Thanks John. I have made a setup like this DomainA (forest) DomainB(forest) DomainA trusts DomainB and not vice-versa. So DomainA is trusting domain and DomainB the trusted domain.
With this, can I 1. use DoaminB\user0 user to log on to a machine added to DomainA 2. access a service on DomainA using DomainB\user0? If NTLMv2 is used in this case, does DomainA gets challenge/response tokens generated in the process validated by DomainB? Does anything special needs to be setup for this to work? ~ Nathan On Wed, Mar 6, 2013 at 2:52 PM, John Baker <jba...@javasystemsolutions.com>wrote: > Hello, > > If two domains are in a trust relationship, you can configure a product > to authenticate NTLMv2 tokens against one and it'll handle tokens from > the second domain. Unfortunately, AtriumSSO is the OpenSSO/AM product > with a BMC badge and has no Integrated Windows Authentication module, > and to make just Kerberos work is not only difficult, but often > unreliable. Some chap from BMC made a video on how to configure > AtriumSSO with Kerberos and admitted himself that it's not reliable. I > believe the video is on BMC DN somewhere. > > This topic is difficult because few companies have tried very hard to > build a Java IWA adapter: large specialist SSO companies such as Ping > still supply bits of one, and Quest's old Kerberos+NTLMv1 (note, not > secure) adpater is still being flogged (although I heard they may have > an NTLMv2 component at some point). And even when both Kerberos+NTLMv2 > are glued together, there are lots of edge cases (Negotiate Extensions, > NTLM wrapped in SPNEGO tokens [that most people think is a Kerberos > token; it's not], NTLM tokens without domain names - or even curiously, > bits of an SPN that puzzle even me. > > Typically, people can get "most users" working with a non-IWA solution > but will find a aubset of users can't authenticate correctly, > particularly those connecting from VPN solutions, and hence support > becomes a headache (plus it's embarrassing for the person who > implemented/paid for it). > > The most common non-Java route is to put an IIS Instance in front of > Tomcat, but this means the SSO token is being decoded at IIS and not in > the web application, which many penetration testing/security related > outfits would not admire. I know of at least one BMC Elite Partner > knocking out this "solution" to unsuspecting customers who end up paying > a lot of money for a dirty solution. > > JSS felt a lot of pain some years ago when we tried the Kerberos only > route, and quickly realised we needed to invest heavily in a reliable > IWA adapter. It's in use by many of BMC's largest clients today, and has > quickly begun to gain traction in entirely different markets: most > recently, an adapter for the Jive Software solution that powers BMC DN. > > Adding to all of this, there's a lot more to quality SSO solution than > making iWA work with the BMC product set: What happens if two users > deaster exists in domains A and B, one with deaster and the other as > deaster2 as AR System Login Names? What about the different user > repositories in each BMC product - do you want to manage each > separately? Users without accounts in ITSM, etc, etc. > > AREA LDAP is of course plain old LDAP and not in scope. > > > John > -- > SSO Plugin for BMC ITSM, and more. > http://www.javasystemsolutions.com/jss/ssoplugin > > > _______________________________________________________________________________ > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org > "Where the Answers Are, and have been for 20 years" > _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers Are, and have been for 20 years"