SSL VPN authentication with Google

Options
Zyxel_Kevin
Zyxel_Kevin Posts: 981 image  Zyxel Employee
Zyxel Certified Network Administrator - Security Zyxel Certified Sales Associate 100 Answers 500 Comments
edited January 15 in VPN

OpenID Connect (OIDC) is a modern authentication protocol built on OAuth 2.0. We now support OIDC integration with Google for SSLVPN authentication. This integration allows us to leverage their existing identity provider for a seamless login experience while centralizing account management and reducing the risks associated with traditional passwords. 

unknown.png

 

Before You Begin 

Before configuring the firewall, you must complete the required setup on your identity provider. 

Authentication Proxy 

Navigate to User & Authentication > User Authentication > Advance 

To prevent certificate warnings during the VPN client dial-up, this should be a commercial CA-signed certificate or your internal CA's certificate must be distributed to all client devices. And the Common Name (CN) or SAN (Subject Alternative Name) of the certificate should be a FQDN that can be resolve to the WAN IP of your firewall. 

image-5bc63d48256ee8-8f83.png unknown.png

Register an APIs & Services in Google  

1.Go to Google Cloud Console > APIs & Services > OAuth consent screen 

unknown.png

2.Follow the setup wizard to enter your application details. Create a project name 

unknown.png

3.The Audience is set to Internal to restrict API access exclusively to authorized workshop participants and ensure environment isolation  

unknown.png

unknown.png

4.Enter Contact Information and Create 

unknown.png unknown.png


5.Continue with the setup wizard to create your OAuth client 

unknown.png

6.Select Application type as "Web application". Assign a recognizable name to your client. 

unknown.png

 Create OIDC AAA Server 

1. Login to the USG FLEX H and navigate to User & Authentication > User Authentication > AAA Server. Add OIDC Server. 

image-62adb9e8078138-4e57.png

Overview your OAuth Client IDs, you need  “Client ID”, “Client secret”  for Firewall setup. 

unknown.png


2.Fill in Server details 

Issuer URL: https://accounts.google.com 

Client ID: {Client ID} 

Client Secret: {Client Secret) 

Redirect Address: {FQDN} 

unknown.png

 

unknown.png

3.Copy the above “Redirect URI” back to Oauth 2.0 Client IDs and paste in Authorized redirect URLs 

unknown.png

4. Go back to the USG FLEX H, OIDC Server page, at Configuration Validation.  

5. Click Test on the Firewall. 

unknown.png

6.You should see "OIDC Authentication Successful." 

unknown.png

SSLVPN setting on USG FLEX H Series 

1. Configure SSLVPN and set OIDC as the Primary Server and Set Allowed User to oidc-users. 

Please note you cannot choose another Auth Server if you want to use OIDC.  

unknown.png

Verification 

1. Connected VPN via OpenVPN Connect Client 

2. A browser will automatically open the Google login page.  

3. Authenticate with your Google account. 

unknown.png unknown.png

4. Check status at VPN Status > SSL VPN > Remote Access VPN.  

unknown.png