Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

AD SSO operations

Hi, I’m struggling to find documentation about how Active Directory SSO operates (as opposed to how to set it up). The kind of questions I have are…

  • Is the initial browser authentication transparent, or does the captive portal appear for login?
  • Once the user is added to the firewall, will further browser authentications be transparent, or will the captive portal appear again?
  • Once a user is authenticated via the browser, does this apply to all firewall rules & logging or just browsing?
  • How long does the user remain authenticated against their IP address?
  • What happens when the user logs out?
  • Does it work over RDP?

That will do for starters Blush

Thanks



Added TAGs
[edited by: Erick Jan at 12:55 AM (GMT -7) on 22 Oct 2024]
Parents
  • AD SSO using Kerberos or NTLM is fairly common for our customers.
    Like a lot of configuration it can be complex when setting up, depending on your environment, but once working it is solid.
    Kerberos has more requirements to set up that NTLM but is worth it.
    AD SSO works better if you are doing HTTPS decryption, so that it can authenticate HTTPS requests in addition to HTTP.
    AD SSO works slightly better if you also use direct proxy rather than transparent. This is because the HTTP specification for authentication works slightly better for authenticating against proxies.
    AD SSO is not compatible with other authentications. You cannot use AD SSO for some things and Heartbeat or STAS for others.

    The SSO part (Single Sign On) means that if the computer is logged in with an AD user, that AD user is used to authenticate silently with the XG with no prompting. If the user is not from AD (local login) or for example is a phone then most browsers will follow the redirect to a captive portal page they can enter in username and password.

    Assuming AD SSO and not Captive Portal:

    When there is no user logged in to Windows (for example system things like Windows Update) the "user" that the computer sends may be the computername. This can cause problems depending on your configuration. I recommend that you have firewall rules that allow "computer users" to have limited access. Some customers seem to have more problems with computers as users than other customers.

    The authentication applies to all connections from that IP address, not just web browsing.

    The authentication is performed periodically (after four minutes since the last authentication, the next web request is authenticated). If a windows user logs off and someone else logs in (or Fast User Switching) it can take up to four minutes for the Sophos Firewall to see the change. If you are not doing HTTPS decryption then it is "the next HTTP request after four minutes" which for some customers might mean that it is 15+ minutes between the reauthentication sees the new user.

    Users are "logged off" automatically if there is no network activity in a certain timeframe. Do not change these settings (I regret that they are visible in the UI). In practical terms, if the computer disconnects from the wifi or go into sleep mode then it will be idle and the logoff will occur. Most computers stay logged in overnight.

    The user is logged on to an IP address. If you RDP into a remote computer and that computer logs in and does stuff, it is that remote computer's ip and user that is logged in.

    If you have multiple users on the same IP address (virtual desktops, citrix server) then you must use a mode called "Multi User Hosts". That will authenticate every web request and not associate the user with the IP. Non-web requests will never have a user.

  • Thanks for your helpful and detailed reply. It suggests that the flaw is not in Kerberos SSO but the documentation, which would be a shame for all those struggling with it. We have a straight forward environment, and I have followed the setup carefully, but can get nothing but the captive portal.

Reply Children
No Data