You are viewing limited content. For full access, please sign in.

Question

Question

Sign In with Web Client with Windows Credentials in a DMZ?

asked on November 15, 2019

We are trying to get users to be able to authenticate by typing in their domain credentials to a Web Client instance hosted in the DMZ. The DMZ server is not in the domain.

We are using a test account that is able to sign into the repository with its domain\username and password credentials from within the domain, both in the desktop client and the web client. The user can also sign into the internal Web Access server with their domain\username and password. We have tried setting the DMZ Web Access instance to authenticate with "Prompt for Laserfiche Credentials" and with "Prompt for Windows Domain Credentials". Laserfiche and Windows accounts are both allowed.

The following ports are open: 80, 443, 5048, 5049, 5051, 8085, 8161, 8168, 8188, 8268, 8732, 8736.

The firewall is rejecting packets from port 88 (Kerberos) and port 636 (LDAP). Neither of these ports are listed in the Default Network Ports whitepaper.

We should not need Kerberos to log in by typing the domain\username and password, only for SSO, according to page 4 of this whitepaper:

https://support.laserfiche.com/resources/3899/configuring-kerberos-for-laserfiche-10-web-products-in-a-windows-server-2016-and-iis-10-environment

I'm sure there is a simple setting or configuration that I'm overlooking but I couldn't find much information on how Web Access authenticates with LF Server from soup to nuts.

0 0

Answer

SELECTED ANSWER
replied on November 15, 2019

The credentials the user enters need to be valid on the web client machine. Since the server in the DMZ is not attached to the domain, this will not work. This thread has more details.

3 0

Replies

You are not allowed to reply in this post.
You are not allowed to follow up in this post.

Sign in to reply to this post.