Before you can use Access Rules, the following conditions must be fulfilled:
-
Claim support must be enabled in your Active Directory domain. For details, review the topic Enabling claim support.
-
For Access Rules to use device claims, Group Policy setting Computer Configuration > Policies > Administrative Templates > System > Kerberos > Support Compound Authentication with the Always option must be enabled on the client computers, in addition to the Kerberos client support for claims, compound authentication and Kerberos armoring setting (see Client computer).
-
The Active Roles Administration Service must be installed on a computer running Windows Server 2016 or a later version of the Windows Server operating system.
-
The Active Roles Administration Service that performs authorization using Access Rules must be installed in the Active Directory forest where the user account of the authorizing user is defined and in which the claim types used by the Access Rules are created. Active Roles does not support the use of Access Rules for cross-forest authorization.
-
Group Policy setting Computer Configuration > Policies > Administrative Templates > System > Kerberos > Kerberos client support for claims, compound authentication and Kerberos armoring must be enabled on the computer running the Administration Service.
-
The Administration Service must be configured to support Kerberos authentication.
Access Rules require the Active Roles Administration Service to support Kerberos authentication. This is because Windows claims are delivered inside Kerberos tickets. To enable Kerberos authentication, the Service Principal Name (SPN) of the Active Roles Administration Service must be added to the service account (domain user account under which the Administration Service runs). For example, suppose that:
SPNs must be added to the service account:
You can add the SPNs to the service account by using the Setspn command line tool:
-
setspn -s aradminsvc/<FQDN> <ServiceAccountName>
For example, setspn -s aradminsvc/arsrv.domain.com domain\arsvcacct
-
setspn -s aradminsvc/<name> <ServiceAccountName>
For example, setspn -s aradminsvc/arsrv domain\arsvcacct
Claims-based authorization requires:
-
A domain controller (or controllers) running a version of Windows Server supported by Active Roles, with claim support enabled. For the list of supported operating system, see System Requirements in the Active Roles Release Notes.
-
(Optional) If you need to use device claims, then a domain-joined client computer (or computers) running a supported version of the Windows operating system.
The claims-based authorization mechanism has the following requirements on the domain controller (DC) side:
-
Extensions to Active Directory, such as claim type objects intended to store the claim configuration data. By adding a Windows Server domain controller (DC), you extend the Active Directory schema to provide the object classes and attributes required to support claims-based authorization.
-
Enhancements in the Kerberos Key Distribution Center (KDC) and Security Accounts Manager (SAM) that enable DCs running Windows Server to recognize claim types, retrieve claim information, and transport claims within Kerberos tickets.
A Windows Server DC that supports claim issuance understands claim types published in Active Directory. Claim types define the claim source attributes. When servicing an authentication request, the domain controller reads the source attribute from the claim type and retrieves the attribute data for the authenticating user. Then, the retrieved attribute data is included in the Kerberos ticket and returned to the requestor.
-
If the DC does not support claim issuance by default, you must enable it via Group Policy. The Group Policy setting that serves this purpose is located in Computer Configuration > Policies > Administrative Templates > System > KDC > KDC support for claims, compound authentication and Kerberos armoring. Enable this policy setting in a Group Policy Object applied to the Domain Controllers Organizational Unit (for example, in the Default Domain Controllers Policy object), and confirm that this policy setting has the Supported option selected.
NOTE: Claims-based authorization does not impose domain or forest functional requirements. If your Active Directory domain has a sufficient number of Windows Server DCs to service authentication requests that include claim information, then you can make use of Windows claims.