Integrated windows login, IWA

Used to leverage windows login already done from a domain connected client. Requires module AuthN to be deployed.

Configuration

Authenticator type: IwaAuthentication

Common Authenticator configuration can be found here.

Name
Description
Default value
Mandatory

package

Negotiate

error_url

If failing authentucation, whre to redirect user.

N/A

custom_identifier

Tag used for event separation

N/A

Logging

Apart from system logging, event logging is done when starting, completing, and failing a transaction.

Event ids are:

  • WEB_100015("Authenticated using Integrated Windows Authentication")

    • IDENTIFIER (user trace id)

    • CUSTOMER_IDENTIFIER (if configured)

    • SOURCE_USER_NAME (windows username)

    • SOURCE_ADDRESS (ip of the remote session)

    • AUTHENTICATOR_IDENTIFIER (id and display name)

  • WEB_100016("Failed authentication using Integrated Windows Authentication")

    • IDENTIFIER (user trace id)

    • CUSTOMER_IDENTIFIER (if configured)

    • SOURCE_ADDRESS (ip of the remote session)

    • AUTHENTICATOR_IDENTIFIER (id and display name)

Data exposed to global state

After a user completes a transaction, the authenticator is marked as done. Data from the authentication response is then put into the global state replacing existing values:

  • username

Prerequisite

  • Integrity must be running on a windows server joined to the domain where IWA "is to take place".

  • Integrity must run using a actual domain account belonging to the same domain as the server is joined.

  • Ensure that there is a DNS A record present for the host. Be sure the record is of A type.

  • A SPN registration must be done connecting the DNS name, protocol & account. This is done using the command setspn:

Only HTTP or HTTPS is required depending on if HTTP traffic is encrypted or not.

Recommendation is that all communication is sent over HTTPS.

API

This authenticator has no UI