Skip to content

bdwilson/VIPSupportPush

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Symantec VIP Push for End-User Validation

Imitation is the sincerest form of flattery.

One of the challenges of being in IT support is verifying the identity of the person who's requesting remote assistance. Often employees call into a support desk and require account assitance, need a password reset, or some other security-related request. How can the support staff be sure that the person they're helping is who they say they are?

We've leveraged VIP to do this for some time, but it required the reqester to provide the code displayed in the VIP app on their phone, then the support person had to properly transfer their code and enter it, along with heir userid into a radius authentication web-form - all within 30 seconds. This process is definately prone to error, so when Duo released their "Push to Verify" feature, I set out to create something similar for Symantec VIP push MFA token.

This feature works the same way with VIP. The person initiating the request can verify the identity of a person with a single push request to the end-user device. They can also provide context in the push message on what the request is for to make the request more legitimate to the end-user. Of course this process requires the end-user to have the VIP app on their device and push features enabled.

Push Notification

I'm not a python programmer, much less someone who can do web frontends, but this would be a good candidate for a web/GUI front-end to ease access for support personnel. If you write a web front-end, please let me know so I can link to it.

Requirements

  • Securitas Python SDK for Symantec VIP API
  • Symantec VIP Account
  • Symantec VIP adminstrative access (or someone to generate a VIP communications certificate & key for you; see Securitas docs on how to extract the private key and cert, as well as removing the password from the private key)
  • Python 3 these Modules: python3-pip, python3-suds, python3-websocket, python3-urllib3, python3-requests, python3-botocore. You'll need Python modules flask and wtforms if you plan on using the dinky web app.
  • You'll need to know the userid for the person as it exists within the VIP Manager. This isn't always first.last@domain, it could be SAMAccountName (short userid).

Installation & Usage

It was easier for me to leverage docker to build and test this to get the correct python dependencies, but you could likely just make sure that you have python3 and below packages in debian or Ubuntu, if you're into Docker, see the docker instructions below. Tested on Debian Stretch.

  1. # apt-get install python3 python3-pip python3-suds python3-websocket python3-urllib3 python3-requests python3-botocore git
  2. # pip3 install securitas
  3. # git clone https://github.com/bdwilson/VIPSupportPush; cd VIPSupportPush
  4. Make sure your VIP key and cert are in this directory named privateKey_nopass.pem and publicCert.pem respectively.
  5. Validate someone:
# ./pushpoll.py -u vipUserId -m "Please verify your identity by approving this request." -t "YourCompany Service Desk"
Push Initiated for vipUserId
Waiting for response...
Waiting for response...
Waiting for response...
SUCCESS! Push Accepted by vipUserId
# ./pushpoll.py -u vipUserId -m "Please verify your identity by approving this request." -t "YourCompany Service Desk"
Push Initiated for vipUserId
Waiting for response...
Push Denied by vipUserId

Flask Web Application (optional)

  1. This requires the same dependancies above plus a few more: # pip3 install flask; pip3 install wtforms
  2. You'll need to have your certificate and key, wsdl files, and templates directory in place.
  3. Launch the app
$ ./validator_flask.py
 * Serving Flask app "validator_flask" (lazy loading)
 * Environment: production
   WARNING: Do not use the development server in a production environment.
   Use a production WSGI server instead.
 * Debug mode: off
 * Running on http://0.0.0.0:5000/ (Press CTRL+C to quit)
  1. Access via your local IP port 5000. Of course, this isn't something you can just deploy into production. You should leverage SSL or a proxy, plus proper authentication to provide you proper security; this is simply a proof of concept - commits welcome :) Flask App

Docker (optional)

  1. # git clone https://github.com/bdwilson/VIPSupportPush; cd VIPSupportPush
  2. Make sure your VIP key and cert (privateKey_nopass.pem and publicCert.pem) are copied to the current directory (covered in Securitas docs)
  3. # docker build -t vip_validator .
  4. # docker run -p 5000:5000 --name vip_validator -t vip_validator
  5. Then access http://your_docker_host:5000 and go.
  6. If you need to change something, login and poke around: # docker exec -it vip_validator /bin/bash or # docker run -it vip_validator /bin/bash

Bugs/Contact Info

Bug me on Twitter at @brianwilson or email me here.

About

Symantec VIP Push Validator

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published