Solved

Server credentials for AD when in DMZ

Posted on 2013-01-16
4
433 Views
Last Modified: 2013-02-03
I have a server that connects to a domain. The server is being moved to the DMZ for security. I am wondering what happens my logon information. I can logon to the server after its moved to the dmz using the AD username and password due to the credentials being cached on the box but what happens as far as password expiry. Will the password expiry kick in or will it always remain with the same username and password. I am wondering what other people do in this scenario. Is it all local logons and removal from the domain? Thanks
0
Comment
Question by:Sid_F
  • 3
4 Comments
 
LVL 19

Expert Comment

by:Miguel Angel Perez Muñoz
ID: 38782107
Try to remove domain credentials needs using local accounts.
In case this not be possible consider one of this options:

- Placing a RO domain controller to validate users on DMZ
- Using ISA server to reverse proxy and validate users
- Permit only to this machine on DMZ communicate to your DC´s
- Set-up exclusive domain to this computer.
0
 
LVL 6

Author Comment

by:Sid_F
ID: 38782995
The options are not probably not an option for me. I am really querying around the cached credentials and will they expire
0
 
LVL 6

Accepted Solution

by:
Sid_F earned 0 total points
ID: 38783033
From this MVP it seems cached credentials never expire. http://www.networksteve.com/forum/topic.php?TopicId=20926
0
 
LVL 6

Author Closing Comment

by:Sid_F
ID: 38848315
resolved
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 10 4 70
Upgrading from SBS2003 to Windows Server 2012r2 Essentials 13 58
sccm importing drivers 4 43
How to Create Separate Guest WiFi VLAN on Netgear R8000 19 87
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question