Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

AD SSO - mixed domain and non-domain devices in single zone

We have a single network & zone which contains both domain-joined and non-domain-joined devices.*

For domain-joined devices, we use STAS and all is well.

For non-domain-joined devices, we WANT to use captive portal to ask the user to login.  However, because they are in the same zone as domain-joined devices, AD SSO is enabled on the Device Access...

This means that the non-domain devices are automatically redirected to myfirewall:8091 which either results in a Kerberos login box or a connection closed message (latter maybe if first is cancelled/ignored?).

How can we configure things so that non-AD device users are redirected to the captive portal and not to the Kerberos login box?

At present, the only workaround is either to login via Kerberos login box (with random logout time) OR manually navigate to https://myfirewall:8090 

I feel we are doing something wrong, just not sure what.

Thanks,

Ian.

*These are part of our internal network which is not routed through Sophos and therefore it is not possible to get Sophos to view them as a different network/zone.



This thread was automatically locked due to age.
  • AD SSO is Kerberos and you do not need to activate AD SSO for this scenario. If you want to use STAS, it is Client Authentication, not AD SSO. 

    So you can activate captive Portal and activate "Unknown user" in the firewall rule and disable AD SSO. 
    BTW: Maybe you should rethink your setup of mixing devices like that. 

    __________________________________________________________________________________________________________________

  • Excellent, thanks!  I've disabled AD SSO and everything seems to be working.

    Seems counter intuitive to disable AD SSO when we want "AD SSO" but if it works!