Authentication Methods Overview
Paragon Automation can authenticate users by using different authentication methods.
You can use one of the authentication methods that are listed in this topic to log in to the Paragon Automation Web GUI.
Username and Password Authentication
Users can create a Paragon Automation account to access the Paragon Automation Web GUI.
In the username and password authentication, a user enters the log in credentials in the Login page of Paragon Automation. Paragon Automation authenticates the identity of users by verifying the login credentials (username and password) entered by the users against the information stored in Paragon Automation database. This ensures that only users with valid credentials access Paragon Automation. For more information, see User Activation and Login.
Single Sign-On
Paragon Automation can authenticate users by using single sign-on (SSO). SSO simplifies password management for users and administrators through centralized authentication by an identity provider (IdP) (for example, OpenLDAP, Microsoft Active Directory, and JumpCloud).
A superuser can configure IdP in the Organization Settings page and map default roles in Paragon Automation to the IdP user groups. Paragon Automation supports Secure Assertion Markup Language (SAML 2.0) for SSO authentication using IdPs and Lightweight Directory Access Protocol (LDAP). The IdP asserts a user's identity and allows the user to access the Web GUI based on the user's role.
To configure SSO in Paragon Automation:
Add the IdP to Paragon Automation; see Manage Identity Providers.
Map users logging in by using the IdP account credentials to the predefined roles in Paragon Automation; see Manage Roles.
An SSO login can be of two types: IdP-initiated and Service Provider (SP- initiated.
When using IdP-initiated login, a user must log in to the IdP and click or select the application they want to access. The IdP sends the authentication request as an XML-based SAML assertion to Paragon Automation. The user is logged in to Paragon Automation if Paragon Automation accepts the SAML assertion. Otherwise, the user's log in attempt to Paragon Automation fails.
When using SP-initiated login, the user accesses the Login page of Paragon Automation to enter their credentials. Paragon Automation redirects the authentication request to the IdP, to which the IdP responds with a SAML assertion. Paragon Automation accepts the SAML assertion from the IdP and logs in the user.
If SSO is enabled, ensure that you use IdP-initiated login to log in to Paragon Automation. Using SP-initiated login will result in an error.
To sign in using SSO for the first time:
User must enter the SSO URL in a browser.
The login screen of the IdP appears.
IdP server authenticates the user based on the sign-in method configured. For example, an approval notification is sent to the user's registered device.
After the IdP server successfully authenticates the user, the user is logged in to the Paragon Automation Web GUI. Paragon Automation enforces access control on the user based on the role that the Paragon Automation superuser previously assigned for the IdP user group to which the user belongs.
Once a user is successfully authenticated, the user can avoid the process of repeated logins to access the Paragon Automation Web GUI. The user remains signed in until the authentication session expires.
RADIUS Authentication and Authorization
In this release, RADIUS authentication and authorization support is limited to configuring RADIUS on new devices onboarded to Paragon Automation and authenticating and authorizing the device during onboarding.
By using RADIUS, you can onboard devices by using credentials of users configured in a RADIUS server.
To use RADIUS, you (superuser) must:
Install at least one RADIUS server in your network.
Enable RADIUS authentication in Paragon Automation.
Configure Paragon Automation to use the RADIUS server.
By default, Paragon Automation uses the credentials of a superuser or network administrator configured in Paragon Automation to authenticate and authorize access to and from a device (also referred to as local authentication).
When you enable RADIUS, Paragon Automation provides a set of outbound SSH commands to configure RADIUS on the device. When the device connects to Paragon Automation during onboarding, Paragon Automation connects with the RADIUS server to verify whether the connection is requested from an authorized device.
To enable and configure a RADIUS server in Paragon Automation, see Manage RADIUS Server Configurations.