Avatar of llarava
llaravaFlag for Afghanistan

asked on 

Looking for ways-to-integrate in premise ad-with-saas-apps

Hello,

We are looking for ways to integrate our local AD with a saas application (Zixs). This is a mail filter solution that will be used to filter inbound/outbound mail flow. The users will have a site that they will use to authenticate to release their spam. We want them to use their AD user and password to authenticate to the site and get to their spam. The vendor mentioned they support LDAP and secure LDAP but I am not sure what my options are to get this integration done.

We use on premise AD running on windows 2012 DCs.

Thank you!
Cloud ServicesActive DirectoryAzure

Avatar of undefined
Last Comment
llarava
Avatar of Shaun Vermaak
Shaun Vermaak
Flag of Australia image

You can use an external site and connect your local DS to AD Azure or deploy an AD FS server on-premise

You can alternatively use an internal site (which you can publish externally with something like WAP) and change authentication method of the site to LDAP similarily to My Free/Open-Source Self-Service Password Reset tool for Active Directory (Look at the web.config)
https://www.experts-exchange.com/articles/31477/Free-Open-Source-Self-Service-Password-Reset-tool-for-Active-Directory.html
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

I am looking for a way to avoid Azure. I would like to use secure ldap and read only DC in the DMZ. Anyone has done this setup before?
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

The customer would like to leverage their existing DMZ and infrastructure.
Avatar of Shaun Vermaak
Shaun Vermaak
Flag of Australia image

I am looking for a way to avoid Azure.
Second part of my comment is not Azure

I would like to use secure ldap and read only DC in the DMZ
Like published externally? Don't do that
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

Sorry for the editing zixs saas  supports  secure LDAP.
ASKER CERTIFIED SOLUTION
Avatar of Shaun Vermaak
Shaun Vermaak
Flag of Australia image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of yo_bee
yo_bee
Flag of United States of America image

I have Mimecast for my solution and I use LDAP setup between the my on-prem AD and mimecast.

I have my firewall ACL to only allow communication from Mimecast subnet.

LDAPS is a preferred method if you can support.

If your service does support ADFS for SSO I would look into setting it up.
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs
Avatar of Shaun Vermaak
Shaun Vermaak
Flag of Australia image

I have Mimecast for my solution and I use LDAP setup between the my on-prem AD and mimecast.
Correct, but their main integration points are ADFS and Azure AD. I will never run LDAP(S) over the Internet.
Avatar of yo_bee
yo_bee
Flag of United States of America image

I will look into this. Thanks Shaun.
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

Why LDAPs is discouraged? Just asking to understand the cons
Avatar of btan
btan

LDAPS is secure by default as long as proper ciphers are negotiated. Even SSL has weak ciphers. But the whole idea is to reduce exposure of your entire AD DS to the Internet.

Nothing is silver bullet so if the AD is compromised due to lapsea or misconfigurations, the privileged access gained will give chance to penetrate through the internal. It is all about risk acceptance. When something really happened and user ia alright to manage the aftermath it is fine but most if the time they are not.

Connection to Internet from remote should always consider VPN and expose portion of the internal AD that really need to be use rather the entire AD DS. External threat to DDOS attack against LDAP/S is viable and service outage may be part of it.
Avatar of Shaun Vermaak
Shaun Vermaak
Flag of Australia image

LDAPS is secure by default as long as proper ciphers are negotiated. Even SSL has weak ciphers. But the whole idea is to reduce exposure of your entire AD DS to the Internet.
There is a big difference between transport security, protocol security and exposure. With HTTPS you can reverse proxy the HTTPS traffic. With LDAPS you are literally exposing your DCs to the world. No one will ever be able to convince me to use it when technologies such as AD-FS, OAuth, AD Azure etc. exist
Avatar of btan
btan

Indeed the known port for LDAPS is an obvious target. Web proxy or broker is needed and it should even be application aware to manage the access using the SAML or OAuth token. These are preferred for online identity federation with more API interfaces released for greater application eservice method call.
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

Could you please advise on a a good ADFS implementation document that I can use to test it?
Avatar of yo_bee
yo_bee
Flag of United States of America image

My link walks you through the steps.
This is what I used to implement my ADFS and Web Application Proxy.
Avatar of llarava
llarava
Flag of Afghanistan image

ASKER

Ok
Active Directory
Active Directory

Active Directory (AD) is a Microsoft brand for identity-related capabilities. In the on-premises world, Windows Server AD provides a set of identity capabilities and services, and is hugely popular (88% of Fortune 1000 and 95% of enterprises use AD). This topic includes all things Active Directory including DNS, Group Policy, DFS, troubleshooting, ADFS, and all other topics under the Microsoft AD and identity umbrella.

86K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo