Skip to content

Configure Assisted Login for Temporary Access

Assisted Login allows managers and administrators to grant temporary network access to users who don’t have permanent credentials. This is ideal for consultants, contractors, or temporary employees who need short-term VPN access.

Key features:

FeatureDescription
Manager approvalApprovers verify access requests via Mideye+ app
Session timeoutsConfigurable session and idle timeout values
Remote disconnectTerminate active sessions from Mideye+ app
Self-approvalOptional setting to allow users to approve themselves

Assisted Login (Authentication type 9) can be enabled on each RADIUS client and will enable managers, administrators, etc. to give temporary access to end-users that normally do not need to have permanent access to certain resources. Assisted Login is only applicable to LDAP accounts, and can be set as a default authentication type as well as per LDAP-account with “Read optional attributes”.

Navigate to Configuration followed by “Assisted Login Profiles”. Click “+” to create a new profile.

  • Give the profile a suitable name.
  • Adjust the session and the idle timeout for the approved users. These values are only applicable if RADIUS attribute 27 (Session-Timeout) and RADIUS attribute 28 (Idle-Timeout) can be configured on the RADIUS client (e.g. Cisco Anyconnect, Pulse secure). Please refer to RFC 2865 section 5.27 and 5.28 for more details.

Mideye Server Assisted Login Profile general settings with session timeout and idle timeout configuration

Add a friendly name and adjust session and idle timeouts

  • Choose what LDAP attribute that should be used to identify the approver. Default values are sAMAccountName and mobile but can be customized to any other LDAP-attribute available.
  • Enable or disable “Allow self approval”. This allows the approver and the approved to be the same person.
  • Select, None, Any or All for the following conditions:
    1. Manager attribute match: In ADUC, the approver must be added as a Manager in the approvers LDAP-profile.
    2. Approver member of authorized group: Specify an LDAP-group that contains all the managers.
    3. Approver pre-listed: Add approvers based on their UPN.

Mideye Server Assisted Login Profile approver configuration with LDAP attribute selection and authorization rules

Approver setup

Select, None, Any or All for the following conditions:

  1. User assigned authentication type 9 in the user repository: This requires that read optional attributes is enabled on the LDAP-profile. See section Authentication for more details.
  2. User member of authorized group: Specify an LDAP-group that contains all the users that should be allowed to login using Assisted Login.
  3. Users pre-listed: Add users based on their UPN.

If none of the options are selected all users can be approved.

Mideye Server Assisted Login Profile user authorization settings with LDAP group membership rules

User setup

As part of the Assisted Login flow, additional challenges can be added to add more information to the login. This requires that the RADIUS-client can handle challenge-response messages.

Mideye Server Assisted Login additional challenge configuration for RADIUS challenge-response

Additional challenges

Navigate to “Configuration” followed by RADIUS-clients. Choose to modify the RADIUS-client that should be enabled with Assisted Login. At “Assisted Login” select the profile created in the previous step.

If the RADIUS-client (e.g. Pulse Secure) supports Disconnect Messages, this option can be enabled. This will allow the approver to disconnect the approved user at any time.

Pictures below will show the authentication flow when user “Consultant” (user who should be approved) tried to authenticate with authentication type 9 set. User “gustav.warlinge.a” will be the approver.

VPN client login screen where user enters username and password for Assisted Login

User consultant@mideye.com tries to login using username and password.

RADIUS challenge-response prompting user to enter approver identity

As a response the user consultant is being asked to enter approver id. The default identity is sAMAccountname and mobile. In this case the consultant types the sAMAccountname of the manager which is gustav.warlinge.a.

Mideye+ app push notification showing access request from consultant awaiting approval

The approver (gustav.warlinge.a) gets a notification that user consultant@corp.mideye.se is trying to login to RADIUS-client 10.1.3.5. If the approver taps “Accept” the user consultant@corp.mideye.se authentication attempt will be accepted.

Assisted login with RADIUS Disconnect Messages

Section titled “Assisted login with RADIUS Disconnect Messages”

If the RADIUS client has support for RADIUS Disconnect Messages the approver have the option to terminate an ongoing session directly from the Mideye+ app.

Mideye+ app showing active session as Online with option to terminate

When an approved user is granted access, the session will be shown as “Online” if the RADIUS client have Disconnect Messages enabled.

Mideye+ app session details with Stop button to terminate active VPN session

Swipe left to see details of the session and click “Stop” to terminate the session.

Mideye+ app confirmation dialog asking to confirm session termination

Select “Yes”.