For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

mike_aws_119486's avatar
mike_aws_119486
Icon for Nimbostratus rankNimbostratus
Nov 14, 2013

APM + Active Directory Trusts

We have two domains as follows:

domain.com (DOMAIN) child.domain.com (CHILD)

CHILD is a child domain of the parent domain in the same forest and thus there is a two way trust between them.

On our Exchange CAS (in parent domain) users can authenticate as follows:

DOMAIN\User1 CHILD\User2

This works fine.

APM is setup with an Active Directory AAA setup to the parent domain (domain.com) with an access rule as follows:

Logon Page - AD Auth - SSO Credential Mapping - Full Resource Assign

This works for users in the parent domain....they go to the logon page enter their user name and all is good.

For users in the child domain it doesn't whatever they enter APM tries to authenticate them to the parent domain. So user enters CHILD\USER2 at APM and APM turns it into user2@domain.com.

Is there no way that APM can accept the domain name the user enters and authenticate to a child domain over a trust?

7 Replies

  • Simon_Kowallik1's avatar
    Simon_Kowallik1
    Historic F5 Account

    Have you set 'split domain from full username' in the logon page? Have you select 'cross domain support' in AD Auth?

     

  • have tried split domain from username and cross domain support and various combinations thereof. Ended up with all kinds of strange combinations in the logs like:

     

    I think the results were something like the following.....

     

    Split Domain From UserName Enabled / Cross Domain Support Disabled:

     

    2013-11-14 19:47:53 Username 'child\user2' Common 2013-11-14 19:47:53 AD module: authentication with '' failed: Client 'user2@domain.com' not found in Kerberos database, principal name: user2 2013-11-14 19:47:53 Following rule 'fallback' from item 'AD Auth' to ending 'Deny'

     

    2013-11-14 19:48:13 Username 'user2@child.domain.com' Common 2013-11-14 19:48:13 AD module: authentication with '' failed: Client 'user2@domain.com' not found in Kerberos database, principal name: user2 2013-11-14 19:48:13 Following rule 'fallback' from item 'AD Auth' to ending 'Deny'

     

    Split Domain From UserName Enabled / Cross Domain Support Enabled:

     

    2013-11-14 20:03:25 Username 'child\user2' Common 2013-11-14 20:03:56 Username 'user2' Common 2013-11-14 20:03:56 Retry Username 'user2' Common 2013-11-14 20:09:15 \N: Session deleted due to user inactivity or errors.

     

    2013-11-14 20:04:34 Username 'child\user2' Common 2013-11-14 20:04:49 \N: Session deleted due to admin initiated termination. Common 2013-11-14 20:04:49 Following rule 'fallback' from item 'AD Auth' to ending 'Deny'

     

    2013-11-14 20:31:12 Username 'user2@child.domain.com' Common 2013-11-14 20:32:42 Username 'user2@child.domain.com' Common 2013-11-14 20:32:42 Retry Username 'user2' Common 2013-11-14 20:38:05 \N: Session deleted due to user inactivity or errors.

     

    Split Domain From UserName Disabled / Cross Domain Support Enabled:

     

    2013-11-14 20:34:36 Username 'child\user2' Common 2013-11-14 20:34:36 AD module: authentication with 'child\user2@domain.com' failed: Client 'child\user2\@domain.com@domain.com' not found in Kerberos database, principal name: child\user2@domain.com@domain.com. Please verify Active Directory and DNS configuration. (-1765328378) Common

     

    2013-11-14 20:34:50 Username 'user2@child.domain.com' Common 2013-11-14 20:34:50 Retry Username 'user2@child.domain.com' Common 2013-11-14 20:34:51 AD module: authentication with 'user2\@child.domain.com@domain.com' failed: Client 'user2\@child.airmis.airwave

     

    Basically I just want the user to be able to stipulate the domain and for APM to forward that to the DC.

     

    Seems that in the APM AD config because you have entered the FQFN of 'domain.com' it doesn't understand there may be child domains/trusts.....

     

  • This one should work : Split Domain From UserName Enabled / Cross Domain Support Enabled

     

    Have you got any logs on DC side ???

     

  • Try this:

     

    1. Add a session variable for session.logon.last.domain and set it to CHILD.DOMAIN.COM.

       

    2. Enable cross domain support in the AD auth (split domain shouldn't matter for this test).

       

    3. Run a WireShark from the DC and capture the Kerberos and DNS traffic from APM.

       

    4. Test with just the username and password for a CHILD domain member (no domain association).

       

    The split domain function is supposed to separate the domain portion of a username (domain\user or user@domain) and set that in the session.logon.last.domain variable. The above bypasses that to test just the Kerberos and DNS transactions. You want to APM contact its local KDC, get a referral for the CHILD domain, and then request a ticket from the CHILD domain.

     

  • Kevin,

     

    Tried putting a session various into the access policy and logs show:

     

    2013-11-15 18:23:06 Following rule 'fallback' from item 'Logon Page' to item 'Variable Assign' Common 2013-11-15 18:23:06 Rule evaluation failed with error: invalid command name "CHILD.DOMAIN.COM" Common 2013-11-15 18:23:06 Executed agent '/Common/DOMAIN-Exchange_act_variable_assign_ag', return value 0

     

    Probably doing something wrong....

     

  • Looks like Kerberos (88) connections to the child domain controller being blocked by firewall rules on the internal network, need to get that resolved and try again.

     

    Thanks for helpful responses, hopefully can sort that with our network security people and move forward!

     

  • In order to make Kevin's tests, put child.domain.com in " ". Expression will be : session.logon.last.domain = expr {"child.domain.com"}