The Indeed IIS Extension product makes it possible to add the second user authentication factor for web applications that use Forms Authentication and are deployed at Microsoft Internet Information Services (IIS) platform with Indeed authentication technology.
Files of Indeed AM IIS Extension reside in: indeed AM 7\Indeed AM IIS Extension\<Version number>\
|
The Indeed AM IIS Extension allows to configure two-factor authentication to provide for access to remote desktops and applications via web using the Microsoft Remote Desktop Web Access (RD Web Access) service. Two-factor authentication is supported only for applications that use Forms Authentication. Two-factor authentication is implemented via authentication with domain password and with one-time password as the second factor. |
ServerUrlBase parameter. This parameter defines the URL of your IndeedAM server.
There must be no “/” character at the end of URL in application settings. |
LSUrl string parameter. This parameter defines the URL of your log server.
There must be no “/” character at the end of URL in application settings. |
ProviderId string parameter. Specify ID of the provider that is to be used for authentication as the value.
id parameter of ProviderId have different provider ID {EBB6F3FA-A400-45F4-853A-D517D89AC2A3} - SMS OTP {093F612B-727E-44E7-9C95-095F07CBB94B} - EMAIL OTP {F696F05D-5466-42b4-BF52-21BEE1CB9529} - Passcode {0FA7FDB4-3652-4B55-B0C0-469A1E9D31F0} - Software OTP {AD3FBA95-AE99-4773-93A3-6530A29C7556} - HOTP Provider {CEB3FEAF-86ED-4A5A-BD3F-6A7B6E60CA05} - TOTP Provider {DEEF0CB8-AD2F-4B89-964A-B6C7ECA80C68} - AirKey Provider |
The example below is given for Exchange 2016. |
Two-factor authentication is configured separately for each target application. To configure, create a key with the name of application or IIS site in the HKEY_LOCAL_MACHINE\SOFTWARE\Indeed-ID\IISHTTPModule section of Windows registry. Then create the following parameters in the key and define their values:
TargetURL – string parameter. This defines the URL of the target page, where the user is redirected to after authentication in the application.
For Exchange 2013 and 2016, specify "/owa" (without the end / character). For Exchange 2010, specify "/owa/" (with / character at the end). |
The values of LoginURL, PasswordField, UsernameField parameters reside in the authentication form of the target application. You can obtain those with Internet Explorer F12 Developer Tools, for example.
It is necessary to deactivate Basic authentication for OWA application in the registry. Create a DWORD parameter named "IsBasicDisabled" with the value of "1” in the HKEY_LOCAL_MACHINE\SOFTWARE\Indeed-ID\IISHTTPModule\IISConfig\owa section. |
Indeed IIS Extension does not support logging in to OWA with "User name only". |