Microsoft Active Directory back-end authentication
  • 31 Dec 2024
  • 2 Minutes à lire
  • Sombre
    Lumière
  • PDF

Microsoft Active Directory back-end authentication

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

OneSpan Authentication Server also supports site awareness for Global Catalog-based Active Directory domain controller lookup. OneSpan Authentication Server queries the Global Catalog for all domain controllers serving the user currently in process of back-end authentication and contacts the relevant domain controllers according to their priority in the Global Catalog. In this context, OneSpan Authentication Server identifies the network site to which the machine that is running OneSpan Authentication Server belongs. Those domain controllers that share the same site with OneSpan Authentication Server during back-end authentication take precedence over others.

When deploying Microsoft Active Directory with OneSpan Authentication Server Appliance for back-end authentication, ensure the following:

  • The domain controllers are running Windows Server 2016 or later.
  • If the global catalog is set up (via Back End > Settings in the Administration Web Interface) and no back-end components have been defined, domain discovery will be used to search for a user and identify the Active Directory server to authenticate the user.

    • If domain discovery via the global catalog is to be used, users must be set up in the same domain on Active Directory as they are on OneSpan Authentication Server Appliance.
    • After domain discovery, communication to the Active Directory server containing the user credentials will use SSL if and only if Enable SSL for Back-End Servers is set in the Global Catalog Domain Discovery setting. You can also use the SSL Port option in this section to override the port to be used for SSL communication. If not specified, OneSpan Authentication Server Appliance will determine the port number from DNS or the global catalog.
  • OneSpan Authentication Server Appliance must be configured to use the DNS server containing the DNS records of the Active Directory server on the host OS.
  • The user ID that is used to log in to the Active Directory back-end system during authentication must have both search and update permissions for the data that is to be accessed.
Table: Supported user name formats for Microsoft Active Directory
User ID formatUser ID source
UserIDsAMAccountName attribute of the user
MYREALM\useridFully qualified domain name + sAMAccountName attribute of the user
userid@mydomain.comsAMAccountName attribute of the user + fully qualified domain name

LDAP configuration

The LDAP back-end server needs to be configured to allow it to authenticate via the LDAP protocol. For instructions on how to do this, refer to the OneSpan Authentication Server Appliance Administrator Guide.

If you are using Microsoft Active Directory as the back-end server and configure LDAP back-end authentication with SASL-DIGEST-MD5, the cyrus-sasl-md5 library must be installed to ensure connectivity between OneSpan Authentication Server and Active Directory!

For more information about setting up a back-end server record for an Active Directory server, refer to the Administration Web Interface Help.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle