Avatar of llarava
llarava
Flag for Afghanistan asked on

Looking for ways-to-integrate in premise ad-with-saas-apps

Hello,

We are looking for ways to integrate our local AD with a saas application (Zixs). This is a mail filter solution that will be used to filter inbound/outbound mail flow. The users will have a site that they will use to authenticate to release their spam. We want them to use their AD user and password to authenticate to the site and get to their spam. The vendor mentioned they support LDAP and secure LDAP but I am not sure what my options are to get this integration done.

We use on premise AD running on windows 2012 DCs.

Thank you!
Cloud ServicesActive DirectoryAzure

Avatar of undefined
Last Comment
llarava

8/22/2022 - Mon
Shaun Vermaak

You can use an external site and connect your local DS to AD Azure or deploy an AD FS server on-premise

You can alternatively use an internal site (which you can publish externally with something like WAP) and change authentication method of the site to LDAP similarily to My Free/Open-Source Self-Service Password Reset tool for Active Directory (Look at the web.config)
https://www.experts-exchange.com/articles/31477/Free-Open-Source-Self-Service-Password-Reset-tool-for-Active-Directory.html
llarava

ASKER
I am looking for a way to avoid Azure. I would like to use secure ldap and read only DC in the DMZ. Anyone has done this setup before?
llarava

ASKER
The customer would like to leverage their existing DMZ and infrastructure.
All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
William Peck
Shaun Vermaak

I am looking for a way to avoid Azure.
Second part of my comment is not Azure

I would like to use secure ldap and read only DC in the DMZ
Like published externally? Don't do that
llarava

ASKER
Sorry for the editing zixs saas  supports  secure LDAP.
llarava

ASKER
Get an unlimited membership to EE for less than $4 a week.
Unlimited question asking, solutions, articles and more.
llarava

ASKER
ASKER CERTIFIED SOLUTION
Shaun Vermaak

Log in or sign up to see answer
Become an EE member today7-DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform
Sign up - Free for 7 days
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
ask a question
yo_bee

I have Mimecast for my solution and I use LDAP setup between the my on-prem AD and mimecast.

I have my firewall ACL to only allow communication from Mimecast subnet.

LDAPS is a preferred method if you can support.

If your service does support ADFS for SSO I would look into setting it up.
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs
Shaun Vermaak

I have Mimecast for my solution and I use LDAP setup between the my on-prem AD and mimecast.
Correct, but their main integration points are ADFS and Azure AD. I will never run LDAP(S) over the Internet.
This is the best money I have ever spent. I cannot not tell you how many times these folks have saved my bacon. I learn so much from the contributors.
rwheeler23
yo_bee

I will look into this. Thanks Shaun.
llarava

ASKER
Why LDAPs is discouraged? Just asking to understand the cons
btan

LDAPS is secure by default as long as proper ciphers are negotiated. Even SSL has weak ciphers. But the whole idea is to reduce exposure of your entire AD DS to the Internet.

Nothing is silver bullet so if the AD is compromised due to lapsea or misconfigurations, the privileged access gained will give chance to penetrate through the internal. It is all about risk acceptance. When something really happened and user ia alright to manage the aftermath it is fine but most if the time they are not.

Connection to Internet from remote should always consider VPN and expose portion of the internal AD that really need to be use rather the entire AD DS. External threat to DDOS attack against LDAP/S is viable and service outage may be part of it.
Get an unlimited membership to EE for less than $4 a week.
Unlimited question asking, solutions, articles and more.
Shaun Vermaak

LDAPS is secure by default as long as proper ciphers are negotiated. Even SSL has weak ciphers. But the whole idea is to reduce exposure of your entire AD DS to the Internet.
There is a big difference between transport security, protocol security and exposure. With HTTPS you can reverse proxy the HTTPS traffic. With LDAPS you are literally exposing your DCs to the world. No one will ever be able to convince me to use it when technologies such as AD-FS, OAuth, AD Azure etc. exist
btan

Indeed the known port for LDAPS is an obvious target. Web proxy or broker is needed and it should even be application aware to manage the access using the SAML or OAuth token. These are preferred for online identity federation with more API interfaces released for greater application eservice method call.
llarava

ASKER
Could you please advise on a a good ADFS implementation document that I can use to test it?
Experts Exchange has (a) saved my job multiple times, (b) saved me hours, days, and even weeks of work, and often (c) makes me look like a superhero! This place is MAGIC!
Walt Forbes
yo_bee

My link walks you through the steps.
This is what I used to implement my ADFS and Web Application Proxy.
yo_bee

yo_bee

Get an unlimited membership to EE for less than $4 a week.
Unlimited question asking, solutions, articles and more.
btan

llarava

ASKER
Ok