Previous Topic: How to Configure HTML Forms AuthenticationNext Topic: Information Card Authentication Schemes


Windows Authentication Schemes

Integrated Windows Authentication (IWA) is a proprietary mechanism developed by Microsoft to validate users in pure Windows environments. The Windows authentication scheme available with the Policy Server secures resources by processing user credentials that the Microsoft Integrated Windows authentication infrastructure obtains.

Previous versions of the product supported Windows authentication through the NTLM authentication scheme. However, this support was limited to environments with NT Domains or where the Active Directory service is configured to support legacy NT Domains in mixed mode.

The Windows authentication scheme provides access control in deployments with Active Directories running in native mode. The scheme also supports Active Directories that are configured to support NTLM authentication. The Windows authentication scheme replaces the product's NTLM authentication scheme. Existing NTLM authentication schemes continue to be supported and can be configured using the new Windows authentication scheme.

Note: In some circumstances, it is better to combine Windows User Security Context functionality with other authentication schemes instead of using the Windows authentication scheme.

The Windows authentication scheme is for resources that Web Agents on IIS web servers protect, and whose users access resources using Internet Explorer web browsers. This scheme relies on a properly configured IIS web server to acquire and verify user credentials. The Policy Server bases authorization decisions on a user identity as asserted by the IIS server.

More information:

Windows User Security Context Requirements

Review Kerberos Support Considerations

Kerberos is a network protocol for domain authentication in supported Windows and UNIX environments. Creating a CA SiteMinder® Kerberos authentication scheme is part of the process of configuring Kerberos authentication for your network.

See CA SiteMinder® Kerberos AAuthentication for further information.

Verify that Windows Authentication Prerequisites Are Met

Verify that the following prerequisites are met before configuring a Windows authentication scheme:

More information:

Configure Automatic Logon for Internet Explorer

Review Windows Authentication Scheme Considerations

The IIS web server, not the Policy Server, performs authentication based on credentials it receives from the Internet Explorer web browser. Therefore, you cannot use the OnAuthAttempt authentication event to redirect users who do not exist in the user store.

Configure a Windows Authentication Scheme

You can use a Windows authentication scheme to authenticate users in a Windows environment.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object. For more information, see Duplicate Policy Server Objects.

Follow these steps:

  1. Click Infrastructure, Authentication.
  2. Click Authentication Schemes.
  3. Click Create Authentication Scheme.

    Verify that the Create a new object of type Authentication Scheme is selected.

    Click OK

  4. Enter a name and protection level.
  5. Select Windows Authentication Template from the Authentication Scheme Type list.

    Scheme-specific settings appear.

  6. Enter Server Name, Target, and User DN information. If your environment requires NT Challenge/Response authentication, obtain the following values from the agent owner:
    Server Name

    The fully qualified domain name of the IIS web server, for example:

    server1.myorg.com

    Target

    /siteminderagent/ntlm/smntlm.ntc

    Note: The directory must correspond to the virtual directory already configured by the installation. The target file, smntlm.ntc, does not need to exist and can be any name that ends in .ntc or the custom MIME type that you use in place of the default.

    Library
    smauthntlm
  7. Click Submit.

    The authentication scheme is saved and can be assigned to a realm.