HOW TO: Configure a Primary Internet Authentication Service Server on a Domain Controller (317588)
The information in this article applies to:
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
This article was previously published under Q317588 SUMMARY
This step-by-step article describes how to install and configure Microsoft Internet Authentication Service (IAS) on a domain controller.
IAS can run as a Remote Authentication Dial-In User Service (RADIUS) server. You can use IAS for centralized authentication and accounting of multiple Routing and Remote Access Service (RRAS) servers.
back to the top
Install IAS
To install IAS:
- Click Start, point to Settings, and then click Control Panel.
- Double-click Add/Remove Programs, and then click Add/Remove Windows Components.
- In the Components list, click the words Networking Services (but do not select or clear its check box), and then click Details.
- Click to select the Internet Authentication Service check box, and then click OK.
- Click Next, and then click Finish.
- In the Add/Remove Programs dialog box, click Close.
- To start IAS, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
back to the top
Enable IAS to Authenticate Users in Active Directory
To register the IAS service in Active Directory:
- Start the IAS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
- On the Action menu, click Register Service in Active Directory.
- Click OK to confirm the IAS registration in the local domain, and then click OK.
back to the top
Configure IAS Properties- Start the IAS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
- Right-click Internet Authentication Service (Local), and then click Properties.
- In the Description box, type the friendly name that you want to call this IAS server.
- Click to clear the Log rejected or discarded authentication requests check box if you do not want to record these events.
NOTE: You can use this log file to help you to determine if unauthorized individuals are attempting to be authenticated in the domain. - Click to clear the Log successful authentication requests check box if you do not want to record these events.
NOTE: You can use this log file to help you to determine usage patterns of remote users. - Click the RADIUS tab. Note the authentication and accounting port numbers. If your IAS server is configured behind a firewall, you may need to open these ports to allow authentication and accounting of the remote users.
- Click the Realms tab. The Realms rules are used to define how the user identity is manipulated before the name is checked for existence. To add a Realm:
- Click Add.
- In the Find box, type the form of the user identity that you expect to receive during an authentication attempt. In the Replace box, type the manner in which you would like to format the identity, and then click OK. For example:
- To remove a realm (example: @example.com) from which an identity may originate, type @example.com in the Find box, and leave the contents of the Replace box blank.
- To replace a User Principal Name (UPN)(user@domain.com) format with that of the Universal Naming Convention (UNC)(domain.com\user) format, type (.*)@(.*) in the Find box, and then type $2\$1 in the Replace box.
- To replace domain\user with specific_domain\user, type (.*)@(.*) in the Find box, and then type specific_domain\$2 in the Replace box.
- To convert a user name to a UPN name, for example, to change user to user@domain.com, type $ in the Find box, and then type @domain.com in the Replace box.
- When you are finished adding items to the Realm list, click OK.
- Quit the IAS snap-in.
back to the top
Configure IAS Client Computers
Add Network Access Server (NAS) client computers to the IAS server. The NAS clients are remote access or Virtual Private Network (VPN) servers that submit authentication requests to the IAS server on behalf of the remote users. To configure NAS clients:
- Start the IAS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
- Right-click Clients, and then click New Client.
- In the Friendly name box, type the name that you want to call this NAS client, and then click Next.
- In the Client address (IP or DNS) box, type the fully qualified domain name (FQDN) of the client computer, and then click Verify.
- Click Resolve to resolve the DNS name.
- When the correct IP address for the Routing and Remote Access Server (RRAS) appears in the Search results box, click Use this IP.
- In the Client-Vendor list, leave the default selection of RADIUS Standard unless you are configuring a non-standard RADIUS client.
- In the Shared secret box, type a password that both the IAS server and the NAS client will use to mutually authenticate.
NOTE: You will need to enter this password on the NAS client computer.
This password is case-sensitive, can use alphanumeric characters as well as special characters, and can be up to 255 characters in length. A longer "shared secret" is more secure than a shorter one. - Retype the password in the Confirm shared secret box, and then click Finish.
The client is listed in the right pane of the Internet Authentication Service snap-in window.
back to the top
Configure Remote Access Policies
When you configure your RRAS servers to use an IAS server for authentication, the Remote Access Policies on the individual RRAS servers are no longer used. Instead, you must configure remote access policies on the IAS server to control authentication for all remote access clients.
back to the top
Create a Remote Access Policy- Start the IAS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
- Click Remote Access Policies.
- In the right pane of the Internet Authentication Service snap-in window, right-click Allow access if dial-in permission is enabled, and then click Delete. Click Yes to confirm the deletion.
- On the Action menu, click New Remote Access Policy.
- Create a new remote access policy. For additional information about how to create remote access policies, click the article number below
to view the article in the Microsoft Knowledge Base:
313082 HOW TO: Enforce a Remote Access Security Policy
back to the top
Copy Remote Access Policies
If you have already created remote access policies on a local RRAS server, you can copy them to the IAS server. To do this:
- Log on to the RRAS server on which the policies that you want to copy, are configured.
- Click Start, click Run, type cmd in the Open box, and then click OK.
- Type the following command, and then press ENTER
netsh aaaa show config > path\file.txt
where path and file are the complete path and file name in which you want to save the policy settings. For example, type netsh aaaa show config > a:\policy.txt to save the policy settings on drive A with a file name of Policy.txt. - Copy the text file that contains the policy settings to the IAS server computer.
- On the IAS server, click Start, click Run, type cmd in the Open box, and then click OK.
- Type the following command, and then press ENTER
where path and file are the path and file name of the policy settings that you copied from the RRAS server.
The following message appears:aaaa server configuration successfully set.
- Quit the Internet Authentication Service snap-in, if it is running.
- Start the IAS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then click Internet Authentication Service.
- Click Remote Access Policies. Verify that the policies are listed in the right pane of the IAS snap-in.
back to the top
Configure NAS Servers to Use the IAS Server- Log on to the RRAS server computer as an administrator.
- Click Start, point to Programs, point to Administrative Tools, and then click Routing and Remote Access.
- Under Routing and Remote Access, right-click the server that you want, and then click Properties.
- Click the Security tab, and then click RADIUS Authentication in the Authentication provider list.
- Click the Configure button that is next to RADIUS Authentication.
- Click Add, type the FQDN name of the IAS server in the Server name box, and then click Change.
- In the New secret box, type the "shared secret" password that you configured on the IAS server computer.
- Retype this password in the Confirm new secret box, and then click OK.
- Click OK, and then click OK.
- When you receive the notification message that states that you must restart the Routing and Remote Access service, click OK.
- In the Accounting provider list, click RADIUS Accounting.
- Click the Configure button that is next to RADIUS Accounting.
- Click Add, type the FQDN name of the IAS server in the Server name box, and then click Change.
- In the New secret box, type the "shared secret" password that you configured on the IAS server computer.
- Retype this password in the Confirm new secret box, and then click OK.
- Click OK, click OK, click OK on the message stating that you must restart the Routing and Remote Access service, and then click OK.
- On the message stating that you must restart the Routing and Remote Access service, click Yes, and then click Yes on the message stating that you must restart the Routing and Remote Access service (to use a new accounting provider).
- In the console tree, right-click the RRAS server that you want to restart, point to All Tasks, and then click Stop.
- Right-click the same server, point to All Tasks, and then click Start.
- Quit the Routing and Remote Access snap-in.
back to the top
REFERENCES
For additional information about Realms, click Help on the Start menu, click the Search tab, type Realms, and then click List Topics.
For additional information about IAS, click Help on the Start menu, click the Search tab, type IAS, and then click List Topics.
For more information about IAS, view the following Microsoft Web site:
Additional information about RADIUS is contained in the following Request for Comment documents:
To view these documents, view the following Web sites:
back to the top
Modification Type: | Major | Last Reviewed: | 10/30/2003 |
---|
Keywords: | kbhowto kbHOWTOmaster kbnetwork KB317588 kbAudITPro |
---|
|