Active Directory™ (AD) is a distributed directory service that is a repository for user information. The NIOS appliance can authenticate admin accounts by verifying user names and passwords against Active Directory. In addition, the NIOS appliance queries the AD domain controller for the group membership information of the admin. The appliance matches the group names from the domain controller with the admin groups on its local database. It then authorizes services and grants the admin privileges, based upon the matching admin group on the appliance.
Figure 4.6 illustrates the Active Directory authentication process.
Figure 4.6 Authentication Using a Domain Controller
Administrator NIOS Appliance Domain Controller
1 A user makes an HTTPS connection to the NIOS appliance and sends an account name and password.
- The appliance checks the authentication policy to determine which authentication service to use. The authentication policy
specifies an AD authentication service.
- The appliance sends an authentication request to the first domain controller in the AD server group. The appliance also
requests the group membership information of the admin.
4aThe appliance lets the user log in and applies the authorization profile.
The appliance grants all permissions specific to the administrator based on the group membership sent from the domain controller associated with the admin account. If there is no group membership information for the admin, the default group is assigned (if configured).
Authentication is successful. The domain controller successfully authenticates the admin user. The group membership information for the administrator is sent to the appliance. The first group in the list that matches the groups returned by the domain controller is assigned to the admin, along with the associated permissions after that admin logs in.
The appliance does not allow the user to log in.
4b Authentication is unsuccessful. The domain controller sends back a deny
access result to the appliance. No group membership information is sent.
To configure NIOS to authenticate administrators using Active Directory domain controller groups, you must first configure user accounts on the domain controller. Then, on the NIOS appliance, do the following:
-
- Configure one or more AD authentication server group on the appliance and add AD domain controllers to the group. For information about configuring an AD authentication service group for admins, see Configuring an Active Directory Authentication Service Group .
NIOS 8.1NIOS Administrator Guide (Rev. A)219
Managing Administrators
-
- If you configured admin groups on the AD controller, you must create those same groups on the NIOS appliance and specify their privileges and settings. Note that the admin group names must match those on the AD domain controller. You can specify a default group as well. The NIOS appliance assigns admins to the default group if none of the admin groups on the NIOS appliance match the admin groups on the AD domain controller or if there are no other admin groups configured. For information about configuring group permissions and privileges, see About Admin Groups 0.
- Add the newly configured Active Directory service to the list of authentication services in the admin policy, and add the admin group names as well. See Defining the Authentication Policy for more information about configuring an admin policy.
Configuring an Active Directory Authentication Service Group
You can add multiple domain controllers to an AD authentication server group for redundancy. The NIOS appliance tries to connect with the first domain controller on the list. If it is unable to connect, it tries the next domain controller on the list, and so on.
To configure an Active Directory authentication server group on the NIOS appliance:
- From the Administration tab, click the Authentication Server Groups tab.
- Click the Active Directory Services subtab and click the Add icon.
- In the Add Active Directory Authentication Service wizard, complete the following:
- Name: Enter a name for the service.
- Active Directory Domain: Enter the AD domain name.
- Domain Controllers: Click the Add icon and complete the following to add an AD domain controller:
- Server Name or IP Address: Enter the FQDN or the IP address of the AD server that is used for authentication.
- Comment: Enter additional information about the AD server.
- Authentication Port: Enter the port number on the domain controller to which the appliance sends authentication requests. The default is 389.
- Encryption: Select SSL from the drop-down list to transmit through an SSL (Secure Sockets Layer) tunnel. When you select SSL, the appliance automatically updates the authentication port to 636. Infoblox strongly recommends that you select this option to ensure the security of all communications between the NIOS appliance and the AD server. If you select this option, you must upload a CA certificate from the AD server. Click CA Certificates to upload the certificate. In the CA Certificates dialog box, click the Add icon, and then navigate to the certificate to upload it.
- Connect through Management Interface: Select this so that the NIOS appliance uses the MGMT port for administrator authentication communications with just this AD server.
- Disable server: Select this to disable an AD server if, for example, the connection to the server is down and you want to stop the NIOS appliance from trying to connect to this server.
- Click Test to test the configuration. If the NIOS appliance connects to the domain controller using the configuration you entered, it displays a message confirming the configuration is valid. If it is unable to connect to the server, the appliance displays a message indicating an error in the configuration.
- Click Add to add the domain controller to the group.
When you add multiple domain controllers, the appliance lists the servers in the order you added them. This list also determines the order in which the NIOS appliance attempts to contact a domain controller. You can move a server up or down the list by selecting it and clicking the up or down arrow.
You can also delete a domain controller by selecting it and clicking the Delete icon.
-
- Timeout(s): The number of seconds that the NIOS appliance waits for a response from the specified authentication server. The default is 5.
- Comment: Enter additional information about the service.
- Disable: Select this to retain an inactive AD authentication service profile.
- Save the configuration and click Restart if it appears at the top of the screen.
220NIOS Administrator Guide (Rev. A)NIOS 8.1
Authenticating Admin Accounts Using TACACS+
Enabling Active Directory Authentication for Nested Groups
Windows servers support nesting groups in which you can add a group of admin users as a member of another group. Nested groups consolidate admin accounts and help reduce the number of permissions required for individual users or groups. In NIOS, you can enable nested group query so the appliance can recursively look up and use AD authentication service to authenticate members or admin accounts that are part of a nested group. When an admin belongs to multiple paths of hierarchy, you can enable nested group query in order to apply AD authentication service hierarchically in a parent-child structure. This enables the NIOS appliance to apply AD authentication service to all the groups of which an admin is a member. For example, if User 1 is a member of nested Group C, and Group C is a member of Group B, and Group B is a member of Group A, then the authentication service is applicable to all the groups of which User 1 is a member. In this example, the appliance performs a recursive lookup in Group C, Group B, and Group A while authenticating User 1.
To enable AD authentication for nested groups on the NIOS appliance:
- From the Administration tab, click the Authentication Server Groups tab.
- Click the Active Directory Services subtab and click the Add icon.
- In the Add Active Directory Authentication Service wizard, complete the following:
— Nested Group Query: This check box is deselected by default, meaning the nested group query is disabled. When nested group query is disabled, AD authentication service is applied to only one group of which the AD admin is a member. When you select this check box, AD authentication service is applied to all the nested groups of which an AD admin is a member. This setting is applicable to all the AD servers configured for the Active Directory authentication service.
- Save the configuration.