Authentication configuration page
Last updated
Last updated
The Access Manager web service allows you to choose one of several types of authentication providers. It is recommended to use modern authentication using a mechanism such as OpenID Connect, where an identity provider can provider high assurance authentication utilizing passwordless or multifactor authentication.
Access Manager supports modern identity providers such as Azure AD and Okta out of the box.
OpenID Connect is the preferred authentication provider. Coupled with a modern IDP like Azure AD or Okta, you can provide strong authentication to your application, backed up by multifactor authentication. See the guides for setting up Access Manager to work with Azure AD or Okta.
Using OpenID Connect requires that your identity provider pass a upn
claim containing the on-premises Active Directory UPN of your users.
When users click the logout button, you can choose for them to be logged out of the application, or have Access Manager request that the user be signed out of the IDP (where supported by the IDP).
WS-Federation can be used to delegate the authentication process to an on-premises ADFS or similar product. Read the setup guide for configuring Access Manager to work with ADFS.
Using WS-Federation requires that your identity provider pass a upn
claim containing the on-premises Active Directory UPN of your users.
Certificate-based authentication is provided by Access Manager, with the optional support for requiring smart-card authentication.
In line with the certificate-based authentication changes announced by Microsoft in KB5014754, Access Manager by default now only accepts certificates containing the user's SID in OID 1.3.6.1.4.1.311.25.2
.
If you are using older-style certificates, you need to enable weak identity bindings
and enable UPN mapping.
Limited support is available for use of altSecurityIdentities in cases where certificates are used without a UPN, however these are not supported outside the forest where AMS is located. Read the guide for setting up smart card authentication to learn more.
Enabling this setting requires that user's certificate must contain the Smart Card Logon
EKU.
Specify any custom EKUs that must be present in the certificate for the authentication to be successful.
You must select how you want to validate the certificate issuer. Note that no matter which validation option is selected, at a minimum all certificates must be validated up to a trusted CA on the machine that runs AMS.
Active Directory Enterprise CAs are automatically registered in the directory itself as trusted issuers. CAs in the Enterprise NTAuth
store are trusted to issue logon certificates within the domain. If you select this option, then only certificates issued by one of these CAs are trusted. (Recommended options for smart card certificates)
This option allows you to import a specific certificate authority's certificate that must be present in the certificate chain for it to be accepted. This can be a subordinate CA, rather than a root certificate. You can add multiple trusted issuers to this list, but only one of them needs to be present in the client's certificate chain.
In certain scenarios - such as Access Manager running behind a TLS-terminating load balancer - certificate authentication may not work out of the box. Because the TLS connection is re-encrypted before it reaches Access Manager, the client certificate is not passed along to the server.
However, some load balancers or reverse proxies include a feature called Certificate Forwarding, where the load balancer validates the certificate, and passes the user's public key along as a header to the backend server (in this case, Access Manager).
This option allows you to specifiy a header which Access Manager will use to extract user certificates from for authentication.
It is important to note that, unless properly secured, any user may send this header to the Access Manager server - allowing impersonation. Therefore, Access Manager requires that you specify particular load balancers or proxies you expect to be using this feature. By default, even when enabled, Access Manager will reject all certificate headers unless the allowlists are populated.
The Integrated Windows Authentication (IWA) provider allows users to log in with NTLM or Kerberos authentication. In order to use Kerberos, the website host name must be registered on the SPN of the computer object (not the service account). For example, when using a hostname of accessmanager.lithnet.io
, you'll need to register the SPN http/accessmanager.lithnet.io
or host/accessmanager.lithnet.io
. If the host name matches the AD computer name, then no additional SPNs are required.
Select one of the following authentication options
Basic: Uses basic authentication (username/password) - Not recommended
NTLM: Use NTLM authentication only
Negotiate: Use Kerberos if possible, otherwise fall back to NTLM
Specify the users and groups that should be allowed to log into this service, or leave the field blank to allow anyone who successfully authenticates to log in
Add any users and groups that should be denied login to this service. Users in this group will not be able to log in even if they are in the Authorization users and groups
list.