RE: [ActiveDir] Cross-Forest Kerberos Delegation

2007-01-01 Thread Ken Schaefer
Hi Steve,

Are you sure about this?

I have the ISA Server, IIS Server and App Server in Forest1

If I logon to the client machine using a user from Forest1, then everything
works fine (I can see all the Kerberos stuff happening in Ethereal captures)

If I logon to the client machine using a user from Forest2, then I get an 403
that appears to come from ISA Server (nothing gets to the IIS server at all).

The above two happen regardless of whether the client machine is in Forest1
or Forest2.

The only thing I can think of is that User2 belongs to a different forest,
and because ISA Server supports constrained delegation only, this is stopping
things from working.

Cheers
Ken
 
--
www.adopenstatic.com/cs/blogs/ken/

: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of steve patrick
: Sent: Saturday, 30 December 2006 11:11 AM
: To: ActiveDir@mail.activedir.org
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: Wow that turned out ugly didnt it?
: 
: Basically it should have shown that  all machines are in one domain in
: Forest1 and the user account is in Forest 2 and F1 trusts F2.
: 
: Sorry for the long delay  in reply also - I was on vacation ...
: 
: Happy New Years!
: 
: steve
: 
: - Original Message -
: From: steve patrick [EMAIL PROTECTED]
: To: ActiveDir@mail.activedir.org
: Sent: Friday, December 29, 2006 4:07 PM
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: 
:  Hi Ken
: 
:  Based on your mail you seem to have the following setup:
: 
: 
:  F1 F2
:  | |
:  M1--- ISA--- IIS---AppServer UserA
: 
: 
:  UserA logs on to M1 and hits the IIS Server which needs to access
:  AppServer with a proper token for UserA
: 
:  In this scenario - constrained delegation will work ok.
: 
:  Perhaps Joe was thinking of the docs which state you have to have the
: IIS
:  Server and the AppServer in the same forest and domain?
: 
:  steve
: 
: 
: 
:  - Original Message -
:  From: Ken Schaefer [EMAIL PROTECTED]
:  To: ActiveDir@mail.activedir.org
:  Sent: Tuesday, December 19, 2006 4:58 PM
:  Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: 
:  Hi Joe,
: 
:  Thanks for your comments. Certainly using Basic is easier, and this is
:  mostly
:  what they are doing at the moment. I say mostly because I wasn't
: entirely
:  upfront about the web server component in my original diagram. That is
:  actually several dozen different web applications - some of which do not
:  have
:  an option to use Basic (either technical limitation -or- a security
:  standard). The aim of the project is to (a) see if transparent logons
: can
:  be
:  made available to users (i.e. via IWA challenges) and (b) see if SSO can
:  be
:  enabled (so users do not need to authenticate to different applications
:  behind the proxy) and (c) get away from Basic Auth. So I'm going to have
:  to
:  keep looking at Kerberos related solutions :-)
: 
:  Cheers
:  Ken
: 
:  --
:  My Blog: www.adOpenStatic.com/cs/blogs/ken
: 
: 
:  : -Original Message-
:  : From: [EMAIL PROTECTED] [mailto:ActiveDir-
:  : [EMAIL PROTECTED] On Behalf Of Joe Kaplan
:  : Sent: Wednesday, 20 December 2006 10:41 AM
:  : To: ActiveDir@mail.activedir.org
:  : Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:  :
:  : My understanding is that you can get the actual protocol transition
:  : logon to
:  : work, but you cannot use delegation (which is what you really need)
:  : because
:  : PT is tied to constrained delegation and it only works in a single
:  : domain,
:  : not even in multiple domains in a forest.  Your understanding is
:  : basically
:  : correct.
:  :
:  : This is a documented limitation and not something I've played with
:  : personally, so I'm not sure if there is more to it than that.
:  :
:  : I honestly don't know if this can be made to work with unconstrained
:  : delegation/kerb auth in IIS, as I've never tried that either.
: However,
:  : giving out unconstrained delegation privileges is a bit icky.
:  :
:  : This may be one of those situations where it is easier to just pass
: the
:  : plaintext credentials around between the tiers using basic auth/SSL
: and
:  : such.
:  :
:  : Joe
:  :
:  : - Original Message -
:  : From: Ken Schaefer
:  : To: ActiveDir@mail.activedir.org
:  : Sent: Tuesday, December 19, 2006 5:29 PM
:  : Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
:  :
:  :
:  : Hi Steve,
:  :
:  : Can you elaborate on this? I'm familiar with what S4U2self is for, but
:  : not
:  : sure how to tell whether I would need it or not. Are you saying below
:  : that
:  : protocol transition can be used cross-forest? I thought protocol
:  : transition
:  : was tied to constrained delegation (in a user/computer account's
:  : properties,
:  : on the delegation tab there is an option that says any protocol, but
:  : that's
:  : only

Re: [ActiveDir] Cross-Forest Kerberos Delegation

2007-01-01 Thread steve patrick

I'm sure..

If you want to ping me off list I can work with you on this
Let me know what time is good for you this week ( maybe a phone call \ live 
meeting  and I can also setup something similar to what you have 
beforehand )


steve


- Original Message - 
From: Ken Schaefer [EMAIL PROTECTED]

To: ActiveDir@mail.activedir.org
Sent: Monday, January 01, 2007 3:07 AM
Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation


Hi Steve,

Are you sure about this?

I have the ISA Server, IIS Server and App Server in Forest1

If I logon to the client machine using a user from Forest1, then everything
works fine (I can see all the Kerberos stuff happening in Ethereal captures)

If I logon to the client machine using a user from Forest2, then I get an 
403
that appears to come from ISA Server (nothing gets to the IIS server at 
all).


The above two happen regardless of whether the client machine is in Forest1
or Forest2.

The only thing I can think of is that User2 belongs to a different forest,
and because ISA Server supports constrained delegation only, this is 
stopping

things from working.

Cheers
Ken

--
www.adopenstatic.com/cs/blogs/ken/

: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of steve patrick
: Sent: Saturday, 30 December 2006 11:11 AM
: To: ActiveDir@mail.activedir.org
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
: Wow that turned out ugly didnt it?
:
: Basically it should have shown that  all machines are in one domain in
: Forest1 and the user account is in Forest 2 and F1 trusts F2.
:
: Sorry for the long delay  in reply also - I was on vacation ...
:
: Happy New Years!
:
: steve
:
: - Original Message -
: From: steve patrick [EMAIL PROTECTED]
: To: ActiveDir@mail.activedir.org
: Sent: Friday, December 29, 2006 4:07 PM
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
:
:  Hi Ken
: 
:  Based on your mail you seem to have the following setup:
: 
: 
:  F1 F2
:  | |
:  M1--- ISA--- IIS---AppServer UserA
: 
: 
:  UserA logs on to M1 and hits the IIS Server which needs to access
:  AppServer with a proper token for UserA
: 
:  In this scenario - constrained delegation will work ok.
: 
:  Perhaps Joe was thinking of the docs which state you have to have the
: IIS
:  Server and the AppServer in the same forest and domain?
: 
:  steve
: 
: 
: 
:  - Original Message -
:  From: Ken Schaefer [EMAIL PROTECTED]
:  To: ActiveDir@mail.activedir.org
:  Sent: Tuesday, December 19, 2006 4:58 PM
:  Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: 
:  Hi Joe,
: 
:  Thanks for your comments. Certainly using Basic is easier, and this is
:  mostly
:  what they are doing at the moment. I say mostly because I wasn't
: entirely
:  upfront about the web server component in my original diagram. That is
:  actually several dozen different web applications - some of which do not
:  have
:  an option to use Basic (either technical limitation -or- a security
:  standard). The aim of the project is to (a) see if transparent logons
: can
:  be
:  made available to users (i.e. via IWA challenges) and (b) see if SSO can
:  be
:  enabled (so users do not need to authenticate to different applications
:  behind the proxy) and (c) get away from Basic Auth. So I'm going to have
:  to
:  keep looking at Kerberos related solutions :-)
: 
:  Cheers
:  Ken
: 
:  --
:  My Blog: www.adOpenStatic.com/cs/blogs/ken
: 
: 
:  : -Original Message-
:  : From: [EMAIL PROTECTED] [mailto:ActiveDir-
:  : [EMAIL PROTECTED] On Behalf Of Joe Kaplan
:  : Sent: Wednesday, 20 December 2006 10:41 AM
:  : To: ActiveDir@mail.activedir.org
:  : Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:  :
:  : My understanding is that you can get the actual protocol transition
:  : logon to
:  : work, but you cannot use delegation (which is what you really need)
:  : because
:  : PT is tied to constrained delegation and it only works in a single
:  : domain,
:  : not even in multiple domains in a forest.  Your understanding is
:  : basically
:  : correct.
:  :
:  : This is a documented limitation and not something I've played with
:  : personally, so I'm not sure if there is more to it than that.
:  :
:  : I honestly don't know if this can be made to work with unconstrained
:  : delegation/kerb auth in IIS, as I've never tried that either.
: However,
:  : giving out unconstrained delegation privileges is a bit icky.
:  :
:  : This may be one of those situations where it is easier to just pass
: the
:  : plaintext credentials around between the tiers using basic auth/SSL
: and
:  : such.
:  :
:  : Joe
:  :
:  : - Original Message -
:  : From: Ken Schaefer
:  : To: ActiveDir@mail.activedir.org
:  : Sent: Tuesday, December 19, 2006 5:29 PM
:  : Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
:  :
:  :
:  : Hi Steve

Re: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-29 Thread steve patrick

Hi Ken

Based on your mail you seem to have the following setup:

   F1 
F2
| 
|
M1--- ISA--- IIS---AppServer 
UserA



UserA logs on to M1 and hits the IIS Server which needs to access AppServer 
with a proper token for UserA


In this scenario - constrained delegation will work ok.

Perhaps Joe was thinking of the docs which state you have to have the IIS 
Server and the AppServer in the same forest and domain?


steve



- Original Message - 
From: Ken Schaefer [EMAIL PROTECTED]

To: ActiveDir@mail.activedir.org
Sent: Tuesday, December 19, 2006 4:58 PM
Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation


Hi Joe,

Thanks for your comments. Certainly using Basic is easier, and this is 
mostly

what they are doing at the moment. I say mostly because I wasn't entirely
upfront about the web server component in my original diagram. That is
actually several dozen different web applications - some of which do not 
have

an option to use Basic (either technical limitation -or- a security
standard). The aim of the project is to (a) see if transparent logons can be
made available to users (i.e. via IWA challenges) and (b) see if SSO can be
enabled (so users do not need to authenticate to different applications
behind the proxy) and (c) get away from Basic Auth. So I'm going to have to
keep looking at Kerberos related solutions :-)

Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken


: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of Joe Kaplan
: Sent: Wednesday, 20 December 2006 10:41 AM
: To: ActiveDir@mail.activedir.org
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
: My understanding is that you can get the actual protocol transition
: logon to
: work, but you cannot use delegation (which is what you really need)
: because
: PT is tied to constrained delegation and it only works in a single
: domain,
: not even in multiple domains in a forest.  Your understanding is
: basically
: correct.
:
: This is a documented limitation and not something I've played with
: personally, so I'm not sure if there is more to it than that.
:
: I honestly don't know if this can be made to work with unconstrained
: delegation/kerb auth in IIS, as I've never tried that either.  However,
: giving out unconstrained delegation privileges is a bit icky.
:
: This may be one of those situations where it is easier to just pass the
: plaintext credentials around between the tiers using basic auth/SSL and
: such.
:
: Joe
:
: - Original Message -
: From: Ken Schaefer
: To: ActiveDir@mail.activedir.org
: Sent: Tuesday, December 19, 2006 5:29 PM
: Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
:
:
: Hi Steve,
:
: Can you elaborate on this? I'm familiar with what S4U2self is for, but
: not
: sure how to tell whether I would need it or not. Are you saying below
: that
: protocol transition can be used cross-forest? I thought protocol
: transition
: was tied to constrained delegation (in a user/computer account's
: properties,
: on the delegation tab there is an option that says any protocol, but
: that's
: only available in the section for constrained delegation. If that's the
: case, then how can protocol transition work cross-forest?
:
: Cheers
: Ken
:
: --
: My Blog: www.adOpenStatic.com/cs/blogs/ken
:
: From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
: Sent: Wednesday, 20 December 2006 12:37 AM
: To: ActiveDir@mail.activedir.org; ActiveDir@mail.activedir.org
: Cc: Ken Schaefer
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
: If I understand your scenario correctly 
:
: In order for S4U2self ( protocol transition ) to work in this sceanrio
: you
: will need a 2 way forest  trust.
: If you do not need S4U2self you  can get by with the one way trust.
:
: steve
: -- Original message --
: From: Ken Schaefer [EMAIL PROTECTED]
:
:  Hi all,
: 
:  I am looking at a slightly tricky situation, at least for me - I'm
: sure
:  you
:  guys would find this a walk in the park :-)
: 
:  I have a situation where there are two forests (2003 Forest
: Functional
:  Level). Each contains a single domain. One domain is a resource
: domain
:  (DomainB), and the other contains the user accounts (DomainA). There
: is a
:  one-way forest trust, such that the resource forest/ domain trust the
: user
:  forest (and domain).
: 
:  The situation I have is as follows:
: 
:  Client --- ISA Server 2006 --- Web Server --- App Server
: 
:  The user that is logged on to the client is from DomainA. All the
: servers
:  belong to DomainB. The user's credentials need to be passed from the
: web
:  server back to the app server. So I could use Basic Authentication
: all the
:  way through. Or I can try to use Kerberos  delegation.
: 
:  Now, ISA Server can use protocol transition, so that Client --- ISA
:  Server
:  can

Re: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-29 Thread steve patrick

Wow that turned out ugly didnt it?

Basically it should have shown that  all machines are in one domain in 
Forest1 and the user account is in Forest 2 and F1 trusts F2.


Sorry for the long delay  in reply also - I was on vacation ...

Happy New Years!

steve

- Original Message - 
From: steve patrick [EMAIL PROTECTED]

To: ActiveDir@mail.activedir.org
Sent: Friday, December 29, 2006 4:07 PM
Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation



Hi Ken

Based on your mail you seem to have the following setup:


F1 F2
| |
M1--- ISA--- IIS---AppServer UserA


UserA logs on to M1 and hits the IIS Server which needs to access 
AppServer with a proper token for UserA


In this scenario - constrained delegation will work ok.

Perhaps Joe was thinking of the docs which state you have to have the IIS 
Server and the AppServer in the same forest and domain?


steve



- Original Message - 
From: Ken Schaefer [EMAIL PROTECTED]

To: ActiveDir@mail.activedir.org
Sent: Tuesday, December 19, 2006 4:58 PM
Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation


Hi Joe,

Thanks for your comments. Certainly using Basic is easier, and this is 
mostly

what they are doing at the moment. I say mostly because I wasn't entirely
upfront about the web server component in my original diagram. That is
actually several dozen different web applications - some of which do not 
have

an option to use Basic (either technical limitation -or- a security
standard). The aim of the project is to (a) see if transparent logons can 
be
made available to users (i.e. via IWA challenges) and (b) see if SSO can 
be

enabled (so users do not need to authenticate to different applications
behind the proxy) and (c) get away from Basic Auth. So I'm going to have 
to

keep looking at Kerberos related solutions :-)

Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken


: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of Joe Kaplan
: Sent: Wednesday, 20 December 2006 10:41 AM
: To: ActiveDir@mail.activedir.org
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
: My understanding is that you can get the actual protocol transition
: logon to
: work, but you cannot use delegation (which is what you really need)
: because
: PT is tied to constrained delegation and it only works in a single
: domain,
: not even in multiple domains in a forest.  Your understanding is
: basically
: correct.
:
: This is a documented limitation and not something I've played with
: personally, so I'm not sure if there is more to it than that.
:
: I honestly don't know if this can be made to work with unconstrained
: delegation/kerb auth in IIS, as I've never tried that either.  However,
: giving out unconstrained delegation privileges is a bit icky.
:
: This may be one of those situations where it is easier to just pass the
: plaintext credentials around between the tiers using basic auth/SSL and
: such.
:
: Joe
:
: - Original Message -
: From: Ken Schaefer
: To: ActiveDir@mail.activedir.org
: Sent: Tuesday, December 19, 2006 5:29 PM
: Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
:
:
: Hi Steve,
:
: Can you elaborate on this? I'm familiar with what S4U2self is for, but
: not
: sure how to tell whether I would need it or not. Are you saying below
: that
: protocol transition can be used cross-forest? I thought protocol
: transition
: was tied to constrained delegation (in a user/computer account's
: properties,
: on the delegation tab there is an option that says any protocol, but
: that's
: only available in the section for constrained delegation. If that's the
: case, then how can protocol transition work cross-forest?
:
: Cheers
: Ken
:
: --
: My Blog: www.adOpenStatic.com/cs/blogs/ken
:
: From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
: Sent: Wednesday, 20 December 2006 12:37 AM
: To: ActiveDir@mail.activedir.org; ActiveDir@mail.activedir.org
: Cc: Ken Schaefer
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
:
: If I understand your scenario correctly 
:
: In order for S4U2self ( protocol transition ) to work in this sceanrio
: you
: will need a 2 way forest  trust.
: If you do not need S4U2self you  can get by with the one way trust.
:
: steve
: -- Original message --
: From: Ken Schaefer [EMAIL PROTECTED]
:
:  Hi all,
: 
:  I am looking at a slightly tricky situation, at least for me - I'm
: sure
:  you
:  guys would find this a walk in the park :-)
: 
:  I have a situation where there are two forests (2003 Forest
: Functional
:  Level). Each contains a single domain. One domain is a resource
: domain
:  (DomainB), and the other contains the user accounts (DomainA). There
: is a
:  one-way forest trust, such that the resource forest/ domain trust the
: user
:  forest (and domain).
: 
:  The situation I have is as follows:
: 
:  Client

Re: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-29 Thread Joe Kaplan
That is what I was thinking of.  I couldn't find where I read that and went 
from memory.  Thanks for the clarification.


Joe K.

- Original Message - 
From: steve patrick [EMAIL PROTECTED]

To: ActiveDir@mail.activedir.org
Sent: Friday, December 29, 2006 6:07 PM
Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation



Hi Ken

Based on your mail you seem to have the following setup:


F1 F2
| |
M1--- ISA--- IIS---AppServer UserA


UserA logs on to M1 and hits the IIS Server which needs to access 
AppServer with a proper token for UserA


In this scenario - constrained delegation will work ok.

Perhaps Joe was thinking of the docs which state you have to have the IIS 
Server and the AppServer in the same forest and domain?


steve





List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ma/default.aspx


Re: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-19 Thread tech4steve
If I understand your scenario correctly 

In order for S4U2self ( protocol transition ) to work in this sceanrio you will 
need a 2 way forest  trust.
If you do not need S4U2self you  can get by with the one way trust.

steve
-- Original message -- 
From: Ken Schaefer [EMAIL PROTECTED] 

 Hi all, 
 
 I am looking at a slightly tricky situation, at least for me - I'm sure you 
 guys would find this a walk in the park :-) 
 
 I have a situation where there are two forests (2003 Forest Functional 
 Level). Each contains a single domain. One domain is a resource domain 
 (DomainB), and the other contains the user accounts (DomainA). There is a 
 one-way forest trust, such that the resource forest/ domain trust the user 
 forest (and domain). 
 
 The situation I have is as follows: 
 
 Client --- ISA Server 2006 --- Web Server --- App Server 
 
 The user that is logged on to the client is from DomainA. All the servers 
 belong to DomainB. The user's credentials need to be passed from the web 
 server back to the app server. So I could use Basic Authentication all the 
 way through. Or I can try to use Kerberos  delegation. 
 
 Now, ISA Server can use protocol transition, so that Client --- ISA Server 
 can be something other than Kerberos (e.g. forms authentication), however 
 Protocol Transition then requires the use of constrained delegation. Am I 
 right in thinking that constrained delegation is limited to accounts in the 
 same domain? If so, then the fact that the user is in a different domain to 
 the ISA Server will cause this to fail. 
 
 On the other hand, if I didn't use constrained delegation, just regular 
 delegation (and no protocol transition), does that work across Forests 
 though? I have read conflicting reports on this. I'm having some difficulty 
 getting it working, so either the answer is no, or my skills aren't up to 
 the task (probably the latter, in combination with the former). 
 
 Cheers 
 Ken 
 
 -- 
 My Blog: www.adOpenStatic.com/cs/blogs/ken 
 
 List info : http://www.activedir.org/List.aspx 
 List FAQ : http://www.activedir.org/ListFAQ.aspx 
 List archive: http://www.mail-archive.com/activedir@mail.activedir.org/ 

RE: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-19 Thread Ken Schaefer
Hi Steve,

 

Can you elaborate on this? I'm familiar with what S4U2self is for, but not
sure how to tell whether I would need it or not. Are you saying below that
protocol transition can be used cross-forest? I thought protocol transition
was tied to constrained delegation (in a user/computer account's properties,
on the delegation tab there is an option that says any protocol, but that's
only available in the section for constrained delegation. If that's the case,
then how can protocol transition work cross-forest?

 

Cheers

Ken

 

--

My Blog: www.adOpenStatic.com/cs/blogs/ken
http://www.adopenstatic.com/cs/blogs/ken 

 

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, 20 December 2006 12:37 AM
To: ActiveDir@mail.activedir.org; ActiveDir@mail.activedir.org
Cc: Ken Schaefer
Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation

 

If I understand your scenario correctly 

 

In order for S4U2self ( protocol transition ) to work in this sceanrio you
will need a 2 way forest  trust.

If you do not need S4U2self you  can get by with the one way trust.

 

steve

-- Original message -- 
From: Ken Schaefer [EMAIL PROTECTED] 

 Hi all, 
 
 I am looking at a slightly tricky situation, at least for me - I'm
sure you 
 guys would find this a walk in the park :-) 
 
 I have a situation where there are two forests (2003 Forest
Functional 
 Level). Each contains a single domain. One domain is a resource
domain 
 (DomainB), and the other contains the user accounts (DomainA).
There is a 
 one-way forest trust, such that the resource forest/ domain trust
the user 
 forest (and domain). 
 
 The situation I have is as follows: 
 
 Client --- ISA Server 2006 --- Web Server --- App Server 
 
 The user that is logged on to the client is from DomainA. All the
servers 
 belong to DomainB. The user's credentials need to be passed from
the web 
 server back to the app server. So I could use Basic Authentication
all the 
 way through. Or I can try to use Kerberos  delegation. 
 
 Now, ISA Server can use protocol transition, so that Client ---
ISA Server 
 can be something other than Kerberos (e.g. forms authentication),
however 
 Protocol Transition then requires the use of constrained
delegation. Am I 
 right in thinking that constrained delegation is limited to
accounts in the 
 same domain? If so, then the fact that the user is in a different
domain to 
 the ISA Server will cause this to fail. 
 
 On the other hand, if I didn't use constrained delegation, just
regular 
 delegation (and no protocol transition), does that work across
Forests 
 though? I have read conflicting reports on this. I'm having some
difficulty 
 getting it working, so either the answer is no, or my skills
aren't up to 
 the task (probably the latter, in combination with the former). 
 
 Cheers 
 Ken 
 
 -- 
 My Blog: www.adOpenStatic.com/cs/blogs/ken 





Re: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-19 Thread Joe Kaplan
My understanding is that you can get the actual protocol transition logon to 
work, but you cannot use delegation (which is what you really need) because 
PT is tied to constrained delegation and it only works in a single domain, 
not even in multiple domains in a forest.  Your understanding is basically 
correct.


This is a documented limitation and not something I've played with 
personally, so I'm not sure if there is more to it than that.


I honestly don't know if this can be made to work with unconstrained 
delegation/kerb auth in IIS, as I've never tried that either.  However, 
giving out unconstrained delegation privileges is a bit icky.


This may be one of those situations where it is easier to just pass the 
plaintext credentials around between the tiers using basic auth/SSL and 
such.


Joe

- Original Message - 
From: Ken Schaefer

To: ActiveDir@mail.activedir.org
Sent: Tuesday, December 19, 2006 5:29 PM
Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation


Hi Steve,

Can you elaborate on this? I'm familiar with what S4U2self is for, but not 
sure how to tell whether I would need it or not. Are you saying below that 
protocol transition can be used cross-forest? I thought protocol transition 
was tied to constrained delegation (in a user/computer account's properties, 
on the delegation tab there is an option that says any protocol, but that's 
only available in the section for constrained delegation. If that's the 
case, then how can protocol transition work cross-forest?


Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 20 December 2006 12:37 AM
To: ActiveDir@mail.activedir.org; ActiveDir@mail.activedir.org
Cc: Ken Schaefer
Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation

If I understand your scenario correctly 

In order for S4U2self ( protocol transition ) to work in this sceanrio you 
will need a 2 way forest  trust.

If you do not need S4U2self you  can get by with the one way trust.

steve
-- Original message -- 
From: Ken Schaefer [EMAIL PROTECTED]



Hi all,

I am looking at a slightly tricky situation, at least for me - I'm sure 
you

guys would find this a walk in the park :-)

I have a situation where there are two forests (2003 Forest Functional
Level). Each contains a single domain. One domain is a resource domain
(DomainB), and the other contains the user accounts (DomainA). There is a
one-way forest trust, such that the resource forest/ domain trust the user
forest (and domain).

The situation I have is as follows:

Client --- ISA Server 2006 --- Web Server --- App Server

The user that is logged on to the client is from DomainA. All the servers
belong to DomainB. The user's credentials need to be passed from the web
server back to the app server. So I could use Basic Authentication all the
way through. Or I can try to use Kerberos  delegation.

Now, ISA Server can use protocol transition, so that Client --- ISA 
Server

can be something other than Kerberos (e.g. forms authentication), however
Protocol Transition then requires the use of constrained delegation. Am I
right in thinking that constrained delegation is limited to accounts in 
the
same domain? If so, then the fact that the user is in a different domain 
to

the ISA Server will cause this to fail.

On the other hand, if I didn't use constrained delegation, just regular
delegation (and no protocol transition), does that work across Forests
though? I have read conflicting reports on this. I'm having some 
difficulty
getting it working, so either the answer is no, or my skills aren't up 
to

the task (probably the latter, in combination with the former).

Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken 


List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir@mail.activedir.org/


RE: [ActiveDir] Cross-Forest Kerberos Delegation

2006-12-19 Thread Ken Schaefer
Hi Joe,

Thanks for your comments. Certainly using Basic is easier, and this is mostly
what they are doing at the moment. I say mostly because I wasn't entirely
upfront about the web server component in my original diagram. That is
actually several dozen different web applications - some of which do not have
an option to use Basic (either technical limitation -or- a security
standard). The aim of the project is to (a) see if transparent logons can be
made available to users (i.e. via IWA challenges) and (b) see if SSO can be
enabled (so users do not need to authenticate to different applications
behind the proxy) and (c) get away from Basic Auth. So I'm going to have to
keep looking at Kerberos related solutions :-)

Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken


: -Original Message-
: From: [EMAIL PROTECTED] [mailto:ActiveDir-
: [EMAIL PROTECTED] On Behalf Of Joe Kaplan
: Sent: Wednesday, 20 December 2006 10:41 AM
: To: ActiveDir@mail.activedir.org
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: My understanding is that you can get the actual protocol transition
: logon to
: work, but you cannot use delegation (which is what you really need)
: because
: PT is tied to constrained delegation and it only works in a single
: domain,
: not even in multiple domains in a forest.  Your understanding is
: basically
: correct.
: 
: This is a documented limitation and not something I've played with
: personally, so I'm not sure if there is more to it than that.
: 
: I honestly don't know if this can be made to work with unconstrained
: delegation/kerb auth in IIS, as I've never tried that either.  However,
: giving out unconstrained delegation privileges is a bit icky.
: 
: This may be one of those situations where it is easier to just pass the
: plaintext credentials around between the tiers using basic auth/SSL and
: such.
: 
: Joe
: 
: - Original Message -
: From: Ken Schaefer
: To: ActiveDir@mail.activedir.org
: Sent: Tuesday, December 19, 2006 5:29 PM
: Subject: RE: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: 
: Hi Steve,
: 
: Can you elaborate on this? I'm familiar with what S4U2self is for, but
: not
: sure how to tell whether I would need it or not. Are you saying below
: that
: protocol transition can be used cross-forest? I thought protocol
: transition
: was tied to constrained delegation (in a user/computer account's
: properties,
: on the delegation tab there is an option that says any protocol, but
: that's
: only available in the section for constrained delegation. If that's the
: case, then how can protocol transition work cross-forest?
: 
: Cheers
: Ken
: 
: --
: My Blog: www.adOpenStatic.com/cs/blogs/ken
: 
: From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
: Sent: Wednesday, 20 December 2006 12:37 AM
: To: ActiveDir@mail.activedir.org; ActiveDir@mail.activedir.org
: Cc: Ken Schaefer
: Subject: Re: [ActiveDir] Cross-Forest Kerberos Delegation
: 
: If I understand your scenario correctly 
: 
: In order for S4U2self ( protocol transition ) to work in this sceanrio
: you
: will need a 2 way forest  trust.
: If you do not need S4U2self you  can get by with the one way trust.
: 
: steve
: -- Original message --
: From: Ken Schaefer [EMAIL PROTECTED]
: 
:  Hi all,
: 
:  I am looking at a slightly tricky situation, at least for me - I'm
: sure
:  you
:  guys would find this a walk in the park :-)
: 
:  I have a situation where there are two forests (2003 Forest
: Functional
:  Level). Each contains a single domain. One domain is a resource
: domain
:  (DomainB), and the other contains the user accounts (DomainA). There
: is a
:  one-way forest trust, such that the resource forest/ domain trust the
: user
:  forest (and domain).
: 
:  The situation I have is as follows:
: 
:  Client --- ISA Server 2006 --- Web Server --- App Server
: 
:  The user that is logged on to the client is from DomainA. All the
: servers
:  belong to DomainB. The user's credentials need to be passed from the
: web
:  server back to the app server. So I could use Basic Authentication
: all the
:  way through. Or I can try to use Kerberos  delegation.
: 
:  Now, ISA Server can use protocol transition, so that Client --- ISA
:  Server
:  can be something other than Kerberos (e.g. forms authentication),
: however
:  Protocol Transition then requires the use of constrained delegation.
: Am I
:  right in thinking that constrained delegation is limited to accounts
: in
:  the
:  same domain? If so, then the fact that the user is in a different
: domain
:  to
:  the ISA Server will cause this to fail.
: 
:  On the other hand, if I didn't use constrained delegation, just
: regular
:  delegation (and no protocol transition), does that work across
: Forests
:  though? I have read conflicting reports on this. I'm having some
:  difficulty
:  getting it working, so either the answer is no, or my skills aren't
: up
:  to
:  the task (probably the latter

[ActiveDir] Cross-Forest Kerberos Delegation

2006-12-18 Thread Ken Schaefer
Hi all,

I am looking at a slightly tricky situation, at least for me - I'm sure you
guys would find this a walk in the park :-)

I have a situation where there are two forests (2003 Forest Functional
Level). Each contains a single domain. One domain is a resource domain
(DomainB), and the other contains the user accounts (DomainA). There is a
one-way forest trust, such that the resource forest/ domain trust the user
forest (and domain).

The situation I have is as follows:

Client --- ISA Server 2006 --- Web Server --- App Server

The user that is logged on to the client is from DomainA. All the servers
belong to DomainB. The user's credentials need to be passed from the web
server back to the app server. So I could use Basic Authentication all the
way through. Or I can try to use Kerberos  delegation.

Now, ISA Server can use protocol transition, so that Client --- ISA Server
can be something other than Kerberos (e.g. forms authentication), however
Protocol Transition then requires the use of constrained delegation. Am I
right in thinking that constrained delegation is limited to accounts in the
same domain? If so, then the fact that the user is in a different domain to
the ISA Server will cause this to fail.

On the other hand, if I didn't use constrained delegation, just regular
delegation (and no protocol transition), does that work across Forests
though? I have read conflicting reports on this. I'm having some difficulty
getting it working, so either the answer is no, or my skills aren't up to
the task (probably the latter, in combination with the former).

Cheers
Ken

--
My Blog: www.adOpenStatic.com/cs/blogs/ken

List info   : http://www.activedir.org/List.aspx
List FAQ: http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir@mail.activedir.org/