Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos



Similar documents
Leverage Active Directory with Kerberos to Eliminate HTTP Password

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Single Sign-on (SSO) technologies for the Domino Web Server

Leveraging SAML for Federated Single Sign-on:

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Server-based Password Synchronization: Managing Multiple Passwords

Using Microsoft Active Directory in the Domino World

Contextual Authentication: A Multi-factor Approach

Configure Single Sign on Between Domino and WPS

Centralized Self-service Password Reset: From the Web and Windows Desktop

Configuring IBM Cognos Controller 8 to use Single Sign- On

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

SAML-Based SSO Solution

SINGLE SIGN-ON FOR MTWEB

Step- by- Step guide to Configure Single sign- on for HTTP requests using SPNEGO web authentication

Two-factor Authentication: A Tokenless Approach

Two SSO Architectures with a Single Set of Credentials

Secure and Seamless integration of inotes, Sametime, and Quickr with SSL and SSO. Acadia Services & Solutions, LLC

TIBCO Spotfire Platform IT Brief

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP

How-to: Single Sign-On

Tableau Server Security. Version 8.0

Single Sign-On for Kerberized Linux and UNIX Applications

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Enterprise Knowledge Platform

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Entrust Managed Services PKI

Web Applications Access Control Single Sign On

SAM Context-Based Authentication Using Juniper SA Integration Guide

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Agenda. How to configure

IceWarp Server - SSO (Single Sign-On)

ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Swivel Multi-factor Authentication

JMP105 JumpStart: Single Sign-on (SAML) Administration Basics

Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

Mod 2: User Management

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Mobile Admin Security

Integrating WebSphere Portal V8.0 with Business Process Manager V8.0

Security Provider Integration Kerberos Authentication

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Kerberos authentication made easy on OpenVMS

VMware Identity Manager Administration

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal

Administering Jive for Outlook

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Configuring Sponsor Authentication

SSO Plugin. Release notes. J System Solutions. Version 3.6

Configuring Single Sign-On for Application Launch in OpenManage Essentials

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Single sign-on for ASP.Net and SharePoint

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

SSO Plugin. Troubleshooting. J System Solutions. Version 3.4

The SyncBack Management System

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Password Manager Windows Desktop Client

SafeWord Domain Login Agent Step-by-Step Guide

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Guide to SASL, GSSAPI & Kerberos v.6.0

Web Express Logon Reference

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

PingFederate. IWA Integration Kit. User Guide. Version 2.6

Vyom SSO-Edge: Single Sign-On for BMC Remedy

Mobile Security. Policies, Standards, Frameworks, Guidelines

GTS Software Pty Ltd. Remote Desktop Services

Introduction to SAML

Enabling single sign-on for Cognos 8/10 with Active Directory

Okta/Dropbox Active Directory Integration Guide

Installing the Citrix Online Plug-In

IBM Connections 4.5 Integration From Zero to Social Hero

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Deploying RSA ClearTrust with the FirePass controller

BlackShield ID Agent for Remote Web Workplace

Coveo Platform 7.0. Microsoft Active Directory Connector Guide

OneLogin Integration User Guide

IBM Security Access Manager for Web

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

CA Performance Center

PingFederate. IWA Integration Kit. User Guide. Version 3.0

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Apache Server Implementation Guide

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin

Dell SonicWALL SRA 7.5 Citrix Access

Colligo Engage Windows App 7.0. Administrator s Guide

Architecture of Enterprise Applications III Single Sign-On

Transcription:

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com 2009, PistolStar, Inc. All rights reserved.

Password Power 8 Lotus Domino SSO via Kerberos Plug-In Summary The Password Power 8 Plug-In for Lotus Domino Single Sign-On (SSO) via Kerberos allows end-users connecting to Domino to achieve SSO to all Domino HTTP servers using the Kerberos authentication protocol*. Kerberos is one of three options Password Power now provides for achieving SSO to Domino HTTP, the other options being proprietary SSO tokens and via login to a portal such as Microsoft SharePoint. End-users in most companies where IBM Lotus applications are employed typically have numerous password prompts, including those for accessing Microsoft Windows and Domino HTTP sessions (i.e. Lotus Domino Web Access ( inotes ), Sametime, Quickr (QuickPlace), and Domino Web applications). As a result, the password management process for administrators becomes extremely complex, requiring them to perform password resets in several places when end-users forget their passwords, synchronize numerous sets of password quality rules that may or may not overlap, and create and disable accounts in multiple places when someone joins or leaves the organization. The Plug-In for Domino SSO via Kerberos removes the need for administrators to manage separate passwords for Domino HTTP servers by making it possible for end-users to authenticate one time and then access additional applications or Websites without further prompting for a username and password. Originally developed at and used by the Massachusetts Institute of Technology (MIT), Kerberos has become the foundation for authentication in Windows operating systems since Microsoft implemented it as the default authentication mechanism in Windows 2000. Kerberos requires connectivity to a central Key Distribution Center (KDC), which, in Windows, is any Microsoft Active Directory domain controller. End-users authenticate to the KDC, requesting encrypted service tickets for the specific service they wish to use (e.g. Web servers). Only the service and the KDC can decrypt the service ticket to get the end-user s authentication information. The service trusts the credentials in the service ticket because it knows the ticket could only be created by the KDC and thus recognizes the enduser must have been authenticated by the KDC in order to receive the ticket. Using Kerberos authentication, there are no passwords sent over the network and the end-user and server are mutually authenticated, preventing server attacks and malicious programs that try to impersonate the server to get the end-user s private information. Kerberos authentication also enables end-users on Windows 2000, XP and Vista to just logon to a Windows domain at the start of their workday, as it provides further integration with Windows and Active Directory. Therefore, when the end-user wants to access a server for which they use Kerberos authentication, their browser retrieves the service ticket from the KDC and sends it to the server automatically. The following provides a step-by-step explanation on how the Plug-In for Domino SSO via Kerberos works and corresponds with the steps outlined in Figure 1 on page 5. 2009, PistolStar, Inc. All rights reserved. Page 1

How It Works Authentication: Requesting a Resource With the Plug-In for Domino SSO via Kerberos, the end-user begins Domino single sign-on by launching a browser from their client desktop and requesting a resource from the Domino server named mail.ad.pistolstar.com (Step One). The Password Power Domino Server API (DSAPI) filter on the Domino server sends a response to the browser that the end-user is not yet authorized and needs to be authenticated with the Negotiate protocol (Step Two). Encrypted Service Ticket The browser then interfaces with the security subsystem on the client machine to request a Kerberos service ticket for the Domino server (e.g. HTTP\mail.ad.pistolstar.com) from the Active Directory domain controller, which is acting as the KDC (Step Three). The KDC responds with a service ticket after validating the end-user s credentials (done automatically if the user has logged in with an Active Directory domain account), looking up the end-user s account with the requested service name and encrypting the ticket using the service account s credentials (Step Four). Service Tickets Validated With the service ticket in its possession, the browser makes another request for the resource from the Domino Server (Step Five). The DSAPI filter parses out the service ticket and attempts to validate it. If successful, the end-user s Kerberos (Active Directory) name is extracted from the ticket (e.g. jsmith@ad.pistolstar.com) (Step Six). Another option for this step is to use the Kerberos name in full or in part to lookup the end-user s full hierarchical name in the Domino Directory (Step Seven). Single Sign-On to Domino Achieved via Kerberos The DSAPI filter then signals Domino that the end-user has been authenticated successfully, sending it the end-user s authenticated name (Step Eight). Domino thus provides the end-user with access to the requested resource, along with a HTTP session token (e.g. Domino LTPA token), which is set in the end-user s browser. The session token allows the end-user to avoid repeated or full Kerberos authentication while they are using the Domino HTTP cache, which dramatically increases the server s response time (Step Nine). Deployment Installation of the Password Power Plug-In for Domino SSO via Kerberos is seamless and requires no changes to the Active Directory/LDAP schema. A serverside software installation (single DLL implemented as a DSAPI filter) is required on each Domino, Lotus Sametime and/or Lotus Quickr server for which browser single sign-on functionality via Kerberos is desired. Notes.ini variables control how the Plug-In operates and any logging goes directly to the Domino server console/log.nsf. The HTTP task only needs to be restarted to put the changes into effect. Additional client-side software (i.e. the Password Power Web SSO Plug-In) is not required as Internet Explorer and Mozilla Firefox have built-in support for Kerberos authentication to Web browsers. However, some minor modifications to the browser settings may be necessary on the client machines to enable Kerberos/ Negotiate authentication. 2009, PistolStar, Inc. All rights reserved. Page 2

System Requirements The Password Power Plug-In for Domino is a server-side solution and supports Microsoft Windows XP and Vista client machines, Windows 2003 and 2008 Active Directory as KDC (MIT KDC not supported), and Lotus Domino R6/7/8/8.5 on Windows and AIX. Internet Explorer 5.0 or higher or Mozilla Firefox 1.5 or higher are required. End-users must log in using their Active Directory domain account. Machines on which Domino is running must be joined to the Active Directory domain and Domino should run as a service. References PistolStar TechNote #253 Deploying Password Power 8 to Thousands of Clients Automatically Without End- User Intervention PistolStar TechNote #255 Achieving Single Sign-On for Your Organization s End-Users PistolStar TechNote #256 Storage, Handling and Security of End-Users Passwords PistolStar TechNote #257 Username Mapping with Authentication Redirection The Realities of Single Sign-On Using Microsoft Active Directory in the Domino World Myths & Realities of Lotus Notes and Domino 8.5 Security Figure 1 on next page. 2009, PistolStar, Inc. All rights reserved. Page 3

Figure 1. *Kerberos is a network authentication protocol that is designed to provide strong authentication to client/ server applications by using secret-key cryptography. For a free implementation of the protocol and more information, go to http://web.mit.edu/kerberos/#what_is ### 2009, PistolStar, Inc. All rights reserved. Page 4