Describe Zextras Auth
The Zextras Suite module known as Zextras Auth affects several aspects of accessing a Zextras instance after the Login Page, including:
- the mode of access. The access mask varies depending on the specified authentication backends, allowing users to submit their credentials using any backend. The ZxAuth for users (Auth Zimlet) also reflects this.
- Customisations. Describe the appearance of the login page. For a list of customizable elements, see the dedicated section Custom Login Page.
All of the Zextras-supported Authentication Strategies (user/pwd, SAML, 2FA, MobilePwd, and QrCode) and Service Authorizations may be managed with Zextras Auth.
This section is arranged as follows and is separated into three main sections. The description of each supported authentication method can be found immediately below; the next two sections are devoted to administration tasks, which need privileged access and are typically completed from the CLI, and daily tasks, which can be completed by both administrators and users from the Web GUI, respectively. Finally, a reference list of every CLI command is provided, along with links to each command.
Approved Authentication Techniques
Backends that Zextras Auth supports include:
- Management of self-service credentials
- Management of mobile passwords
- password for the software
- individual login page
- Integration of SAML
- OTP token for 2FA authentication
- Management of Credentials via CLI
Management of Self Service Credentials
Every user has the ability to generate new passwords and QR codes for third parties—such as team members or personal assistants—to access their email accounts and Zextras Applications from mobile devices thanks to self-service credential management.
You may access the Team and Drive Zextras Apps in particular by scanning QR codes.
Section ZxAuth for users (Auth Zimlet) has further details and step-by-step instructions.v
Unique Login Page
The login page for Zextras allows users to access all of the software’s features and may be personalised in a number of ways, such as by adding a company’s logo or other components of its corporate identity.
Because this functionality operates through the CLI, administrator credentials are required; further details and instructions are provided in the section on Custom Login Page.
The Security Assertion Markup Language (SAML), an open standard data format based on XML, is used to exchange authentication data. It makes it possible for web-based authentication and authorization situations like cross-domain Single Sign-On (SSO), which lets users access several apps using the same login information.
An external IDentity Provider (IDP), to which a user authenticates, is used in Zextras’ SAML implementation. The IDP subsequently transmits authorization credentials to a service provider (SP). The process of confirming a user’s identity and credentials is known as SAML authentication. SAML configuration for Zextras Suite is minimal since an administrator may create it by importing SAML information from the ISP. Both SDP and IDP SAML authentication are enabled, and each domain is allowed to have its own unique SAML endpoint.
The fundamental ideas of SAML authentication are as follows:
The organisation offering the service is called a service provider (SP).
The organisation supplying IDs is known as an identity provider (IdP).
The Service Provider creates a SAML Request to “request” an authentication.
The Identity Provider generates the SAML Response, which provides the user’s assertion of authentication.
Additionally, in accordance with partner requirements, the SSO tokens are transmitted to the Assertion Consumer Service (ACS) endpoint.
In Section Setting up SAML Configuration, instructions are provided for configuring SAML and integrating other apps with Zextras Suite.
Two Factor Authentication (sometimes abbreviated as 2FA) adds an extra layer of protection to the login process, decreasing the likelihood that unauthorised access may occur. In Zextras, this extra layer is provided through a One Time Password (OTP), which a mobile device may read as a QR code.
When 2FA is enabled on a Zextras domain, entering just a username and password will not allow you to log in; you must also have an OTP. Additionally, for 2FA to function successfully, the domain must be defined with the attribute zimbraAuthMech.
By using the trusted_device or trusted_ip parameters, 2FA may be set up at the device, IP, or IP range level and only applies to protocols or apps that enable it, such as HTTP and HTTPS but not IMAP and SMTP. When an IP address or range is trusted, 2FA will work for any login coming from there, but the trusted_device only works when the same app or browser is used; for example, if a 2FA login is performed on Chrome, viewing the same page with Firefox will require a new login.
The site administrator must set up a domain (see QR Code Requirements) before users can utilise the OTP; users may do this by using the Auth Zimlet.
Admins can use ZxAuth.
The tasks administrators may perform to monitor and keep up Zextras Auth are covered in this section. The prerequisites for the various authentication techniques are listed here, followed by installation instructions for administrators. After managing credentials, there is an opportunity to design the login page.
Conditions QR Code Conditions
The following settings must be specified at the domain level in order for the QR Code Application Password functionality to work:
- zimbraPublicServiceHostname
- zimbraPublicServicePort
- zimbraPublicServiceProtocol
A message will be sent to the administrator if one or more of the attributes are not set, listing the affected domains and their unset properties.
2FA Conditions
The zimbraAuthMech property must be specified at the domain level in order to correctly set up 2FA:
In order to enable 2FA, you must also:
- Using the command: Enter the addresses of each mailbox and MTA as ZimbraMailTrustedIp.
- All services must have a specified trustworthy IP range.
- All services must have the ip_can_change property verified on true and 2fa_policy set to 1.
Because these header attributes are necessary to create the whole URL request, the Zextras Backend processing must be changed before allowing SAML login: both X-Port and Protocol X.
The templates are the files impacted by this change:
- nginx.conf.web.http.default.template
- nginx.conf.web.http.template
- nginx.conf.web.https.default.template
- nginx.conf.web.https.template
- The /zx/ code position has to be altered in each of them.
The Zextras Auth Zimlet installation
Run zxsuite auth doDeployAuthZimlet as the zimbra user on any mailbox server in your environment to install the Zextras Auth Zimlet.
Unique Login Page
The Auth module offers the option to alter how other users perceive the Login Page.
The login page’s title, logo, background, and favicon can all be changed at the domain level.
Setting up the Login Page
Set the configuration keys for zimbraWebClientLoginURL and zimbraWebClientLogoutURL to enable the Login Page for a domain (in this case, example.com). By adding the next two values from the GUI, you may do this:
The following CLI command, which configures the authentication mechanism (zimbraAuthMech) as well, can accomplish the same task:
Making the Login Page Your Own
The loginPage Auth CLI command may be used to modify the Login Page.
Sizes and Locations of Image Files
Custom image files used by the Login Page can be hosted locally or embedded from a remote location using Zextras Auth. You may utilise image files for your logo, background, and favicon.
A logo picture should be 320×80 pixels in size. Other sizes can be utilised, but doing so may cause the logo image to be stretched or scaled, which would degrade its quality. Aspect ratios should always be kept at 4:1.
Although the ideal background image size depends on the client’s screen resolution, it is strongly advised to avoid using images that are any smaller than the current standard monitor resolutions in order to prevent vertical or horizontal bars from appearing on screens with a resolution higher than the background image.
Page Title for Login
Either of the following commands can be used to change the title of the login page:
Using zxsuite auth loginPage setTitle global to access the global level
using the zxsuite auth loginPage setTitle domain at the domain level
viewing the setup as it is now
The zxsuite auth loginPage getConfig domain command may be used to see the current Login Page settings for a domain:
Making Policy Management for 2FA Configurable
The second factor was introduced by Zextras Auth as a component of the service authentication technique. Each service has two options, either at the domain or global level:
- be switched on or off for the 2FA
- possess independent Trusted Networks
When enabled, a connection can only be made if the source is trusted. Depending on the 2FA policy set up for the service, this means that the connection comes from either a trusted network manually configured by the admin for the service, or from a previously trusted IP or device.
The service must request the OTP, which is utilised as the second factor, if none of the aforementioned requirements are true. The authentication procedure fails if the service cannot interface with the user for the second factor or does not support it. For instance, 2FA cannot be utilised with IMAP since it is a service that does not allow OTP. In the absence of a valid OTP, the device and IP of the current user are saved in the Trusted Device table.
Additionally, if the IP has been trusted by another service, the connection should still be legitimate based on the service policy.
Establishing SAML Configuration
Automatically import SAML configuration
Manually import the SAML configuration
Set up SAML Logout
- New X509 certificates should be generated and registered with the SAML IDP. To create one using openssl, execute a command identical to the one below.
- Lines 8 and 9 of the configuration file to be included for the certificate (sp.x509cert) and the private key (sp.privatekey).
- Set security by enabling signature creation.line 30, “logoutrequest_signed to true”
- By adjusting security, you may also choose to activate the signature for the login request.line 32: authnrequest_signed to true
SAML Access to a Service
- When you are logged in, go to the IDP portal and select the resource you wish to use.
- Visit the service’s website directly, and then click the SAML LOGIN button that displays next to the username and password boxes.
- Use the direct URL to the service’s SAML authentication. For instance, if you have a Suite installation (the Service) at mail.example.com, you may access the mailbox by clicking the URL https://mail.example.com/zx/auth/startSamlWorkflow?redirectUrl=https://mail.example.com/suite/mails provided you have already authenticated to the IDP.
Permanent Auth Link
- From the Administration GUI, administrators may quickly create an authentication link:
- Click the Create a temporary link button in the user’s General Information section’s Temporary link box.
- A URL link will appear in an overlay window, and by selecting the button next to it, you may copy it.
- The new user can then be emailed the URL.
- Before the link expires, the user has 12 hours to access the mailbox.
Users’ ZxAuth (Auth Zimlet)
- Password-changing for the person who is currently signed in
- You may reach the specialised sites by choosing Exchange ActiveSync, Mobile Apps, or OTP Authentication. There, you can add new credentials.
- Verify the creation status and other details for each credential produced for Exchange ActiveSync and Mobile Apps. The label of the password, its status, the service it is valid for, and its creation date are all displayed next to each entry in the list in each section.
- Verify the status and other details for each One Time Password that has been created. Each entry in this table includes a description, its status, any unsuccessful attempts, and the date it was created.
- Verify the status and other details for each One Time Password that has been created. Each entry in this table includes a description, its status, any unsuccessful attempts, and the date it was created.
- Control the 2FA logins. Unless its usage has been enabled or disallowed at COS, domain, or global level, each user may decide whether to impose access via 2FA.
- Delete any generated credentials.
Alter your password
EAS Create New Credentials
OTP for New Credentials Creation
Discard Credentials
Credential administration
Services offered
- disable all but WebAccess
- disable SMTP and enable IMAP
- only for managed clients (pre-setup without the user) should IMAP/SMTP be enabled.
- Create SMTP passwords for automation or external services that are not enabled for Web, Soap, or IMAP access.
Update your credentials
- created: 0 indicates that the credential was indeed randomly generated, while 1 indicates that it wasn’t.
- created – the timestamp of creation
- label – The label is helpful for recalling the credentials’ intended usage or owner.
- Id is a required field when editing or updating credentials since it is unique.
- the services to which access is permitted
- the hashed credential itself, or hash
- enabled – Whether or not the credential may be used in reality.
- algorithm: the used hashing algorithm
- password – the secret phrase chosen or produced at random. As previously stated, this is the only time the administrator has access to a user’s password.
List of current credentials
- The credentials’ individual ID, which is required in order to update the credentials (see the part after this one), is
- services that the certificate is accepted for.