This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Is anyone else seeing issues with proxy authentication and SMB v1 disabled on servers?

Since installing the ms17-10 updates yesterday and disabling SMBv1 on domain controllers, I've got 3 customers now with proxy authentication issues. Seems to  much of a coincidence for them to have problems at the same time and not have it related to the SMB protections against the WannaCry ransomware.



This thread was automatically locked due to age.
Parents Reply
  • This link is helpful because it acknowledhes that UTM AD SSO is highly dependent on SMB1.  However it insufficiently reviews the implications of running without SMB1.  Here is what I posted in reply.

    This needs elaboration.   AD is also used for (at least) vpn client WAF, and User Portal,  including the linked local accounts for OTP.  AD SSO could be replaced by LDAP SSO using sAMAccountName as the attribute, but AD groups would need to be replaced with LDAP groups as well.  But I doubt that the link between local usernames and backend users would transfer at all to the LDAP backend server.  Without that, all OTP configurations are broken.

Children
No Data