Al,

Thanks for the feedback.  In reality, I don't think that the code, etc. for
ADAM SecPrinc vs. AD related will be that bad.  If the account is supposed
to exist, then the user object is going to have to be in ADAM one way or the
other.

So, check first for a user object with a password in ADAM.  Fail that, check
for a userProxy object.  Succeed and on to AD for AuthN (with the SID and
Password in tow) or fail with the "username does not exist or incorrect
password" message (or something equally ambiguous).

However, I could be horribly wrong.... (Like _that's_ never happened
before....)

-rtk

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mulnick, Al
Sent: Sunday, March 06, 2005 10:40 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] ADAM - Clarification

Nuts!  I had to go back and read the part about the internal users also
gaining access with internal credentials. 

So to me this screams multiple instances of a directory 1 for internal and
one for external users.  The internal users DB would use SASL bind
techniques and would have to be able to talk to the AD for authentication.
The external users would only use simple bind techniques.  

Saying that, I haven't tried it, but I'm wondering if you could mix and
match: some that are AD proxy objects (I know you said it's out, but..) and
some that are not.  What would the messy code look like then?

Another option is to use password synchronization.  The downside is that you
would be putting passwords for internal resources into the DMZ under the
current concept.   

The identity store is not the important factor here; the solution
requirements and your security policy are what will likely drive this to
some sort of unique solution.  ADAM is just a lot easier and more integrated
to work with than the other identity stores. 



-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mulnick, Al
Sent: Sunday, March 06, 2005 11:28 AM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] ADAM - Clarification

I wouldn't use SASL for this myself.  I don't believe I'd want my customer
data in the windows SAM as that could run into scalability issues (that's
why we went with AD in a distributed fashion vs. local SAM right?)

>From your description, a simple bind is the way to go.  You'll want to
secure the transmission of course and lock down which machines can gain
access to the server/port hosting the ADAM instance.  

For what it's worth, this would be the same as in the case of using SunLDAP
or OpenLDAP because they are just doing a bind to an identity store and then
possibly looking at the group membership for authorization purposes. 

My $0.04 anyway,

al

 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan
Sent: Saturday, March 05, 2005 11:57 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] ADAM - Clarification

All - 

We have a Web Portal solution that has the option to use LDAP v3 for AuthN
calls.  Obviously, we want to use AD for our internal customers, and
implement user objects that would not reside in AD for our external
customers.

In my mind, this screams ADAM.  I can create the user objects in ADAM for
the external customers.  And, I've read thoroughly the Tech Refs and some
other words from Joe Kaplan on the subject.  I also took a look at ~Eric's
blog for a post or two, which were helpful.

The problem - to the point - is this.  The Portal web server, where the LDAP
AuthN calls come from is in the external perimeter.  There are four options
that are indicated in the docs:

# Anonymous bind (no password)
# Simple LDAP bind (ADAM security principal with password) # SASL binding
(Windows security principal in local computer or AD) # Bind redirection
(security principal is in ADAM, but has a reference to an AD security
principal)

Bind redirection (userProxy) has a domain membership requirement for the
machine on which ADAM resides.  Given that the security requirements won't
allow this, this one is out.

However, I can't seem to find anything that indicates the requirements for
SASL bind.  Is this an option?

The bottom line is that I want to use ADAM, but have run into this brick
wall.  What options do I have, as I've exhausted the resources that I have
at my disposal, at this point in time at least :)

Rick Kingslan  MCSE, MCSA, MCT, CISSP
Microsoft MVP:
Windows Server / Directory Services
Windows Server / Rights Management
Windows Security (Affiliate)
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
WebLog - www.msmvps.com/willhack4food


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to