Skip to main content

Authentication

UDMG Secure Proxy (USP) implements a multi-layered authentication framework that protects every interaction across its architecture. This framework operates at three levels:

Authentication Framework Levels Diagram

  1. Component-to-component authentication: How USP Manager, USP Server, and USP Client authenticate each other to establish secure control and data channels.
  2. Inbound authentication: How the USP Server authenticates itself to and authenticates external clients connecting to it.
  3. Outbound authentication: How the USP Server authenticates itself to and authenticates internal targets it connects to.

Types of Credentials

To implement authentication across its architecture, USP relies on the following types of credentials:

Component-to-Component Authentication

USP Manager, USP Server, and USP Client authenticate with each other using their own dedicated credentials, independent of any application protocol that USP proxies.

The diagram below illustrates all authentication between components and the credentials used for each connection.

Component-to-Component Authentication Diagram

Type: SSH key pair

Purpose: Used by the USP Server to authenticate itself to the USP Client before creating a secure tunnel.

Setup:

  • Private Key is set in the Tunnel.
  • Matching Public Key is set in the USP Client Configuration File.

Documentation: Authentication Between USP Clients and USP Servers

Inbound and Outbound Authentication

FTP(S) and HTTP(S)

Both FTP(S) and HTTP(S) protocols can optionally use TLS (Transport Layer Security) to encrypt communication and verify endpoint identities.

The diagram below summarize how USP authenticates both inbound and outbound connections for TLS-based protocols.

Inbound and Outbound Authentication Diagram - FTPS and HTTPS

Type: TLS and CA Certificates

Purpose: Used by the USP Server to authenticate itself to the external incoming client during the TLS handshake.

Setup:

  • TLS Certificate is set in the Inbound Node.
  • The external client validates this certificate against its trusted CA.

Documentation: Inbound FTPS/HTTPS Server Identity Verification

SFTP

SFTP (SSH File Transfer Protocol) uses SSH (Secure Shell) as its underlying transport layer to secure both authentication and data exchange.

The following diagram summarize SSH-based authentication flows for inbound and outbound SFTP connections.

Inbound and Outbound Authentication Diagram - SFTP

Type: SSH key pair

Purpose: Used by USP Server to authenticate to the external incoming connection.

Setup:

  • Private Key is set in the Inbound Node.
  • Matching Public Key is set in the external incoming connection, not within USP.

Documentation: USP Server Host Key Verification