Integrated Windows Authentication (IWA) is a proprietary mechanism developed by Microsoft to validate users in pure Windows environments. The Windows authentication scheme available with the Policy Server secures resources by processing user credentials that the Microsoft Integrated Windows authentication infrastructure obtains.
Previous versions of the product supported Windows authentication through the NTLM authentication scheme. However, this support was limited to environments with NT Domains or where the Active Directory service is configured to support legacy NT Domains in mixed mode.
The Windows authentication scheme provides access control in deployments with Active Directories running in native mode. The scheme also supports Active Directories that are configured to support NTLM authentication. The Windows authentication scheme replaces the product's NTLM authentication scheme. Existing NTLM authentication schemes continue to be supported and can be configured using the new Windows authentication scheme.
Note: In some circumstances, it is better to combine Windows User Security Context functionality with other authentication schemes instead of using the Windows authentication scheme.
The Windows authentication scheme is for resources that Web Agents on IIS web servers protect, and whose users access resources using Internet Explorer web browsers. This scheme relies on a properly configured IIS web server to acquire and verify user credentials. The Policy Server bases authorization decisions on a user identity as asserted by the IIS server.
Kerberos is a network protocol for domain authentication in supported Windows and UNIX environments. Creating a CA SiteMinder® Kerberos authentication scheme is part of the process of configuring Kerberos authentication for your network.
See CA SiteMinder® Kerberos AAuthentication for further information.
Verify that the following prerequisites are met before configuring a Windows authentication scheme:
The IIS web server, not the Policy Server, performs authentication based on credentials it receives from the Internet Explorer web browser. Therefore, you cannot use the OnAuthAttempt authentication event to redirect users who do not exist in the user store.
You can use a Windows authentication scheme to authenticate users in a Windows environment.
Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object. For more information, see Duplicate Policy Server Objects.
Follow these steps:
Verify that the Create a new object of type Authentication Scheme is selected.
Click OK
Scheme-specific settings appear.
The fully qualified domain name of the IIS web server, for example:
server1.myorg.com
/siteminderagent/ntlm/smntlm.ntc
Note: The directory must correspond to the virtual directory already configured by the installation. The target file, smntlm.ntc, does not need to exist and can be any name that ends in .ntc or the custom MIME type that you use in place of the default.
The authentication scheme is saved and can be assigned to a realm.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|