I setup an ASG today as a pilot using AD SSO for authentication. For the most part, this works fantastically. I'm moving off a Squid proxy and I was supplying the IE settings via Group Policy and a proxy pac file. So I just moved the pac file over to the ASG and changed my group policy and for 95% of the machines, this is working great. But I have one issue:
Users that are using a laptop or other non-domain member machines
For these users, I put in the path to the PAC file, and I'm supplying the FQDN of the proxy, which is in the DNS Zone that is controlled by AD. These users get a pop-up dialog, which I'm assuming is a fallback to NTLM AUTH. But no matter what these users put in the box, the auth fails. I cannot get the non-domain member machines to auth. I see this in the proxy log:
2010:05:20-13:45:59 astaro01 httpproxy[6619]: [0xaf0803e8] auth_adir_auth_crap_callback (auth_adir.c:875) Authorization denied (NT_STATUS_PIPE_DISCONNECTED)
2010:05:20-13:45:59 astaro01 httpproxy[6619]: [0xaf0803e8] auth_adir_auth_crap_callback (auth_adir.c:875) Authorization denied (NT_STATUS_PIPE_DISCONNECTED)
2010:05:20-13:46:09 astaro01 httpproxy[6619]: [0xaf0803e8] auth_adir_auth_crap_callback (auth_adir.c:875) Authorization denied (NT_STATUS_PIPE_DISCONNECTED)
2010:05:20-13:46:11 astaro01 httpproxy[6619]: [0xaf0803e8] auth_adir_auth_crap_callback (auth_adir.c:875) Authorization denied (NT_STATUS_PIPE_DISCONNECTED)
2010:05:20-13:46:14 astaro01 httpproxy[6619]: [0xaf0803e8] auth_adir_auth_crap_callback (auth_adir.c:875) Authorization denied (NT_STATUS_PIPE_DISCONNECTED)
Again, the XP machines with IE8 that are domain members work flawlessly. All the domain controllers are Windows 2008 R2. I did find a few machines with XP and IE6 and these don't work either. They fall back to NTLM and present the dialog. Even though these machines are domain members, no matter what I put in the dialog box, I get the above errors in the log.
So, what is the trick here? I need to be able to support these occasional roaming users, but I want to continue to give the majority users the benefit of the Kerberos based SSO.
I did see some other references to this errors, but didn't see an exactly answer.
Thanks.
Matt
This thread was automatically locked due to age.