Solved

RSA across domains

Posted on 2012-03-19
4
280 Views
Last Modified: 2012-07-15
Hi,

One of our customers are looking to implement RSA across their network.  They have two domains (one for their office and one for their datacentre).  Users that have a datacentre account will have it named the same as their office account.

Obviously we'd prefer it if users only have one fob so I'm wondering how (if possible) we can go about this.

Thanks in advance
0
Comment
Question by:wanstor
  • 2
  • 2
4 Comments
 
LVL 62

Expert Comment

by:btan
ID: 37740780
Was thinking of web access gateway which take in username@domain as username and perform backend ldap and rsa check. It offload the check through such central portal login page. If this something you are interested, I can share more..
0
 
LVL 1

Accepted Solution

by:
wanstor earned 0 total points
ID: 37741491
Yes please do.  We have a VPN between the two sites and if required we can set up a one way trust if that makes any difference.

Thanks
0
 
LVL 62

Expert Comment

by:btan
ID: 37742936
Know of F5 access policy mgr which can act as the middle man to performs client side prelogin check and rsathen doa whilesever checks. Ldap, ad and kerberos login and rsa secureid is supported. There is their webtop that can present the authorised resource base on the visual workflow policy builder created. Scripts for customization is available. Importantly all userchecks usingis transparent to it and act as a guardian.

 http://www.f5.com/products/big-ip/access-policy-manager.html
0
 
LVL 1

Author Closing Comment

by:wanstor
ID: 38187121
Setting up a one way trust between the two domains seemed to have resolved the issue. Thanks All!
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question