Configuring Your SonicWall Appliance for Browser NTLM Authentication

To use single sign-on, your SonicWall security appliance must be configured to use either SonicWall SSO Agent or Browser NTLM authentication only as the SSO method.

Topics:
Configuring Browser NTLM Authentication

The following procedure describes how to configure your SonicWall security appliance to use Browser NTLM authentication only. Perform the following steps:

1

In the Single-sign-on method drop-down menu, select Browser NTLM authentication only.

2
Click Configure. The SSO Agent Configuration dialog displays.
3
Click the Settings tab. Configuration on the Settings tab is the same as the configuration for the NTLM tab when SonicWall SSO Agent is selected as the Single-sign-on method. Refer to Step 32 in the procedure in Configuring Your SonicWall Security Appliance for SonicWall SSO Agent for detailed configuration instructions for this page.
4
Click the Users tab. The User Settings dialog displays.

5
Check the box next to Allow only users listed locally to allow only users listed locally on the appliance to be authenticated.
6
Check the box next to Simple user names in local database to use simple user names. When selected, the domain component of a user name will be ignored. User names returned from the authentication agent typically include a domain component, for example, domain1/user1. If this box is not checked, user names in the local database must match exactly the full names returned from the agent, including the domain component.
7
To use LDAP to retrieve user information, select the Use LDAP to retrieve user group information radio button. Click Configure to configure the LDAP settings. The LDAP Configuration page displays. For configuration information for this page, refer to Advanced LDAP Configuration.
8
9
In the Polling rate (minutes) field, enter a polling interval, in minutes. The security appliance will poll the workstation running SSO Agent once every interval to verify that users are still logged on. The default is 1.
10
Configuration on the Enforcement, Terminal Services, and Test tabs is the same as for those tabs when SonicWall SSO Agent is selected as the Single-sign-on method. Refer to the procedure in Configuring Your SonicWall Security Appliance for SonicWall SSO Agent for detailed configuration instructions for these pages.
11
Configuring RADIUS for Use With NTLM

When LDAP is selected in the Authentication method for login field, RADIUS configuration is still required when using NTLM authentication. NTLM authentication requires MSCHAP, which is provided by RADIUS but not by LDAP.

The Configure button next to RADIUS may also be required for CHAP/NTLM is enabled when LDAP authentication is selected on the Users > Settings page.

If LDAP is configured, then it will be used for user group membership lookups after a user’s credentials provided by NTLM have been authenticated via RADIUS. Thus, when using NTLM it is not necessary to configure RADIUS to return user group membership information (which can be very complex to do with some RADIUS servers, such as IAS).

To configure RADIUS settings, click the Configure button and follow the instructions in the Configuring RADIUS Authentication.

Configuring NTLMv2 Session Security on Windows

In Microsoft Windows 7 and Vista, Internet Explorer uses the NTLMv2 variant of NTLM by default. The NTLMv2 variant cannot be authenticated via RADIUS in the same way as NTLM. To use browser NTLM authentication as the SSO method with these versions of Windows, the Windows machines must be configured to use NTLMv2 Session Security instead of NTLMv2. NTLMv2 Session Security is a variant that is designed to be compatible with RADIUS/MSCHAPv2. This configuration is performed using Windows Group Policy.

To configure a Windows 7 or Vista machine to use NTLMv2 Session Security:
1
2
Select Local Security Policy to open the Local Security Policy window.
3
Expand Local Policies and click on Security Options.

4
Edit the Network Security: LAN Manager authentication level setting and select one of the following:
5
6