Windows Integrated Authentication

Enabling the Integration in Dispatcher Paragon

  1. Log into the Dispatcher Paragon management interface as a user with rights to modify the system configuration (for example, as the default user admin).

  2. Navigate to System > Configuration and search for the webAuthenticationMethod property.

  3. Change the property value to Windows Integrated Authentication to enable the single sign-on method.

  4. Additionally, the cutUsernameDomainDuringWindowsIntegratedAuthentication property can be disabled if necessary (see the info box below).

  5. Restart Dispatcher Paragon Management Service to apply the settings. In case the service is part of the cluster, all nodes must be restarted.

In the case when Dispatcher Paragon users have been replicated from multiple LDAP domains and the domain information is part of the replicated usernames (in domain\username format), the configuration option cutUsernameDomainDuringWindowsIntegratedAuthentication must be disabled otherwise parsed names from a single sign-on authentication token would not match the usernames in the product database.

images/download/attachments/284926704/windows_integrated_authentication_setup-version-1-modificationdate-1633096862850-api-v2.png

Setting Up LDAP Integration

All the users the system will authenticate must be replicated into the database. You can find more information about LDAP integration and how to set it up on this dedicated page.

Additionally, semi-online mode can be enabled in the LDAP integration settings to replicate users on demand in the case when the authenticated user is not found in the database.

images/download/attachments/284926704/on_demand_ldap_replication-version-1-modificationdate-1633096862840-api-v2.png

Setting Up the Internet Browser

Microsoft Edge

Ensure that Integrated Windows Authentication is enabled.

  1. Open Internet Options on Control Panel.

  2. Click the Advanced tab.

  3. Scroll down to Security.

  4. Check Enable Integrated Windows Authentication.

  5. Restart the browser.

The target website must be in the Intranet Zone.

  1. Navigate to the website.

  2. Open Internet Options on Control Panel.

  3. Click the Security tab.

  4. Click the Local Intranet icon.

  5. Click the Sites button.

  6. Check Automatically detect intranet network.

If the steps above do not work, click Advanced. Add the https://server_hostname/ to the list of intranet sites.

Chrome

The instructions are the same for Microsoft Edge and Chrome as both use the same intranet settings.

Firefox

  1. Type about:config in the address bar and hit enter.

  2. Type network.negotiate-auth.trusted-uris in the Filter box.

  3. Put your server name as the value. If you have more than one server, you can enter them all as a comma-separated list.

  4. Close the tab.

In case of problems, it is possible to use a third-party add-on providing Windows Integrated Authentication (search the Firefox add-on repository for the currently most used one).

Logging Into the Dispatcher Paragon Management Interface

When this feature is enabled following the instructions above, and you enter any page that is not the login page (e.g., the root page, Dashboard, etc.), you will be logged in automatically without the need to enter your credentials.

When you enter the Dispatcher Paragon login page (https://server_hostname/login) for the first time after the Management Service restart, you can either log in automatically by clicking the Continue as current user button (in which current user refers to the credentials under which you are logged into your operating system) or you can choose to log in by entering your credentials manually. The latter is important when no Active Directory user has super administrator rights assigned in Dispatcher Paragon, or in the case when the single sign-on integration was not configured correctly and it needs some additional setup changes.

When you enter the login page next time after the first successful login, the Continue as current user button will be changed to Continue as <FIRST_NAME LAST_NAME> because the browser now knows your name (it was stored in the cookie owned by the Management Service interface page).

When you log out of the system, you will end up on the login page.


images/download/attachments/284926704/windows_integrated_authentication_login__page_1-version-1-modificationdate-1633096862797-api-v2.png


images/download/attachments/284926704/windows_integrated_authentication_login__page_1b-version-1-modificationdate-1633096862757-api-v2.png

Caveats

Tenants

  • The Windows Integrated Authentication feature and its setting are available only in single tenant mode due to the technical limitations of the integration.

Windows domains

  • The Dispatcher Paragon server must be installed on the Windows operating system that is part of the same domain the users are authenticating against from their browsers.

Problems with saving requests in Microsoft Explorer or Microsoft Edge browser

Dispatcher Paragon End User Interface

If the single sign-on is enabled in Dispatcher Paragon, users will be logged into the End User Interface automatically.

Dispatcher Paragon Payment System

Single sign-on authentication was also implemented for Payment System. Read more about how to configure sign-on authentication on Advanced Configuration of Dispatcher Paragon Payment System section Sign-on Authentication.

Troubleshooting

In case there are still troubles making the feature works, try the following additional steps:

  1. Enable session cookies for the browser.

  2. Try to verify the following registry keys in \[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\] (https://www.itprotoday.com/compute-engines/jsi-tip-8574-you-cannot-post-any-data-non-ntlm-authenticated-web-site-after-you):

    1. "EnableNegotiate"=dword:00000000

    2. "DisableNTLMPreAuth"=dword:00000001


SSO may not work well with the username different from format "username" and "domain\username". This typically happens when a username is replicated from LDAP attribute userPrincipalName (instead of default sAMAccountName ) and the format is "user@domain.code". To resolve this map the LDAP attribute msDS-PrincipalName as an alias and perform the full LDAP replication.