Single Signon for APPC Applications Using Privileged ProxyLast reviewed: August 25, 1997Article ID: Q165385 |
The information in this article applies to:
SYMPTOMSAn APPC application is not allowed to open an LU6.2 conversation using the SNA Server 3.0 Host Security single signon feature and impersonate the security context of another Windows NT user account. An APPC application that is defined on a computer running Windows NT can only open a conversation using Single Signon on behalf of the Windows NT account that the application is defined to use.
CAUSESNA Server 3.0 was not originally designed to support this functionality.
RESOLUTIONSeveral updates have been made to SNA Server 3.0 to allow a privileged APPC application to open an APPC conversation using the Single Signon feature on behalf of any defined Windows NT user. This is referred to as the privileged proxy feature. In addition, an extension has been added to the APPC API to invoke the feature. These extensions are documented in the descriptions of [MC_]ALLOCATE APPC verbs. An APPC application becomes privileged by being started in a Windows NT user account that is a member of a special Windows NT group. When a Host Security Domain is configured, SNA Server Manager will define a second Windows NT group for use with the host security features of SNA Server. If the user account under which the actual client is running is a member of this second Windows NT group, the client is privileged to initiate an APPC conversation on behalf of any user account defined in the Host Account Cache. The following illustrates how the privileged proxy feature works: The SNA Server administrator creates a Host Security Domain called APP. SNA Server Manager now creates two Windows NT groups. The first group is called APP and the second is called APP_PROXY for this example. Users that are assigned to the APP group are enabled for single signon. Users assigned to the APP_PROXY group are privileged proxies. The administrator adds the Windows NT user AppcUser to the APP_PROXY group using the Users button on the Host Security Domain property dialog box in SNA Server Manager. The administrator then sets up an APPC application on the SNA Server to run as a Windows NT service called APPCAPP and that service has been setup to operate under the AppcUser user account. When APPCAPP runs, it opens an APPC session via an MC_ALLOCATE verb using the extended VCB format and specifies the Windows NT username of the desired user, UserA (for example). The SNA Server service sees the session request coming from a connection that is a member of the Host Security Domain APP. The Client/Server interface tells the SNA Server service that the actual client is AppcUser. The SNA Server service checks to see if AppcUser is a member of the APP_PROXY group. Because AppcUser is a member of APP_PROXY, the SNA Server service inserts the Username/Password for UserA in the APPC Attach (FMH-5) command and sends it off to the partner TP.
APPC APPLICATION REQUIREMENTS TO IMPLEMENT PRIVILEGED PROXY SUPPORTIn order to support the priviledged proxy feature, the APPC application must implement the following program logic:
When the APPC application performs the above steps and calls [MC_]ALLOCATE, the SNA Server will perform a lookup in the host security domain for the specified Windows NT user, set the user ID and password fields in the FMH-5 Attach message sent to the remote system.
STATUSMicrosoft has confirmed this to be a problem in SNA Server version 3.0. This problem was corrected in the latest Microsoft SNA Server 3.0 U.S. Service Pack. For information on obtaining the service pack, query on the following word in the Microsoft Knowledge Base (without the spaces):
S E R V P A C K Keywords : kbbug3.00 kbfix3.00.sp1 prodsna snaappc snacpic kbnetwork kbprg Version : 3.0 Platform : winnt Issue type : kbbug Solution Type : kbfix |
================================================================================
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |