Configuring Parallels RAS to use the DualShield Authentication Platform

To configure Deepnet DualShield settings:

  1. Specify the following:
    • Server: Hostname of the Deepnet server.
    • Enable SSL: Whether to use SSL when connecting to the Deepnet server.
    • Port: Port used for connection to the Deepnet server.
    • Agent: Agent name that will be used during registration.
  2. Click the Check Connection button to test that the authentication server can be reached and to verify that the RAS Console is registered as a DualShield agent. If you see the "DeepNet server not valid" message, it could be dues to the following:
    • The specified server information is incorrect
    • You need ot allow auto registration of the Parallels components as a DualShield agent.
  3. If you need to allow auto registration of the Parallels components as a DualShield agent, do the following:
    1. Go back to the DualShield Management Console and select Agents from the Authentication menu as shown below.

    _DualShiled_08.png

    1. Select Auto Registration.

    _DualShiled_09.png

    1. Select the Enabled option and set the date range.

    _DualShiled_10.png

    1. Once the Agent Auto Registration is set, go back to the RAS Console and select Yes. You should see a message that the Dual Shield agent has been successfully registered.

      Please note that all RAS Connection Brokers must be registered with Deepnet DualShield server. If you are using secondary Connection Brokers, you need to close all open windows until you can press Apply in the RAS Console. This will inform all the agents to self-register as DualShield agents.

  4. Go back to the RAS Console and click Next.
  5. Specify the following:
  6. In the Mode drop-down list, and select how you want your users to be authenticated:
    • Mandatory for all users means that every user using the system must log in using two-factor authentication.
    • Create token for Domain Authenticated Users will allow Parallels RAS to automatically create software tokens for Domain Authenticated Users. Choose a token type from the drop-down list. Note that this option only works with software tokens, such as QuickID and MobileID
    • Use only for users with a DualShield account will allow users that do not have a DualShield account to use the system without have to login using two-factor authentication.
  7. In the Allow channels section, select the channels that will be used to send OTPs to users.
  8. Click Finish.
Was this topic helpful?