Iprism AD2008 Implementation Guide
Iprism AD2008 Implementation Guide
www.stbernard.com
1 INTRODUCTION ........................................................................................... 2
1.1 Scope ....................................................................................................... 2
1.2 Definition of Terms..................................................................................... 2
2 SERVER CONFIGURATION ............................................................................ 3
2.1 Supported Deployment Configurations.......................................................... 3
2.1.1 Single AD2008 Domain Controller ...........................................................3
2.1.2 Two Domain Controllers in Trust Relationship ...........................................3
2.2 The iPrism Active Directory Account ............................................................. 6
2.3 Client Active Directory Accounts .................................................................. 8
3 IPRISM CONFIGURATION........................................................................... 10
3.1 To set iPrism to use the Domain Controller as its NTP server ..........................13
4 CLIENT CONFIGURATION ........................................................................... 15
4.1 Important Notes .......................................................................................15
4.2 Windows Clients .......................................................................................15
4.2.1 Internet Explorer on Windows .............................................................. 17
4.2.2 Firefox on Windows ............................................................................. 21
4.3 Mac Clients ..............................................................................................22
4.3.1 Configuring the Mac ............................................................................ 22
4.3.2 Joining a Mac to Active Directory 2008 .................................................. 23
4.3.3 Safari on OS X.................................................................................... 25
4.3.4 Firefox on OS X .................................................................................. 25
5 KNOWN ISSUES ......................................................................................... 26
5.1 Kerberos Key Mismatch .............................................................................26
5.2 Other Issues ............................................................................................26
1.1 Scope
The information in this document is limited to the 6.300 version of iPrism, deployed in an
environment where the iPrism appliance is to be integrated with a Microsoft Windows®
Active Directory 2008 server.
Term/Acronym Description
AD2003 Microsoft Active Directory 2003
AD2008 Microsoft Active Directory 2008
DNS Domain Name System: The system by which Internet domain names
and addresses are tracked and regulated.
2. Verify that DNS Server has a status of Started. The administrator will need to
manually create a DNS A record for the iPrism if DNS is running on a server other
than the Domain Controller.
3. Ensure that the Time Skew (the time difference between the AD2008 server and any
client (PC or iPrism)) is less than 5 minutes. If there is a problem, the iPrism may be
unable to join the Active Directory domain and clients may not be able to
authenticate.
To verify that the account has not been modified, the settings on the Account tab can
be compared to the correct ones in the following screenshots. Substitute your iPrism
account name for iprism100h and your own domain for sbsw.m20domain.info.
4. Ensure that the Time Skew (the time difference between the AD2008 server and any
client (PC or iPrism)) is less than 5 minutes. If there is a problem, iPrism may be
unable to join the AD domain and clients may not be able to authenticate.
5. Click Advanced.
7. Review the other query setting fields. Important: Do not change the Search User
DN or Search User Password fields.
Note: Unless the AD Server has been set up with a server certificate, select None.
3.1 To set iPrism to use the Domain Controller as its NTP server
1. In the iPrism System Configuration tool, select the System section, then the
Preferences tab.
2. Check Use NTP and enter the Domain Controller’s address in the NTP Server field.
5. Verify that the iPrism has a valid A record listed in the DNS server used by the
clients. (Note: The required A record is for iPrism.)
6. If the DNS is not running on the Domain Controller, then a manual A record will need
to be created on the DNS Server. For instructions on how to do this, see the iPrism
Knowledgebase article “How do I setup a DNS A-record for iPrism?”, available at
www.stbernard.com/products/support/iprism/help/iprism.htm
Note: If the machine isn’t joined to the same domain, you will be prompted and
required to enter your credentials.
The Client must be logged in with a user account that exists on the same domain as the
iPrism.
Important:
Internet Explorer 6 does not support Kerberos in proxy mode (IE 6 only supports
Kerberos in bridge (transparent) mode), so ensure that at least version 7 of IE is
being used on any client machines that are going to proxy through iPrism.
Internet Explorer 7 cannot be used on Windows 2000 clients; customers who require
proxy support on Windows 2000 must use Firefox.
1
If you are using iPrism in proxy mode, you can specify either the proxy server’s fully qualified domain name
or its IP address here. However, if you are using iPrism in bridge (transparent) mode, you must use the fully
qualified domain name. IP address cannot be used.
3. Click Add.
2. Scroll down to the bottom of the list and ensure Automatic logon only in Intranet
zone is selected.
3. Set the value to the fully qualified domain name of the iPrism.
Mac clients must be configured and then joined to the same domain as the iPrism. To do
this, complete the following instructions.
3. Via System Preferences Sharing, set the Mac’s hostname to a reasonable value (a
valid DNS hostname of 15 characters or less).
4. Under Computer Name, click Edit… to edit the hostname. Leave the default suffix
.info (or .local) alone if it is there; it will be ignored.
4. Credentials must be provided in the newer [email protected] form. Once joined, you
will see the directory listed in the Directory Utility.
5. When logging into the Mac, ensure that you select a user account that exists on the
same domain as the iPrism.
2. Check the box if you want to add the password to your keychain.
Safari should connect. If you add your password to your keychain, you should not be
prompted again.
4.3.4 Firefox on OS X
For clients who are using Firefox as their browser:
3. Set the value to the fully qualified domain name of the iPrism.
Active Directory does not maintain keys that it has generated previously for clients, but
rather only the current key that will be given out; once generated, they are gone and
there is no way to get at them. Hence the general recommendation is to only ever touch
the user account being used for Kerberos from a single place (e.g., by using the ktpass
command).
There does not appear to be a way to force a client to get rid of its key. It will continue
using the "host" key no matter how many times login fails. It will, however, re-fetch the
"HTTP" key each time it tries to do a manual login, which is why even when Auto Login
fails, manual login still works.
The only way to ensure this doesn't happen is to educate users that they should
not, under any circumstances, change the password on the iPrism Active
Directory account.
If for some reason the password is changed, then rejoining the domain should fix it
going forward (since it will update the key to something that the iPrism will have in its
keytab).
However, any clients that have fetched the key in the meantime will be forced to
manually login until such time as they log out (and hence flush their Kerberos cache).
If you map a group before doing a Save & Exit and logging back into iPrism, the
group mapping will be saved but cannot be checked or used until after you have
completed a Save & Exit.
Note: Policy Mapping does not currently work for nested groups.
Regarding the Active Directory Local Policy Setting Deny access to this computer
from the network, this security setting determines which users are prevented from
accessing a computer over the network. This policy setting supersedes the Access
this computer from the network policy setting if a user account is subject to both
policies. As a result, if it is enabled with domain users, Internet access is unfiltered
when Auto-Login is used.
Corporate Office