<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Configuring Citrix NetScaler Gateway with Azure MFA	</title>
	<atom:link href="https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=configuring-azure-mfa-citrix-netscaler-gateway</link>
	<description>My thoughts on application delivery</description>
	<lastBuildDate>Wed, 21 Sep 2016 13:58:44 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>
		By: Adrian		</title>
		<link>https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/#comment-40097</link>

		<dc:creator><![CDATA[Adrian]]></dc:creator>
		<pubDate>Wed, 21 Sep 2016 13:58:44 +0000</pubDate>
		<guid isPermaLink="false">http://blog.myvirtualvision.com/?p=3240#comment-40097</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/#comment-36473&quot;&gt;Simon&lt;/a&gt;.

Simon,

This can be achieved by setting up a dummy NPS/IAS Server (I just installed in on the MFA servers) that has policies set so they accept all requests and don&#039;t authenticate the user and setting MFA to authenticate against these RADIUS servers instead of AD/LDAP. It turns the MFA&#039;s into a dumb 2nd factor similar to what RSA does.

We have our NetScalers doing Radius against the MFA&#039;s first, which doesn&#039;t check the AD password and enables OATH/SMS OTP&#039;s, then when that succeeds the NetScalers do LDAP authentication which allows for password changes etc.]]></description>
			<content:encoded><![CDATA[<p>Simon,</p>
<p>This can be achieved by setting up a dummy NPS/IAS Server (I just installed in on the MFA servers) that has policies set so they accept all requests and don&#8217;t authenticate the user and setting MFA to authenticate against these RADIUS servers instead of AD/LDAP. It turns the MFA&#8217;s into a dumb 2nd factor similar to what RSA does.</p>
<p>We have our NetScalers doing Radius against the MFA&#8217;s first, which doesn&#8217;t check the AD password and enables OATH/SMS OTP&#8217;s, then when that succeeds the NetScalers do LDAP authentication which allows for password changes etc.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Simon		</title>
		<link>https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/#comment-36473</link>

		<dc:creator><![CDATA[Simon]]></dc:creator>
		<pubDate>Mon, 25 Jul 2016 05:05:37 +0000</pubDate>
		<guid isPermaLink="false">http://blog.myvirtualvision.com/?p=3240#comment-36473</guid>

					<description><![CDATA[Great to have two factor authentication... but you will notice that when your password expires you will no longer be able to log in.  You can make that work with LDAPS, but LDAPS wont work with OATH tokens.  Figure out how to make all that work (with password expiring when using OATH token and I&#039;ll use it =)]]></description>
			<content:encoded><![CDATA[<p>Great to have two factor authentication&#8230; but you will notice that when your password expires you will no longer be able to log in.  You can make that work with LDAPS, but LDAPS wont work with OATH tokens.  Figure out how to make all that work (with password expiring when using OATH token and I&#8217;ll use it =)</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Gaurav		</title>
		<link>https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/#comment-30534</link>

		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Tue, 17 Nov 2015 20:51:54 +0000</pubDate>
		<guid isPermaLink="false">http://blog.myvirtualvision.com/?p=3240#comment-30534</guid>

					<description><![CDATA[Such a really good post , which tells a brief explanation how to use Microsoft Azure with netscaler 
Kees , can you please tell me 
Can we configure Microsoft azure authentication with SAML Policy configured on Netscaler gateway.]]></description>
			<content:encoded><![CDATA[<p>Such a really good post , which tells a brief explanation how to use Microsoft Azure with netscaler<br />
Kees , can you please tell me<br />
Can we configure Microsoft azure authentication with SAML Policy configured on Netscaler gateway.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Will		</title>
		<link>https://blog.myvirtualvision.com/2014/09/25/configuring-azure-mfa-citrix-netscaler-gateway/#comment-7805</link>

		<dc:creator><![CDATA[Will]]></dc:creator>
		<pubDate>Fri, 26 Sep 2014 13:23:02 +0000</pubDate>
		<guid isPermaLink="false">http://blog.myvirtualvision.com/?p=3240#comment-7805</guid>

					<description><![CDATA[Great post documenting this install! Having done this a few times - very important to increase the timeout value as user&#039;s phones are not always close them during authentication!

Additionally, it can be beneficial to not &quot;require user match&quot; throughout the migration phase and then enable once all users are secured using MFA.]]></description>
			<content:encoded><![CDATA[<p>Great post documenting this install! Having done this a few times &#8211; very important to increase the timeout value as user&#8217;s phones are not always close them during authentication!</p>
<p>Additionally, it can be beneficial to not &#8220;require user match&#8221; throughout the migration phase and then enable once all users are secured using MFA.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
