|
I've
been thinking about the exact same scenario, for the same reasons...Some months
ago, there was a presentation at the local Microsoft office by a large local
company that's using the proxy object method. They put their extranet
users directly in ADAM, and built some internal code to create proxy objects in
ADAM for their internal users. The portal authenticates using simple LDAP
binds (over SSL) to ADAM. I have talked to the presenter a couple of times
since then, and they seem to be happy with the functionality and
performance. I really don't know what the 'security concerns' are
regarding using proxy objects, other than the normal concerns around using
simple binds, but SSL helps mitigate those. On the back end (the proxy
authentication to AD), normal AD authentication is used IIRC. Seems like a
pretty good approach, assuming you can automagically create/delete proxy objects
as users come and go from the intranet directory.
If you
did go down the path of synchronized user objects in ADAM, why not use P-Synch
for both the INTRANET and EXTRANET domains ? In other words, an extranet
user would have an object in ADAM and EXTRANET, and would have those two targets
configured in P-Synch. Any password change on the extranet would get
hooked by the P-Synch DLL on the extranet DCs and transparently synched to ADAM,
so you shouldn't need to write any hooks to your home-grown password change
mechanism...
Yet
another solution that's been suggested to me is to use a 'virtual directory'
product to virtualize the internal and external directories into a single image
that's used by the portal. I have no experience with these products, but
perhaps someone else could comment.
Short
summary is that we don't have a solution nailed down yet either, but it sounds
like a common problem/scenario. In fact, I almost could have written your
original post word for word....
Dave
|
Title: Message
- RE: [ActiveDir] OT: MIIS, ADAM, & AD Fugleberg, David A
- RE: [ActiveDir] OT: MIIS, ADAM, & AD Al Mulnick
