cancel
Showing results for 
Search instead for 
Did you mean: 

Do my VPN authenticated users need to login to my WebSite to Use OnBase NT Authentication?

Hank_Thomas1
Star Contributor
Star Contributor

No one will be able to access my Website until they have Logged in to the Institution's VPN/Portal.

I am unclear if I need to have users Login again, this time to my ASP.Net website to pass domain user name to OnBase.

Is the current user's Username not available to my App if they have not logged in?

Thanks

1 ACCEPTED ANSWER

Scott_McLean
Elite Collaborator
Elite Collaborator

Hi Hank,

The issue you're looking at is going to be true with interactions among any web applications where NT authentication is used, not just OnBase.

You're facing what are really two problems:

  1. Passing credentials from one web application to another is what's known as a "double hop." This is intentionally prevented, since it would be very easy to misuse.
    1. For example, if a user with greater access than the programmer authenticates to the web application, that user's credentials could then be used to gain access to resources from which the developer would otherwise be blocked.
    2. It is possible (with sufficiently open trusts) to configure a system in which you can enable a double hop between two specific applications, but the configuration to support this is generally in violation of recommended security standards.

  2. If the user does not authenticate to your application, then you have no credentials to pass in any event.
    1. In this scenario, it would not matter if you had opened the trusts sufficiently to allow a double-hop. Since your application does not see the user's credentials, it has nothing to pass along when it establishes an API connection to OnBase.

If you are simply launching a client session and not attempting to create an API session, then the client itself can accept the user's NT credentials, and there is no need for you to pas them along. So in that scenario, your VPN users should be able to access OnBase.

I hope that helps some. If not, please clarify how you intend to user the current user credentials, and I'm sure one of the geniuses on here will help some more.

Kind regards and happy coding,

Scott

View answer in original post

1 REPLY 1

Scott_McLean
Elite Collaborator
Elite Collaborator

Hi Hank,

The issue you're looking at is going to be true with interactions among any web applications where NT authentication is used, not just OnBase.

You're facing what are really two problems:

  1. Passing credentials from one web application to another is what's known as a "double hop." This is intentionally prevented, since it would be very easy to misuse.
    1. For example, if a user with greater access than the programmer authenticates to the web application, that user's credentials could then be used to gain access to resources from which the developer would otherwise be blocked.
    2. It is possible (with sufficiently open trusts) to configure a system in which you can enable a double hop between two specific applications, but the configuration to support this is generally in violation of recommended security standards.

  2. If the user does not authenticate to your application, then you have no credentials to pass in any event.
    1. In this scenario, it would not matter if you had opened the trusts sufficiently to allow a double-hop. Since your application does not see the user's credentials, it has nothing to pass along when it establishes an API connection to OnBase.

If you are simply launching a client session and not attempting to create an API session, then the client itself can accept the user's NT credentials, and there is no need for you to pas them along. So in that scenario, your VPN users should be able to access OnBase.

I hope that helps some. If not, please clarify how you intend to user the current user credentials, and I'm sure one of the geniuses on here will help some more.

Kind regards and happy coding,

Scott