Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Integrated Windows Authentication

From Wikipedia, the free encyclopedia
Microsoft authentication protocols

Integrated Windows Authentication (IWA)[1]is a term associated withMicrosoft products that refers to theSPNEGO,Kerberos, andNTLMSSP authentication protocols with respect toSSPI functionality introduced with MicrosoftWindows 2000 and included with laterWindows NT-based operating systems. The term is used more commonly for the automatically authenticated connections between MicrosoftInternet Information Services,Internet Explorer, and otherActive Directory aware applications.

IWA is also known by several names likeHTTP Negotiate authentication,NT Authentication,[2]NTLM Authentication,[3]Domain authentication,[4]Windows Integrated Authentication,[5]Windows NT Challenge/Response authentication,[6] or simplyWindows Authentication.

Overview

[edit]
Further information:SPNEGO,Kerberos (protocol),NTLMSSP,NTLM,SSPI, andGSSAPI

Integrated Windows Authentication uses the security features of Windows clients and servers. UnlikeBasic Authentication orDigest Authentication, initially, it does not prompt users for a user name and password. The current Windows user information on the client computer is supplied by the web browser through a cryptographic exchange involving hashing with the Web server. If the authentication exchange initially fails to identify the user, the web browser will prompt the user for a Windows user account user name and password.

Integrated Windows Authentication itself is not a standard or an authentication protocol. When IWA is selected as an option of a program (e.g. within theDirectory Security tab of theIIS site properties dialog)[7] this implies that underlying security mechanisms should be used in a preferential order. If theKerberos provider is functional and aKerberos ticket can be obtained for the target, and any associated settings permit Kerberos authentication to occur (e.g. Intranet sites settings inInternet Explorer), the Kerberos 5 protocol will be attempted. OtherwiseNTLMSSP authentication is attempted. Similarly, if Kerberos authentication is attempted, yet it fails, then NTLMSSP is attempted. IWA usesSPNEGO to allow initiators and acceptors to negotiate either Kerberos or NTLMSSP. Third party utilities have extended the Integrated Windows Authentication paradigm to UNIX, Linux and Mac systems.

Supported web browsers

[edit]

Integrated Windows Authentication works with most modern web browsers,[8] but does not work over some HTTPproxy servers.[7] Therefore, it is best for use inintranets where all the clients are within a singledomain. It may work with other web browsers if they have been configured to pass the user's logon credentials to the server that is requesting authentication. Where a proxy itself requires NTLM authentication, some applications like Java may not work because the protocol is not described in RFC-2069 for proxy authentication.

  • Internet Explorer 2 and later versions.[7]
  • InMozilla Firefox on Windows operating systems, the names of the domains/websites to which the authentication is to be passed can be entered (comma delimited for multiple domains) for the "network.negotiate-auth.trusted-uris" (for Kerberos) or in the "network.automatic-ntlm-auth.trusted-uris" (NTLM) Preference Name on theabout:config page.[9] On the Macintosh operating systems this works if you have a kerberos ticket (use negotiate). Some websites may also require configuring the "network.negotiate-auth.delegation-uris".
  • Opera 9.01 and later versions can use NTLM/Negotiate, but will use Basic or Digest authentication if that is offered by the server.
  • Google Chrome works as of 8.0.
  • Safari works, once you have a Kerberos ticket.
  • Microsoft Edge 77 and later.[10]

Supported mobile browsers

[edit]

iOS natively supports Kerberos viaKerberos Single Sign-on extension. Configuring the extension enables Safari and Edge to use Kerberos.

Android hasSPNEGO support in Chrome which is adding Kerberos support with a solution likeHypergate Authenticator.

See also

[edit]
  • SSPI (Security Support Provider Interface)
  • NTLM (NT Lan Manager)
  • SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism)
    • GSSAPI (Generic Security Services Application Program Interface)

References

[edit]
  1. ^"Microsoft Security Advisory (974926) - Credential Relaying Attacks on Integrated Windows Authentication". Microsoft Security TechCenter. 2009-12-08.Archived from the original on 2013-06-19. Retrieved2012-11-16.This advisory addresses [...] Integrated Windows Authentication (IWA) [...]
  2. ^"Q147706: How to disable LM authentication on Windows NT". Microsoft Support. 2006-09-16.Archived from the original on 2012-11-17. Retrieved2012-11-16.[...] Windows NT supported two kinds of challenge/response authentication: [...] LanManager (LM) challenge/response [...] Windows NT challenge/response (also known as NTLM challenge/response) [...] LM authentication is not as strong as Windows NT authentication [...]
  3. ^"IIS Authentication". Microsoft MSDN Library.Archived from the original on 2012-11-28. Retrieved2012-11-16.Integrated Windows authentication (formerly known as NTLM authentication [...]) [...]
  4. ^"NTLM Overview". Microsoft TechNet. 2012-02-29.Archived from the original on 2012-10-31. Retrieved2012-11-16.When the NTLM protocol is used, a resource server must [...] Contact a domain authentication service
  5. ^"MSKB258063: Internet Explorer May Prompt You for a Password". Microsoft Corporation.Archived from the original on 2012-10-21. Retrieved2012-11-16.Windows Integrated authentication, Windows NT Challenge/Response (NTCR), and Windows NT LAN Manager (NTLM) are the same and are used synonymously throughout this article.
  6. ^"IIS Authentication". Microsoft MSDN Library.Archived from the original on 2012-11-28. Retrieved2012-11-16.Integrated Windows authentication (formerly known as [...] Windows NT Challenge/Response authentication) [...]
  7. ^abcMicrosoft Corporation."Integrated Windows Authentication (IIS 6.0)".IIS 6.0 Technical Reference.Archived from the original on 2009-08-23. Retrieved2009-08-30.
  8. ^"Integrated Windows Authentication - Gino Pipeline - SLAC Confluence".
  9. ^"About:config entries".MozillaZine. 27 January 2012.Archived from the original on 2012-03-04. Retrieved2012-03-02.
  10. ^"Microsoft Edge identity support and configuration".Microsoft. 2020-07-15. Retrieved2020-09-09.

External links

[edit]
Versions
Main
Other
Overview
Technologies
Software and engines
Implementations
Events
People
Management
tools
Apps
Shell
Services
File systems
Server
Architecture
Security
Compatibility
API
Games
Discontinued
Games
Apps
Others
Spun off to
Microsoft Store
Retrieved from "https://en.wikipedia.org/w/index.php?title=Integrated_Windows_Authentication&oldid=1225787791"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp