Internet Explorer permits four options for using the NTLM authentication mechanism:
We do not recommend using option 3, as a malicious Web site operator can trick Internet Explorer into responding to a NTLM challenge and obtaining the password by cracking the response.
Alternatively, an attacker can send an email with a link back to the attacker's Web site, which sends an NTLM authentication challenge when the user clicks on the link.
If Internet Explorer has not been securely configured, the on-site server encrypts that challenge with the user’s password hash as the key and sends it back as the response.
The attacker may then be able to crack the user’s internal domain password.
One Identity recommends that:
This section discusses the common maintenance issues relating to a Single Sign-on for Java deployment and provides solutions to some common problems which may be experienced when configuring and deploying applications using Single Sign-on for Java.
This section discusses the maintenance issues relating to a Single Sign-on for Java deployment.
Single Sign-on for Java supports logging at different levels (see Setting up logging). For maintenance purposes, logging at WARN level is recommended, along with regular inspection of the generated log file. Regular inspection should alert the administrator to potential problems within Single Sign-on for Java.
© ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center