Forum Discussion

Amnard's avatar
Amnard
Icon for Nimbostratus rankNimbostratus
Nov 09, 2012

APM Access Policy Design Using Attribute-based LDAP

A single APM access policy across multiple domains authenticating against attribute based LDAP servers.

 

 

Domain 1: Virtual Server

 

  • access is only allowed if user account has the LDAP attribute site1_access=TRUE
  • require its own customized logon page

Domain 2: Virtual Server

 

  • access is only allowed if user account has the LDAP attribute site2_access=TRUE
  • require its own customized logon page

Domain3+: Virtual Servers

 

  • access is only allowed if user account has the LDAP attribute site1_access=TRUE or site2_access=TRUE.
  • use a generic/shared logon page

 

Basically, Domain1 and Domain2 are the landing pages for 2 different groups of users. Access to either domain is controlled by an LDAP attribute. Domain 3+ are virtual server web applications listed on both sites’ landing pages.

 

Can I get some advice on how to design an Access Policy to accomplish this, please? Are there any advanced Access Policy design examples that I can review?

 

Thank in advance!

 

8 Replies

  • Are these separate virtual servers mapped to separate domains? Do the users have separate URLs they access?
  • Amnard's avatar
    Amnard
    Icon for Nimbostratus rankNimbostratus

    These separate virtual servers are mapped to separate domains.

     

    The users have separate URLs they access.

     

  • Okay, so are you asking how to design one access policy that can be used in many virtual servers, or simply how to design access policies that provide access based on LDAP attributes?

     

     

    Also, how are users authenticating? (ie. user/pass?)
  • Okay, so are you asking how to design one access policy that can be used in many virtual servers, or simply how to design access policies that provide access based on LDAP attributes?

     

     

    Also, how are users authenticating? (ie. user/pass?)
  • Amnard's avatar
    Amnard
    Icon for Nimbostratus rankNimbostratus

    I am asking how to design one access policy that can be used in many virtual servers.

     

    The main issue is how to authenticate user based on which VS a user is accessing since each VS has a different LDAP filter requirement.

     

     

    Users are authenticating with just user/pass.

     

  • Okay, one last question (hopefully). When you say "domain", do you mean active directory domain or fully qualified domain? Are all LDAP calls to the same AD or different ADs based on the virtual server the user accesses?
  • Amnard's avatar
    Amnard
    Icon for Nimbostratus rankNimbostratus

    We use ADAM (Microsoft AD Application Mode), which is an attribute-based LDAP server.

     

    All LDAP calls are going to the same LDAP server group.

     

    The domain I referred to is the FQDN.

     

     

    To give a specific real-live example:

     

    mba.domain.com is a portal access for MBA students, requiring its own branding of the login page and access is restricted by user account with appropriate attribute (mba_portal_access=TRUE)

     

    law.domain.com is a portal access for law students, requiring its own branding of the login page and access is restricted by user account with appropriate attribute (law_portal_access=TRUE)

     

    There may be some students enrolling in a joint-degree program such as MBA/Law degree.

     

     

    idp.domain.com is a typical shibboleth application that should be accessible by all portal users.

     

    owa.domain.com is a typical web mail application that should be accessible by anyone (I simplified it so that it is accessible by portal users for now).

     

    Access scenario 1:

     

    A user accessing https://mba.domain.com will be redirected to https://login.domain.com for APM login which should be displaying the MBA branding login page. After the authentication and authorization process, user is SSO into the MBA portal. If the user clicks on an e-mail link inside the portal, APM will SSO and launch the https://owa.ubalt.edu/owa link. If a user is joint-degree student, he or she can go to https://law.domain.com and automatically SSO by the APM.

     

    Access scenario 2:

     

    A user accessing https://law.domain.com will be redirected to https://login.domain.com for APM login which should be displaying the law branding login page. After the authentication and authorization process, user is SSO into the law portal. If the user clicks on an e-mail link inside the portal, APM will SSO and launch the https://owa.ubalt.edu/owa link. If a user is joint-degree student, he or she can go to https://mba.domain.com and automatically SSO by the APM.

     

    Access scenario 3:

     

    A user accessing https://owa.ubalt.edu/owa will be redirected to https://login.domain.com for APM login which should be displaying the generic login page. After the authentication and authorization process, user is automatically SSO into the OWA.

     

  • Amnard's avatar
    Amnard
    Icon for Nimbostratus rankNimbostratus

    I finally fnished setting up my APM logic for LTM access. The only thing left is the look and feel.

     

    Thank everyone!