Programmable hardware TOTP token in a card format that fits any authentication system
Classic hardware TOTP token with SHA-1 algorithm support
Programmable hardware TOTP token in a key fob format that fits any authentication system
Classic hardware TOTP token with SHA-256 algorithm support
A free 2FA authenticator app with cloud backup, easy token transfer to a new phone, PIN and biometric authentication protection.
Free OTP delivery with chatbots in messaging apps
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time passwords delivery via push notifications
Guides
This guide explains how to set up multi-factor authentication (MFA or 2FA) for Parallels RAS (Remote Application Server) using the Protectimus system.
When integrating Protectimus two-factor authentication with Parallels RAS, the Protectimus Cloud 2FA Service or On-Premise 2FA Platform acts as a RADIUS server through a dedicated connector called Protectimus RADIUS Server. Parallels RAS, on the other hand, functions as a RADIUS client.
Here’s how it works: the Protectimus RADIUS Server connector forwards authentication requests from Parallels RAS to the Protectimus multi-factor authentication (MFA) server. Based on the response received, access is either granted or denied.
Below, we provide an example of how to integrate Protectimus 2FA with Parallels RAS for seamless Parallels RAS MFA.
You can set up multi-factor authentication (2FA) for Parallels RAS with Protectimus using the RADIUS protocol:
- Get registered with Protectimus SAAS Service or install the On-Premise 2FA Platform and configure basic settings.
- Install and configure Protectimus RADIUS Server.
- Add Protectimus as RADIUS Server for Parallels Desktop.
Detailed instructions for installing and configuring the Protectimus RADIUS Server for Parallels RAS two-factor authentication using RADIUS are available in our Protectimus RADIUS Server Installation Guide for Parallels RAS MFA.
Display Name | Come up with a name for your RADIUS server. |
Primary Server | IP of server where the Protectimus RADIUS Server component is installed. |
Secondary Server | Simply leave it blank. |
HA Mode | Simply leave it blank. |
Port | Indicate 1812 (or whichever port you configured in the Protectimus radius.yml file when configuring Protectimus RADIUS Server). |
Timeout | Set to 60 seconds. |
Retries | Set to 3. |
Secret key | Indicate the shared secret you created in the Protectimus radius.yml file (radius.secret property) when configuring Protectimus RADIUS Server. |
Password encoding | Choose PAP. |
Please note: Configuring MFA for Parallels RAS is unique. By default, the RADIUS MFA provider only supports the TOTP authentication method, which includes Protectimus hardware TOTP tokens or the 2FA app Protectimus SMART OTP. Enabling SMS, chatbot, or email authentication may require additional setup. If you need assistance with these authentication methods, please contact our support team.
Integration of two-factor authentication (2FA/MFA) for your Parallels RAS is now complete.
If you have other questions, contact Protectimus customer support service.
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64