Our marketing department comes back with "active directory integration" being a key customer request, but our company does not seem to have the attention span to (1) decide on what functional changes we want to make toward this end, (2) interview a broad range of customer to identify the most requested functional changes, and (3) still have this be the "hot potato" issue next week. To help me get beyond the broad topic of "active directory integration," what does it mean in your .NET app, both ASP.NET and WinForms?
Here are some sample changes I have to consider:
Am I missing any other areas of functional changes?
Followup question
Do apps that support "active directory integration" have the ability to authenticate users against more than one domain? Not that one user would authenticate to more than one domain but that different users of the same system would authenticate against different domains.
from a administrators perspective i want a ad-integration to do the following things
being able to set a security group eg "ApplicationXYZ Users" to be used for software distribution and rights (shared folders, ...) if necessary but this should obey number 1., so the admin creates the security group and tells the appserver which one it is.
single sign-on (makes it easier for the users cause they only need to know their windows login, and enforces the domain wide password policy)
a deactivated AD-User, or a AD-User that is no longer in "ApplicationXYZ Users" should not be able to login
link AD-Group to Application Group but that would be optional, i really can life without that
hth
As key to map AD-users/groups to stuff in the application, I typically use the Security Identifier (SID) from the AD-user/group.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With