Symantec Access Management

 View Only
  • 1.  SM_USER - Kerberos vs NTLM values differences?

    Posted Jan 25, 2018 10:52 AM

    We have 12.52 SP1 here. We also have some applications that use Kerberos and others that use NTLM for authentication... What we have noticed is that when a user initially "logs into a Kerberos application" in Siteminder, the sm_user value is in a userPrincipalName format. When a user initially "logs into a NTLM" application", the sm_user value is that of "<Domain>\<UserID>".

     

    The problem we are seeing is that if a user logs into a Kerberos app, then tries to switch over to an NTLM app (both protected by Siteminder), the NTLM app sees the userPrincipalName value when it's expecting the "<Domain>\<UserID> format and that causes problems for the NTLM application.

     

    Is there anyway to force a re-authentication to reset the SM_USER value when a user switches between a Kerberos application and a NTLM application? Or is there a better way to handle the situation? I believe a couple Kerberos apps are configured to set a persistent cookie which also may add a complication.

     

    How would be the best way to handle this sort of issue?

     

    Thanks in advance!



  • 2.  Re: SM_USER - Kerberos vs NTLM values differences?

    Posted Jan 25, 2018 04:21 PM

    One added piece... I was recently informed that this could be resolved by purchasing the SmOverrideAuth module. Is there really no other way to handle other than purchasing a module?

     

    Thanks.



  • 3.  Re: SM_USER - Kerberos vs NTLM values differences?

    Posted Jan 25, 2018 04:32 PM

    CA Services has an offering in this area entitled "Override Authentication Login for CA Single Sign-On". I have listed an overview of its functionality below. If you have interest please reach out to your CA Account representative to setup a proof of concept or to obtain a quotation for the packaged work product.

     

    Override Authentication Login for CA Single Sign-On

     

    What It Does

    Many times, customers first implement CA Single Sign-On using simple, user name and password-based authentication schemes. In their initial implementations, it is also common for customers to make use of the SM_USER header variable to identify users to their web applications.

    As they expand their site, customers may identify new requirements for authentication, such as the need for NTLM authentication or more secure authentication schemes like Certificate Based Authentication. Implementing these schemes poses a problem because the CA Single Sign-On Certificate Authentication scheme does not provide a value for SM_USER, and NTLM changes the format of SM_USER to domain\loginID. This causes web applications or other backend applications to fail because they are not getting the type of user loginID expected.

    Override Authentication for CA Single Sign-On solves this problem by providing a mechanism to automatically and securely re-authenticate users with a configurable loginID value which gets set as the value of SM_USER.

     

    Benefits That Deliver Value

    Override Authentication for CA Single Sign-On allows customer to make use of new authentication mechanisms that don’t populate SM_USER in the standard way without having to modify applications that rely on the SM_USER value.

     

    How It Works

    A sample use case would be:

    • User 1 logs into a web site using an X.509 certificate.
    • CA Single Sign-On authenticates User 1 based on the certificate. CA Single Sign-On opens a session for User 1 and creates a cookie, which contains user DN and timeout values, as well as a unique session id. The SM_USER header variable contains no value.
    • A configured active response redirects the user’s browser to a special resource protected by the Override Authentication Scheme. The active response obtains a loginID value from a configured attribute of the user’s profile and provides it as the user’s new LoginID value.
    • An active response tied to the special resource generates an encrypted token to act as the user’s password during the following re-authentication process.
    • The Override Authentication scheme re-authenticates the user, using the new LoginID and encrypted token as credentials, creating a new cookie which contains the user’s new LoginID, user DN and timeout values, as well as a new session id.
    • The user’s browser is redirected to the original resource requested by the user. This and all subsequent resources will have the SM_USER header variable delivered to them containing the value of the new LoginID.

    Technical Prerequisites

    A list of technical prerequisites for this packaged work product can be found at CA Support online. This is a central repository that will help you identify CA Technologies product compatibility with operating systems, other third-party software products, as well as with certification standards and regulations. Contact your CA Services representative for further assistance with purchasing this component.   



  • 4.  Re: SM_USER - Kerberos vs NTLM values differences?
    Best Answer

    Posted Feb 01, 2018 03:18 PM

    If you want to permanently change the value of the login ID that is stored in the SiteMinder SMSESSION cookie, then SmOverrideAuth ("Override Authentication Login for CA Single Sign-On" ) is the way to go. If you are OK with setting up responses for every app that needs the user's loginID then you can override SM_USER with a response, or better yet create a response with a different header variable name and modify your apps to use your custom header variable name. With any of these three approaches you get to choose any user attribute value as the "LoginID" value.