Forum Discussion
APM Active Directory Trusted Domains - how to use?
Hi,
I checked all docs and community but can't figure out how this feature works.
Let's assume we have two AD AAA servers defined:
- DomainA - no trust with DomainB
- DomainB - no trust with DomainA
Then there is Active Directory Trusted Domains object created containing both AD AAA servers, with DomainA set as root - named TrustedAB.
In Access Policy AD Auth object is configured like that:
- Server: None
- Trusted Domains: TrustedAB
- Cross Domain Support: Enabled
In Logon Page object Split domain from full Username is set to Yes.
I expected that based on value in session.logon.last.domain AD Auth will be smart enough to choose correct AD AAA srv from included in Trusted Domains.
But it's not the case. AD Auth is sending KRBR request to AD AAA Srv defined as Root in selected Trusted Domains object. Realm in request is set to DomainA
When targeted server replies with wrong realm error process is finished and authentication fails.
When there is two way forest trust between DomainA and DomainB then target AD srv replies with Kerberos referral placing DomainB in crealm parameter.
Then AD Auth performs new KRBR request to Domain B AD AAA Srv and authentication works.
So how exactly Active Directory Trusted Domains works and when it makes sense to use it?
For sure not when all Domains have two way (or even one way) tust configured - in this case setting one AD AAA Srv end enabling Cross Domain Support is enough.
Piotr
- sergio_baza_aloAltocumulus
Hello,
I'm facing a similar problem
As I understand you have to set up first a trust relationship between DomainA and DomainB and then you configure the AD Trusted Domains in the APM.
The one that is configured as root is going to be asked for a Ticket to authenticate against the other domains.
So the root AD should be DomainA AD for A Users or DomainB for B Users.
Also another option could be Split the users by domain and authenticate each one with their AD, something like this:
https://f5guru.com/2014/11/17/apm-cookbook-multiple-domain-authentication-part-2/
Good luck!
- dragonflymrCirrostratus
Hi,
Well, I did test for different configurations and can't see difference between:
- DomainA and DomainB with Two Way Forest Trust (could be on way as well)
- DC from DomainA set as AD AAA server
- Split used in Logon Page object
-
In AD Auth object:
- Cross Domain Support: enabled
- Server: set to AD AAA for DomainA
Same as above but:
- Trusted Domain object set with DomainA and DomainB AD AAA objects
- DomainA AD AAA set as root
- AD Auth using above Trusted Domain instead of Server option
Effect is exactly the same: both users from DomainA and DomainB can authenticate.
In both cases DomainA DC is sending KRBR referral when user from DomainB is trying to authenticate. Then APM is sending KRBR request to DomainB DC
So what is a point in using Trusted Domain?
Only I can think about is selecting which DC will be used as one responsible for sending KRBR referrals - is that only feature provided by Trusted Domains?
For sure APM is not choosing DC based on domain specified on Logon Page. For Trusted Domain config I always see (in Wireshark) first KRBR request send to DC set as root. No matter from which domain authenticating user is.
Am I missing something important here?
Piotr
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com