Ports Configuration tab.
  3. The connectors correspond to the following ports and are not configurable:

    • TLS1 – TLS port 443
    • TLS2 – TLS port 1005
    • TLS3 – TLS port 1008
    • mTLS1 – TLS with mutual authentication port 8443
    • mTLS2 – TLS with mutual authentication port 1009

    The following table describes the ActivID Application/Service default port configuration.

    Application/Service Description Default Connector

    Authentication Portal

    Back end

    (SAML endpoints, OpenID endpoints, UI URLs)

    • TLS1
    • mTLS1

    SCIM API

    Back end

    • TLS1
    • mTLS1

    SOAP API

    Back end

    TLS1

    HID Approve API

    Back end

    (SCIM and OpenID URL subsets for HID Approve)

    TLS1

    Self-Service Portal

    Back end/front end and only if the application is enabled

    TLS1

    Management Console

    Back end/front end and only if the application is enabled

    TLS1

    Health Check

    Back end

    TLS1

    ActivID Console

    Back end/front end

    TLS2

  4. Edit the configuration as required for your deployment.
  5. Click Save.
  6. Restart the applications.

Configure the Back-End Hostname and Port

On a front-end appliance, you can configure the hostname and port for a back-end appliance.

  1. Log on to the ActivID Console and, under System in the menu, select Network.
  2. In the Authentication Services section, edit the back-end configuration as required:
  • Authentication Services Hostname
  • Authentication Services HTTPS Port
  • The default port value is 443.

  1. Click Save.
  2. Restart the appliance.