Identity sources have different security and deployment considerations. Depending on your organization requirements, you can choose to set them separately, or as combinations that supplement each other.
This section presents some examples of how to choose identity sources for different organizational requirements.
Requirement |
Recommended Identity Source |
---|---|
Logging and auditing with basic enforcement |
AD Query. |
Logging and auditing only |
AD Query. |
Application Control |
AD Query and Browser-Based Authentication. The AD Query finds all AD users and computers. The Browser-Based Authentication identity source is necessary to include all non-Windows users. It also serves as a fallback option, if AD Query cannot identify a user. If you configure Transparent Kerberos Authentication, then the browser attempts to authenticate users transparently by getting identity information before the Captive Portal username/password page is shown to the user. |
Data Center, or internal server protection |
The options are:
|
Terminal Servers and Citrix environments |
Terminal Servers. Requires you to install the Terminal Servers Endpoint Identity Agent on each Terminal Server. |
Users that access the organization through VPN |
Remote Access. Lets you identify Mobile Access and IPsec VPN clients that work in Office Mode. |
Environment that use a RADIUS server for authentication |
RADIUS Accounting. Make sure that you configure the Security Gateway as a RADIUS Accounting client and give it access permissions and a shared secret. |
Create a separate LDAP Account Unit for each domain in the forest (subdomain). You cannot add domain controllers from two different subdomains into the same LDAP Account Unit.
You can use the Identity Awareness Configuration Wizard to define one subdomain. This automatically creates an LDAP Account Unit that you can easily configure for more settings. You must manually create all other domains that you want Identity Awareness to relate to, from Servers and OPSEC in the Objects tree > Servers > New > LDAP Account Unit.
When you create an LDAP Account Unit for each domain in the forest:
For example, if the domain is ACME.COM
, the subdomain is SUB.ACME.COM
, and the administrator is John_Doe
:
If the admin is a Domain administrator, Username is: SUB.ACME.COM\John_Doe
If the admin is an Enterprise administrator, Username is: ACME.COM\John_Doe
Note - In the wizard, this is the Username field. In the LDAP Account Unit, go to LDAP Server Properties tab > Add > Username.
DC=DOMAIN_NAME,DC=DOMAIN_SUFFIX
DC=SUB_DOMAIN_NAME,DC=DOMAIN_NAME,DC=DOMAIN_SUFFIX
DC=ACME,DC=local
to DC=SUB,DC=ACME,DC=local
An organization Active Directory can have several sites, where each site has its own domain controllers that are protected by a Security Gateway. When all of the domain controllers belong to the same Active Directory, one LDAP Account Unit is created in SmartDashboard.
When AD Query is enabled on Security Gateways, you may want to configure each Security Gateway to communicate with only some of the domain controllers.
This is configured in the User Directory page of the Gateway Properties. For each domain controller that is to be ignored, the default priority of the Account Unit must be set to a value higher than 1000.
For example, let say that the LDAP Account Unit ad.mycompany.com has 5 domain controllers.
On the Security Gateway we want to enable AD Query only for domain controllers dc2 and dc3. This means that all other domain controllers must be set to a priority higher than 1000 in the Security Gateway properties.
To specify domain controllers for each Security Gateway:
You can make sure that the domain controllers are set properly by using the adlog CLI. You can see the domain controllers that the Security Gateway is set to communicate with as well as the domain controllers it ignores.
The CLI command is: adlog a dc
AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive. Security Event Logs are not generated when a user logs out because Active Directory cannot detect this action.
When you work with AD Query, it is important that you understand and comply with these limitations:
You can configure AD Query to allow only one active account per IP address. When user A logs out before the timeout and user B logs in, the user A session closes automatically and his permissions are canceled. User B is the only active user account and only his permissions are valid. This feature is called Single User Assumption.
Before you activate Single User Assumption, you must exclude all service accounts used by user computers.
Note - Another way to keep these issues to a minimum is to increase the DHCP lease time. |
To activate single user assumption:
To deactivate Single User Assumption, clear Assume that only one user is connected per computer.
You can manually exclude service accounts, users, computers and networks from the AD Query scan. You can also configure AD Query to automatically detect and exclude suspected service accounts. Identity Awareness identifies service accounts as user accounts that are logged in to more than a specified number of computers at the same time.
To exclude objects from Active Directory queries:
regexp:<regular expression>
.When automatic exclusion is enabled, Identity Awareness looks for suspected service accounts every 10 minutes. Suspected service accounts are saved to a persistent database that survives reboot. When a new service account is detected, a message shows in SmartView Tracker.
Use these commands to see and manage the suspected service account database:
To show all suspected service accounts, run: adlog a control srv_accounts show
To run the service accounts scan immediately, run: adlog a control srv_accounts find
This command is useful before you enable the Assume that only one user is connected option.
To remove an account from the service account database, run: adlog a control srv_accounts unmark
<account name>
To remove all accounts from the suspected service account database, run: adlog a control srv_accounts clear
Important - When you use the |
this release supports NTLMv2 for AD Query. Earlier releases only supported NTLM. By default, NTLMv2 support is disabled.
To enable NTLMv2 support for AD Query:
adlogconfig a
Use NTLMv2
Exit and save
In environments that use many Security Gateways and AD Query, we recommend that you set only one Security Gateway to acquire identities from a given Active Directory domain controller for each physical site. If more than one Security Gateway gets identities from the same AD server, the AD server can become overloaded with WMI queries.
Set these options on the Identity Awareness > Identity Sharing page of the Security Gateway object:
The Deployment Scenarios section has more details.
To support non-English user names on a Security Gateway enabled with Identity Awareness, you must set a parameter in the LDAP Account Unit object in SmartDashboard.
It is not necessary to set this parameter when you enable Identity Awareness on the Security Management Server or Log Server.
To set non-English language support:
Bandwidth between the Log server and Active Directory Domain Controllers
The amount of data transferred between the Log server and domain controllers depends on the amount of events generated. The generated events include event logs and authentication events. The amounts vary according to the applications running in the network. Programs that have many authentication requests result in a larger amount of logs. The observed bandwidth range varies between 0.1 to 0.25 Mbps per each 1000 users.
CPU Impact
When using AD Query, the impact on the domain controller CPU is less than 3%.
Identity Awareness supports the use of LDAP nested groups. When a group is nested in another group, users in the nested group are identified as part of the parent group. For example, if you make Group_B a member of Group_A, Group_B members will be identified by Identity Awareness as being part of Group A.
The default nesting depth is configured to 20. This feature is enabled by default. For details on working with nested groups, see sk66561.
If you experience connectivity problems between your domain controllers and Identity Awareness Gateway/Log Servers, perform the following troubleshooting steps:
To use the Microsoft wbemtest utility to verify that WMI is functional and accessible.
wbemtest.exe
in the Run window.\\<IP address>\root\cimv2
If the connection fails, or you get an error message, check for these conditions:
To verify your domain administrator credentials:
\\<domain controller IP>\c$
in the Run window. For example: \\11.22.33.44\c$.
To verify if the WMI service is running on the domain controller:
services.msc
in the Run window.If it did not start, right-click this service and select Start.
If a Security Gateway is located between the Security Gateway with Identity Awareness/log server and the Active Directory controller, configure the Firewall to allow WMI traffic.
To create Firewall rules for WMI traffic:
Note - If there are connectivity issues on DCE RPC traffic after this policy is installed, see sk37453 for a solution.
If you have checked connectivity but still do not see identity information in logs, make sure that the necessary event logs are being recorded to the Security Event Log.
AD Query reads these events from the Security Event log:
Make sure you see the applicable events in the Event Viewer on the domain controller (My computer > Manage > Event Viewer > Security).
If the domain controller does not generate these events (by default they are generated), refer to Microsoft Active Directory documentation for instructions on how to configure these events.
If you have configured Identity Awareness for a log server, but do not see identities in logs, make sure you installed the database.
To install the database:
The Install Database window appears.
The Install Database script shows.