Previous Topic: User SessionsNext Topic: Agents and Agent Groups


Windows User Security Context

In a Windows network, a security context defines a user identity and authentication information. Applications (such as Microsoft Exchange Server or SQL Server) need a user security context to provide security using Microsoft access control lists (ACLs) or other tools.

Note: In a Windows security context, the user store must be Active Directory (AD).

The agent can provide a Windows user security context for accessing web resources on IIS Web Servers (Windows 2000 platforms). By establishing a user security context, the server can use this identity to enforce access control mechanisms.

By providing a Windows user security context, the product offers the following benefits:

How Persistent Sessions for User Security Contexts Are Maintained

For the agent to provide a security context for specific resources, enable persistent sessions for all realms that include those resources. The session store maintains persistent sessions.

The session store stores the encrypted credentials of a user and associates the user with a session ID. When a session is established between a client and an agent, the Windows user account is established and linked to the session. When the user session cache of the web agent is purged, the agent retrieves the credentials of the user from the session store. Retrieving the credentials lets the agent re–establish the session. The session store also stores the security context for propagation across single sign–on environments.

How Sessions Are Revalidated

You can explicitly configure the web agent, working through the Policy Server, to contact the session store to revalidate a session. A session cookie that is stored in the browser of the user contains the session ID. The cookie uses the session ID to reacquire the credentials of the user from the session store.

Note: If the session cookie becomes expires, the credentials that are associated with the ID are invalidated. and the user must re‑authenticate.

The validation period, determines the frequency at which the agent revalidates a session. The validation period defines how long the agent keeps a session active using the information in its cache. After the validation period expires, the agent contacts the session store.

If the validation period is too small, the agent goes back to the session store frequently, affecting the speed at which the product processes requests. Set the validation value to a high number. When the number of active sessions is lower than the maximum user session cache value of the agent, the agent uses the cached information.

Note: If the session store is not operating, the validation period is infinite and the agent does not contact the session store.

Windows User Security Context Requirements

Your IIS web server environment must meet the following requirements to use the Windows security context feature:

Configuration Overview

Step

Product Component

Designate a relational database as the session store.

Data tab of the Policy Server Management Console

Enable the user directory containing the Windows users to run the security context.

Use Authenticated User's Security Context check box on the Directory Setup group box on the User Directory pane

Associate one of the Supported Authentication Schemes with each realm

Resource group box of the Realm pane

 

Enable persistent sessions for each realm and set a high Validation Enabled Period

Session group box of the Realm pane

If your IIS Web server is not in a physically secure location, set insecureserver to YES

Agent Configuration Object or WebAgent.conf

Supported Authentication Schemes

The following authentication schemes are supported:

NTLM authentication schemes are not compatible with the Windows User Security Context for this product. Use NTLM for some resources on a web server and Windows User Security Context for different resources on the same web server. Resources that are accessed using NTLM must be in a different realm than the resources accessed through the Windows User Security Context mechanism.

More information:

Authentication Schemes

Active Directory and NetBIOS Names

Although the Active Directory domains are named according to DNS naming standards, a NetBIOS name must still be defined when creating Active Directory domains.

For the product to support seamless Microsoft security context, NetBIOS names must match the DNS domain name as recommended by Microsoft.

When the DNS name of the Active Directory domain differs from its NetBIOS name, the user domain cannot be established. The web server cannot provide the security context when the product is configured to use an LDAP user directory.

Single Sign-on in Security Context

The product provides single-sign-on across all supported web servers while preserving the security context required for seamless Microsoft security context.

However, all realms must be persistent. Otherwise the users are challenged again when the product attempts to persist the security context.