?
Solved

Server credentials for AD when in DMZ

Posted on 2013-01-16
4
Medium Priority
?
440 Views
Last Modified: 2013-02-03
I have a server that connects to a domain. The server is being moved to the DMZ for security. I am wondering what happens my logon information. I can logon to the server after its moved to the dmz using the AD username and password due to the credentials being cached on the box but what happens as far as password expiry. Will the password expiry kick in or will it always remain with the same username and password. I am wondering what other people do in this scenario. Is it all local logons and removal from the domain? Thanks
0
Comment
Question by:Sid_F
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 19

Expert Comment

by:Miguel Angel Perez Muñoz
ID: 38782107
Try to remove domain credentials needs using local accounts.
In case this not be possible consider one of this options:

- Placing a RO domain controller to validate users on DMZ
- Using ISA server to reverse proxy and validate users
- Permit only to this machine on DMZ communicate to your DC´s
- Set-up exclusive domain to this computer.
0
 
LVL 6

Author Comment

by:Sid_F
ID: 38782995
The options are not probably not an option for me. I am really querying around the cached credentials and will they expire
0
 
LVL 6

Accepted Solution

by:
Sid_F earned 0 total points
ID: 38783033
From this MVP it seems cached credentials never expire. http://www.networksteve.com/forum/topic.php?TopicId=20926
0
 
LVL 6

Author Closing Comment

by:Sid_F
ID: 38848315
resolved
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question