Certificates on IAG 2007
1. Introduction
The use of Digital Certificates with IAG 2007 is essential for several IAG authentication and access scenarios as well as for providing encryption of sensitive data. There are two main scenarios when using certificates; it is common to have misunderstandings about which scenarios each type of certificates are used. The first article of this series will give you an overview of the different types and usages of each certificate when you are using IAG 2007.
2. When does IAG use Certificates?
The diagram below shows the various scenarios where IAG uses certificates for authentication and/or data encryption:
Figure 1 – IAG SSL Communication
This diagram shows the two parts of the communication when IAG 2007 is used to allow external access to internal resources. The main purpose here is to define which type of certificates are involved when each communication happening, therefore let’s see the following table:
Communication Channel |
Certificate Type |
Certificate Usability |
Where the Certificate is Installed |
Client to Server |
Client Authentication |
· Client authentication · Endpoint Detection |
Client workstation |
Server to Client |
Server Authentication |
· Regular Publishing Scenarios · Network Connector · IAG Portal |
IAG Server |
Server to Server |
Server Authentication |
· Encrypted connection to protocol transaction, such as LDAPs and HTTPs |
Application Server (Web Server) or in the Authenticator (Domain Controller for instance) |
3. Client Certificate Authentication with IAG
The previous table summarizes the scenarios where a certificate is used, but how really IAG authenticates the user when using client certificate? IAG certificate authentication works in four main phases:
1) Certificate is checked in IIS against CRL to make sure it is not revoked
2) Certificate validity is checked to make sure it’s not expired (cert.asp)
3) Two pieces of data are collected from the cert the “username” and the “email address” (cert.asp)
4) The directory service choose in the authentication repository is queried using the “username” and then if a match is found is that user is queried for the “email” parameter ([repositoryname].inc.) The email parameter retrieved from the directory is compared to the value retrieved from the certificate([trunkname]1validate.inc). If any of the 4 checks or subset of the checks fail or do not match the user is not authenticated.
It is important to remember that the IAG certificate authentication mechanisms are provided as samples. These samples are intended to be re-written or modified to match the requirements each particular customer has. Customer PKI schema vary so significantly customer to customer that it’s not possible to have a default configuration that knows how to deal with even most cases.
There were some cases where the DN used as the Certificate SubjectCN, in this case our sample would properly pick up that object and use it for authentication. However there are other cases the certificate does not contain DN or UPN but contains some other collection of objects we can use to write a custom ADSI query to AD to look up the user’s DN. The framework provided is very flexible and customizable and is designed to allow as many cases as possible.
4. What comes next?
This post gives you an overview of how IAG uses certificate and starts to introduce client certificate mechanism. The coming articles will cover:
· Certificate Authentication with and without Kerberos
· Implementing Client Certificate Authentication
· Understanding IAG’s “Certified Endpoint” feature
· Understanding Endpoint Detection of Client Certificates
Stay tuned.
Authors
Yuri Diogenes
Security Support Engineer – ISA/IAG Team
Microsoft – Texas
Dan Herzog
Security Support Engineer – IAG Team
Microsoft – Washington
Comments
- Anonymous
January 01, 2003
Hi all. First of all let me say that the articles in the blog are really useful. Regarding the use of certificates, what about if the username cannot be retrieved from the certificate?. Let's supose a situation where the CN in the certiticate doesn't contain the username or UPN or so. Is it possible to match the user with other attributes? I am currently working on an scenario where the user certificate is imported into Active Directory as user Name Mappings.Is it feasible to query the active directory using the attribute altsecurityidentities? If so, where is that attribute to be included? Maybe customizing the xml file of the repository definition? Thanks in advance