![]() ![]() Netscaler also imo simplifies giving access from external since SF and WI where never intended by Citrix to be exposed directly. One Identity Starling Radius only supports basic Radius OTP string response to initiate the method of token delivery it seems. Netscaler is a hardened appliance intended to be exposed directly (or through a firewall) while SF and WI are Windows boxes with their slew of vulnerabilities. ![]() ![]() It also have built in support for rfwebui. *I've tried to follow Cisco's Duo MFA guide from, but DUO is a more mature solution that uses different service ports for each toke delivery action (sms, phone, push). Question: Does this take creating a custom logon schema XML, define policies bindings and test http body respond expressions in order to make the 2-3 uttons display during the Authentication factor-> Radius -> OTP challenge? My goal is to see if we can add response buttons at the OTP factor / challenge step, so that the user does not have to type "SMS", "phone" or "push" to get the code sent to their registered numbers from the 2fa solution. String format (SMS, Phone, Push, or the Code on the App) Everything works except during the OTP challenge page, users have to type in the method of delivery instead. with nextfactor auth to a Radius Authentication server policy action. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |