?
Solved

Server credentials for AD when in DMZ

Posted on 2013-01-16
4
Medium Priority
?
444 Views
Last Modified: 2013-02-03
I have a server that connects to a domain. The server is being moved to the DMZ for security. I am wondering what happens my logon information. I can logon to the server after its moved to the dmz using the AD username and password due to the credentials being cached on the box but what happens as far as password expiry. Will the password expiry kick in or will it always remain with the same username and password. I am wondering what other people do in this scenario. Is it all local logons and removal from the domain? Thanks
0
Comment
Question by:Sid_F
  • 3
4 Comments
 
LVL 19

Expert Comment

by:Miguel Angel Perez Muñoz
ID: 38782107
Try to remove domain credentials needs using local accounts.
In case this not be possible consider one of this options:

- Placing a RO domain controller to validate users on DMZ
- Using ISA server to reverse proxy and validate users
- Permit only to this machine on DMZ communicate to your DC´s
- Set-up exclusive domain to this computer.
0
 
LVL 6

Author Comment

by:Sid_F
ID: 38782995
The options are not probably not an option for me. I am really querying around the cached credentials and will they expire
0
 
LVL 6

Accepted Solution

by:
Sid_F earned 0 total points
ID: 38783033
From this MVP it seems cached credentials never expire. http://www.networksteve.com/forum/topic.php?TopicId=20926
0
 
LVL 6

Author Closing Comment

by:Sid_F
ID: 38848315
resolved
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question