FW3515 21.0v1 Getting Started With Sophos Firewall Authentication
FW3515 21.0v1 Getting Started With Sophos Firewall Authentication
[Additional Information]
Sophos Firewall
FW3515: Getting Started with Sophos Firewall Authentication
November 2024
Version: 21.0v1
© 2024 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any
form or by any means without the prior written consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks
mentioned in this document may be the trademarks or registered trademarks of Sophos Limited or their
respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties,
conditions or representations (whether express or implied) as to its completeness or accuracy. This
document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The
Pentagon, Abingdon Science Park, Abingdon, Oxfordshire, OX14 3YP.
DURATION 35 minutes
In this chapter you will learn the types of users and groups that can be configured for Sophos Firewall
and the methods that can be used for authentication.
Authentication Methods
Hotspot
Clientless Users
Authentication Agent
Captive Portal
Sophos Firewall supports five main methods for authenticating users, these are:
• Hotspot,
• Clientless Users,
• Single Sign-On (SSO),
• Authentication Agent,
• And Captive Portal.
This is the order in which authentication is checked for users. Throughout the rest of this chapter, we will
look at some of the most common forms of authentication in more detail.
Activity
Put the authentication methods in order of precedence
Captive Portal 1
Authentication Agent 2
Hotspot 3
Clientless Users 4
Hotspots
A hotspot is a portal that controls network access to devices connecting to the network. Hotspots are
typically used to provide guest Internet access in public areas. When you add an interface to a hotspot,
all devices connecting through that interface must authenticate through the hotspot.
Hotspots support a full suite of protection features and authentication methods. You can redirect users
to a captive portal or sign-in page where users must accept terms of usage or authenticate themselves
using a generated password or voucher.
Types of User
Clientless users do not authenticate using a username and password, but instead are identified purely by
their IP address. Clientless users are always authenticated locally by the Sophos Firewall.
Guest users are given temporary network access, usually to access the Internet. They authenticate with a
username and password that are generated by the Sophos Firewall and are always authenticated locally.
Standard users authenticate with a username and password. They can be authenticated locally by the
Sophos Firewall or using an external authentication server such as Active Directory.
Typically, you would use clientless users to control network access for servers or devices such as printers
and VoIP phones.
Here you can see an example of two printers being added as a clientless users. You give the devices a
name, specify the IP address and select which group they will be a member of. You will use the group in
the firewall rules to then control the network access the devices have.
Clientless users can also be added in bulk by specifying a range of IP addresses and selecting the group
they will be a member of. You can edit the details for each IP address after adding them.
You can create guest users either individually, shown on the left, or in bulk, shown on the right.
Using the Print option, you can print the credentials for multiple selected users. This is useful if someone
will be providing these to visitors when they ask for access to the guest Wi-Fi, for example.
All guest users are created with the same settings that can be managed in CONFIGURE > Authentication
> Guest user settings.
Here you can set the group that the user will be added to and the password complexity.
Optionally you can also integrate Sophos Firewall with an SMS gateway to allow guest users to register
for their own access details. This can save significant time where there are large volumes of guest users
such as in hotels and airports.
Administration Profiles
Local users can also be added to Sophos Firewall. The user types are:
• User: End users who are connecting to the internet from behind the firewall.
• Administrator: Users who have access to firewall objects and settings as defined in an administration
profile.
Policies can also be assigned, such as for internet access and VPN. Those specified at the user level take
precedence over those specified at the group level.
Sophos Firewall
Sophos
Security Heartbeat
Endpoints
Internet
Synchronized User Identity leverages the presence of Sophos on the Windows endpoints to provide
transparent user authentication with the firewall by sharing the user’s identity through the Security
Heartbeat connection. This makes authentication seamless, without having to deploy additional agents
onto domain controllers.
Synchronized User Identity is enabled by default for all Windows endpoints that establish a Security
Heartbeat with the Sophos Firewall.
For Synchronized User Identity to work, you will need to have added an Active Directory authentication
server on the Sophos Firewall and imported the groups using the wizard.
The Active Directory authentication server must be enabled as an authentication source for the firewall
in CONFIGURE > Authentication > Services.
With this done, all Windows endpoints with a heartbeat to the Sophos Firewall will be authenticated
transparently.
Synchronized User Identity will work by default if the prerequisites are satisfied; however, if you want to
disable it this can be done via the console by creating the file /content/no_userid.
Removing this file will re-enable Synchronized User ID again, however, you do need to restart the
authentication service for this change to take effect.
Groups
Groups are managed in: CONFIGURE > Authentication > Groups
Now that we’ve looked at the different types of users, we’ll look at groups. There are two types of
groups: normal and clientless, named for their respective user types.
A group is a collection of users with common policies and can be used to assign access to resources. The
user will automatically inherit all the policies added to the group.
By default, users will inherit their assigned group’s policies. To adjust a group’s assigned policies, select a
policy from the list of available policies while editing or creating a new group. You can also create a new
policy directly from the group page.
When using Active Directory as an authentication server, users will be created on Sophos Firewall and
assigned to a group when they first successfully login. To use Active Directory groups, use the import
wizard, and users will be assigned to their associated Active Directory group.
Please note that Sophos Firewall groups cannot be nested, and if a user is a member of multiple groups,
the first one they match on Sophos Firewall will be their primary group.
If user authentication is only required for web filtering, Sophos Firewall can use a proxy challenge to
authenticate Active Directory users with NTLM or Kerberos.
Let’s start by looking at what happens when an unknown user tries to visit a web page. There are two
scenarios:
1. For transparent web filtering Sophos Firewall will redirect to a URL served by the firewall and send a
HTTP_AUTH challenge so that the browser responds with the credentials.
2. In the case of direct proxy mode, Sophos Firewall can respond with a PROXY_AUTH challenge so that
the browser responds with the user credentials.
In both cases the user is recorded against the IP address for future transactions.
[Additional Information]
Kerberos is more secure and has lower overheads than NTLM:
NTLM requires an additional response round-trip between Sophos Firewall and the browser
NTLM requires a lookup between Sophos Firewall and the challenge/domain controller for every
authentication event
To avoid clients seeing a popup for authentication we would recommend configuring Sophos Firewall as
an explicit proxy in the browser using the internal hostname of the firewall that is in the domain. The
default proxy port is 3128, but this can be changed in PROTECT > Web > General settings.
Web Authentication
To use Active Directory SSO (NTLM and Kerberos) it must be enabled per-zone on the Device Access
page. With this option enabled, if you have an authentication server configured, AD SSO will be tried
before the captive portal is displayed.
The Web authentication tab combines the AD SSO configuration and captive portal behaviour
appearance settings. The page is laid out to follow the authentication flow:
• Try to authenticate the user using NTLM and/or Kerberos.
• If authentication fails, then display the captive portal with this configuration.
Web Authentication
In the firewall rules, the option to ‘Use web authentication for unknown users’ will try to authenticate
the user using NTLM or Kerberos based on the configuration you have selected, and then fall back to
using the captive portal.
Captive Portal
Captive portal appearance
The Captive portal is a browser interface that requires users behind the firewall to authenticate when
attempting to access a website. After authenticating, the user proceeds to the address or the firewall
redirects the user to a specified URL. This shows the default appearance of the Captive portal, using port
8090.
With the current configuration, once the user has logged in, another browser tab will open. Closing the
page showing the successful login will cause the user to be signed out.
The behavior of captive portal can be customized. For example, changing when a user is signed out.
While there is an option to never sign-out a user logged in through the captive portal, this is not
recommended.
As shown, it is also possible to customize the appearance and contents of the captive portal. For
example, you can change the logo and custom button text.
The new appearance can be previewed before the changes are applied.
Sophos Firewall can authenticate multiple different users coming from the same source IP address when
their proxy settings configured to use the Sophos Firewall as an explicit proxy. This is ideal for terminal
servers, Windows remote desktop, or direct access systems.
https://techvids.sophos.com/watch/nPQbf634vyUSqHYCd8SDS7
Click Launch Demonstration to start. Once you have finished, click Continue.
[Additional Information]
https://techvids.sophos.com/watch/nPQbf634vyUSqHYCd8SDS7
Lucy Fox logs into the Sophos Firewall logs in Lucy Fox and maps traffic
domain from a computer from 10.1.1.1 to the user
with the IP address
10.1.1.1
The Sophos Transparent Authentication Suite, or STAS, provides transparent SSO authentication for users
without requiring a client on the endpoint. It employs an agent on the Microsoft Active Directory domain
controller or a member server that monitors and stores authentication activity and sends authentication
information to Sophos Firewall. There must be an STAS installation serving all domain controllers to
ensure that all logon events can be monitored. It is important to note that the STAS software only works
with Microsoft Active Directory, and only works with IPv4.
Please note that the SSO Client cannot be used when STAS is enabled on the Sophos Firewall.
The user Lucy Fox logs into the domain on a computer that has the IP address 10.1.1.1.
The domain controller writes the login details to the security event log with ID 4768. This includes the IP
address of the computer and the name of the user that logged in.
STAS monitors the event logs for login events. When a login event is detected, the STAS records the
details. As STAS is monitoring the event logs, you need to ensure that successful logon events are being
audited in the Local Security Policy.
STAS notifies Sophos Firewall of the login and supplies the details recorded from the event log, this is
done on port 6060.
Sophos Firewall updates the live users, mapping the traffic from 10.1.1.1 to the user Lucy Fox.
To get started with STAS, download the software from the web admin console at CONFIGURE >
Authentication > Client downloads and install it on all Active Directory domain controllers, or a member
server for each domain controller.
During the installation you can choose to install just the Collector or Agent component of STAS or both.
There may be benefits to installing individual components in larger and more complex environments.
STAS also needs to be configured with a user that will be used to run the service. The user must have the
right to logon as a service and must be able to monitor the Security event log.
[Additional Information]
The service account should be added to the Backup Operators and Event Log Readers Groups in AD, and
the local Administrators groups on endpoints (this can be done via a group policy and is required for
WMI logoff detection to work). The account should also be granted ‘Logon as a service’ permission on
the domain controller, and full NTFS permission on the STAS folder.
Required if
installed on a
member server
On the ‘General’ tab, configure the domain that STAS will be monitoring login events for.
On the ‘STA Agent’ tab, configure the networks for which logon events will be monitored. Here you can
see we are monitoring logon events for the 172.16.16.0/24 network. If a user logs in from another
network, 10.1.1.0/24 for example, this login will not be forwarded to the Sophos Firewall.
If STAS is being installed on a member server instead of a domain controller you need to specify the IP
address of the domain controller here.
The IP address of the Sophos Firewall needs to be added to the ‘Sophos Appliances’ section of STAS.
Workstation polling can be configured to use either WMI (this is the default option) or registry read
access. This is used to determine the currently logged on user when a computer is not found in the live
users table.
STAS can also be configured to detect when user’s logoff. This can be done using the same method as
workstation polling (which is the default option) or PING.
Once the STAS software is installed and configured STAS needs to be enabled on the Sophos Firewall,
which is done in CONFIGURE > Authentication > STAS.
You can configure how long Sophos Firewall will try to probe for the identity, and whether access should
be limited while it tries to confirm the user’s identity.
You can also optionally enable and configure user inactivity handling, by setting the inactivity timer and
data transfer threshold.
For every server you installed STAS on, you must add the IP address as a collector on the Sophos
Firewall.
If you are installing the full STA suite for each domain controller, you should put each collector in its own
group. Using collector groups is beyond the scope of this chapter.
https://training.sophos.com/fw/simulation/STAS/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
[Additional Information]
https://training.sophos.com/fw/simulation/STAS/2/start.html
Authentication Agent
Agent and
The user sets their
certificate need to
credentials
be installed
The agent
authenticates the
user
Another method for authenticating with the Sophos Firewall is to use an agent on each endpoint.
You can download agents for Windows, Mac and Linux, and then need to install the agent and certificate
on the computer.
The user sets the credentials for authentication, and then the agent will authenticate with the Sophos
Firewall. The agent also shares the MAC address telemetry with the Sophos Firewall, which allows MAC
address restrictions to be used.
In Google Admin,
configure an LDAP On Sophos On Sophos
On Sophos
client, download Firewall, configure Firewall, select
Firewall, upload
the client access an LDAP the LDAP
the client access
certificate, and authentication authentication
certificate
create access server server in services
credentials
Configuring Google Workspace authentication can be broadly broken down into four stages.
First, in Google Admin, you need to configure an LDAP client, download the client access certificate, and
create access credentials for Sophos Firewall to use for the LDAP connection.
Next, create an LDAP authentication server that will connect to Google Workspace.
The first stage of configuring Google Workspace authentication with Sophos Firewall is to create an LDAP
client in Google Admin. This is done in Apps > LDAP.
When adding the LDAP client you need to configure the access permissions. You will need to enable all
three options: verify user credentials, read user information, and read group information. You can either
allow all users of your domain to have these permissions or limit it to members of selected organization
units only.
In the LDAP client you need to generate and download a client access certificate and generate new
access credentials. Note that the password for the access credentials can only be copied at the time they
are created, they cannot be accessed later, so ensure you save them somewhere secure.
For more detailed instructions on adding new LDAP clients, please see the Google document linked in
the student handout notes.
[Additional Information]
Add and connect new LDAP clients.
https://support.google.com/a/topic/9173976
Start by uploading the client access certificate you downloaded for Google Workspace. This is done in
SYSTEM > Certificates.
Note that Google uses self-signed certificates so it will not be trusted. This is expected and will not cause
a problem.
When configuring the LDAP server for Google Workspace there are a few things to note:
• You will need to use version 3.
• Use the credentials you created for LDAP in Google Admin. Note that anonymous login is not
supported.
• You must deselect the option ‘Append base DN’ for the authentication to work.
• And select the client access certificate that you uploaded in the previous step.
The final step is to select the LDAP server in services to enable it as a firewall authentication method.
You can then test the configuration by logging into the user portal. Note that the user should only
provide their username and not include the domain.
The Chrome extension needs to be Either an LDAP server to Google The Chromebook extension shares the
pushed to devices from Google Workspace or an Active Directory user ID with Sophos Firewall
Workspace server that is synchronized with
Google Workspace
Google Workspace
Chromebooks are increasingly popular in education and some corporate environments, but they create a
unique set of challenges for user identification with network firewalls.
Sophos Firewall provides a Chromebook extension that shares Chromebook user IDs with the firewall to
enable full user-based policy enforcement and reporting. Pre-requisites include either an LDAP server to
Google Workspace or an Active Directory server that is synchronized with Google Workspace.
The Chrome extension is pushed from the Google Workspace admin console providing easy and
seamless deployment that is transparent to users.
[Additional Information]
Configure Chromebook single sign-on
https://docs.sophos.com/nsg/sophos-firewall/21.0/help/en-
us/webhelp/onlinehelp/AdministratorHelp/Authentication/HowToArticles/AuthenticationConfigureChro
mebookSSO/index.html
Chromebook SSO must be enabled in CONFIGURE > Authentication > Services. To do this it is necessary
to provide your domain that is registered with Google Workspace, and the certificate used to
communicate with the Chromebooks. The common name must match the network where the
Chromebook users are.
Navigate to Device > Chrome > Apps and extensions > Users and
browsers
Only
required Navigate to Device Management > Networks
where the
Sophos
Firewall uses Upload the CA certificate from the Sophos Firewall
a self-signed (select Use this certificate as an HTTPS certificate authority)
certificate
To configure the Chromebook app in Google Workspace, you need to navigate to Device > Chrome >
Apps and extensions > Users and browsers, and then search for and open the Sophos Chromebook
User ID app.
Here you will need to upload the configuration as a JSON file that includes server address, port and log
settings.
If the Sophos Firewall is using a self-signed certificate, you will also need to upload the CA certificate in
Device Management > Networks, selecting the option, Use this certificate as an HTTPS certificate
authority.
[Additional Information]
Example JSON configuration of Google Workspace configuration
Note: the uppercase Value is important, otherwise it won't work.
{
"serverAddress": {
"Value": "10.8.19.132"
},
"serverPort": {
"Value": 65123
},
"logLevel": {
"Value": 2
},
"logoutOnLockscreen": {
"Value": true
https://training.sophos.com/fw/simulation/UserPolicies/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
[Additional Information]
https://training.sophos.com/fw/simulation/UserPolicies/2/start.html
Chapter Review
Sophos Firewall has three types of user. Clientless users are identified by their IP address. Guest users are
given temporary network access. Standard users provide a username and password to authenticate locally
or using an external server such as Active Directory.
Synchronized User Identity provides transparent user authentication by sharing the user’s identity
through the Security Heartbeat connection. This is enabled by default for all Windows endpoints that
establish a Security Heartbeat with the firewall.
Authentication agents for Windows, Mac, and Linux can be installed locally on the computer. The Sophos
Transparent Authentication Suite provides transparent SSO authentication for users without required a
client on the endpoint. It employs an agent on the Microsoft Active Directory domain controller.
Here are the three main things you learned in this chapter.
Sophos Firewall has three types of user. Clientless users are identified by their IP address. Guest users
are given temporary network access. Standard users provide a username and password to authenticate
locally or using an external server such as Active Directory.
Synchronized User Identity provides transparent user authentication by sharing the user’s identity
through the Security Heartbeat connection. This is enabled by default for all Windows endpoints that
establish a Security Heartbeat with the firewall.
Authentication agents for Windows, Mac and Linux can be installed locally on the computer. The Sophos
Transparent Authentication Suite provides transparent SSO authentication for users without requiring a
client on the endpoint. It employs an agent on the Microsoft Active Directory domain controller.