JSI Tip 6758. How do I install and configure Microsoft Internet Authentication Service (IAS) on a Windows Server 2003-based domain controller?
May 25, 2003
NOTE: The text in the following Microsoft Knowledge Base article is provided so that the site search can find this page. Please click the Knowledge Base link to insure that you are reading the most current information.
Microsoft Knowledge Base article Q816586 contains:
IN THIS TASK
Summary
Install IAS
Enable IAS to Authenticate Users in Active Directory
Configure IAS Properties
Modify Attribute Manipulation Rules
Configure IAS Client Computers
Configure Remote Access Policies
Create a Remote Access Policy
Copy Remote Access Policies
Configure NAS Servers to Use the IAS Server
REFERENCES
Summary
This step-by-step article describes how to install and configure Microsoft Internet Authentication Service (IAS) on a Windows Server 2003-based domain controller.
IAS is generally deployed as a Remote Authentication Dial-In User Service (RADIUS) server. You can use IAS for centralized authentication and accounting of multiple servers running Routing and Remote Access.
back to the top
Install IAS
To install IAS, follow these steps:
Click Start, point to ControlPanel, click Add or Remove Programs, and then clickAdd/Remove Windows Components.
In the Components list, click the words"Networking Services" (but do not click to select or click to clear the checkbox), and then click Details.
Click to select the Internet AuthenticationService check box, and then click OK.
Click Next, and then clickFinish.
Close the Add or Remove Programs dialogbox.
To start IAS, click Start, point toAll Programs, point to Administrative Tools,and then click Internet Authentication Service.
back to the top
Enable IAS to Authenticate Users in Active Directory
To register the IAS service in the Active Directory directory service, follow these steps:
Start the IAS snap-in. To do this, clickStart, point to All Programs, point toAdministrative Tools, and then click InternetAuthentication Service.
On the Action menu, click RegisterService in Active Directory.
Click OK two times.
back to the top
Configure IAS Properties
Click Start, point to AllPrograms, point to Administrative Tools, and thenclick Internet Authentication Service.
Right-click Internet Authentication Service(Local), and then click Properties.
In the Description box, type a descriptivename for this IAS server.
Click to clear the Rejected authenticationrequests check box or the Successful authenticationrequests check box if you do not want to record these events.
Note You can use this log file to help you to determine ifunauthorized individuals are trying to be authenticated in the domain.
Click to clear the Successful authentication requests checkbox if you do not want to record these events.
Note You can use this log file to help you to determine usage patternsof remote users.Click the Ports tab. Note theauthentication and accounting port numbers. If your IAS server is configuredbehind a firewall, you may have to open these ports to allow authentication andaccounting of the remote users.
Click OK to close the InternetAuthentication Service (Local) Properties dialog box.
back to the top
Modify Attribute Manipulation Rules
Incoming connection requests are handled by the IAS server, based on a set of rules described by connection request policies. A policy can modify connection request attributes to standardize the syntax, for example, by always presenting the user ID in the [email protected] format. To add or modify an attribute manipulation rule, follow these steps:
Click Start, point to AllPrograms, point to Administrative Tools, and thenclick Internet Authentication Service.
Expand Connection Request Policies.
In the right pane, right-click the policy that you want tomodify (for example, right-click the default policy Use Windowsauthentication for all users), and then clickProperties.
Click Edit Profile, and then click theAttribute tab.
In the Attribute list, click the attributethat you want to modify, and then click Add.
In the Find box, type the form of theattribute that you expect to receive during an authentication attempt. In theReplace box, type the way that you want to format theattribute, and then click OK.
For example, Toremove a realm (for example, the string "@example.com") where an identity mayoriginate, type @example.com in theFind box, and leave the contents of theReplace box blank.
To replace a user principal name (UPN)([email protected]) format with that of the Universal Naming Convention (UNC)(domain.comuser) format, type (.*)@(.*) in theFind box, and then type $2$1 in theReplace box.
To replace domainuser with MyDomainuser,type (.*)@(.*) in the Find box, andthen type MyDomain$2 in the Replacebox.
To convert a user name to a UPN name (for example, to change user [email protected]), type $ in the Findbox, and then type @domain.com in theReplace box.
Note For more detailed information about modifying connectionattributes, search Help and Support Center for "pattern matching syntax".Click OK three times, and then quit theIAS snap-in.
back to the top
Configure IAS Client Computers
Add Network Access Server (NAS) client computers to the IAS server. The NAS clients are remote access or virtual private network (VPN) servers that submit authentication requests to the IAS server on behalf of the remote users. To configure NAS clients, follow these steps:
Start the IAS snap-in. To do this, clickStart, point to All Programs, point toAdministrative Tools, and then click InternetAuthentication Service.
Right-click RADIUS Clients, and then clickNew RADIUS Client.
In the Friendly name box, type a name forthis NAS client.
In the Client address (IP or DNS) box,type the fully qualified domain name (FQDN) of the client computer, and thenclick Verify.
Click Resolve to resolve the Domain NameSystem (DNS) name.
When the correct Internet Protocol (IP) address for theserver running Routing and Remote Access appears in the IPAddress box, click the address, click OK, and thenclick Next.
In the Client-Vendor list, leave thedefault selection of RADIUS Standard unless you areconfiguring a non-standard RADIUS client.
In the Shared secret box, type a passwordthat both the IAS server and the NAS client will use to mutually authenticate.Confirm the password in the Confirm shared secret box, andthen click Finish.
Note You must type this password on the NAS client computer.
Thispassword is case-sensitive, can contain alphanumeric characters and specialcharacters, and can be up to 255 characters in length. A longer "shared secret"is more secure than a shorter one.
The client is listed in the right pane of the Internet Authentication Service snap-in window.
back to the top
Configure Remote Access Policies
When you configure a server that is running Routing and Remote Access to use an IAS server for authentication, the Remote Access Policies on the individual servers running Routing and Remote Access are no longer used. Instead, you must configure remote access policies on the IAS server to control authentication for all remote access clients.
back to the top
Create a Remote Access Policy
Start the IAS snap-in. To do this, clickStart, point to All Programs, point toAdministrative Tools, and then click InternetAuthentication Service.
Click Remote Access Policies.
On the Action menu, click NewRemote Access Policy. Create a new remote access policy. For additional information about how to create remote access policies, click the following article numbers to view the articles in the Microsoft Knowledge Base:
816522 HOW TO: Enforce a Remote Access Security Policy in Windows Server 2003
back to the top
Copy Remote Access Policies
If you have already created remote access policies on a local server running Routing and Remote Access, you can copy the policies to the IAS server. To do this, follow these steps:
Log on to the server running Routing and Remote Accesswhere the policies that you want to copy are configured.
Click Start, click Run,type cmd in the Open box, and then clickOK.
Type netsh aaaa show config >pathfile.txt, and then press ENTER.
Path and file.txt referto the complete path and file name where you want to save the policy settings.For example, type netsh aaaa show config >a:policy.txt to save the policy settings on drive A with a filename of Policy.txt.Copy the text file that contains the policy settings to theIAS server computer.
On the IAS server, click Start, clickRun, type cmd in the Openbox, and then click OK.
Type netsh exec pathfile.txt, andthen press ENTER.
Path and file refer to the path and file name of thepolicy settings that you copied from the server running Routing and RemoteAccess.
The following message appears:
aaaaserver configuration successfully set.Start the IAS snap-in and verify that the new policies arelisted.
back to the top
Configure NAS Servers to Use the IAS Server
Log on to the server computer that is running Routing andRemote Access as an administrator.
Click Start, point to AllPrograms, point to Administrative Tools, and thenclick Routing and Remote Access.
Under Routing and Remote Access, right-click the serverthat you want, and then click Properties.
Click the Security tab, and then clickRADIUS Authentication in the Authenticationprovider list.
Click Configure (next to theAuthentication provider list).
Click Add, type the FQDN of the IAS serverin the Server name box, and then clickChange.
In the Change Secret dialog box, type theshared secret password that you configured on the IAS server computer, and thenclick OK four times.
When you receive the notification message that states thatyou must restart the Routing and Remote Access service, clickOK.
Right-click the server, and then clickProperties.
In the Accounting provider list, clickRADIUS Accounting.
Click Configure (next to RADIUSAccounting).
Click Add, type the FQDN of the IAS serverin the Server name box, and then clickChange.
In the Change Secret dialog box, type theshared secret password that you configured on the IAS server computer, and thenclick OK four times.
When you receive the notification message that states thatyou must restart the Routing and Remote Access service, clickOK.
In the console tree, right-click the server that is runningRouting and Remote Access, point to All Tasks, and then clickRestart.
Quit the Routing and Remote Access snap-in.
back to the top
REFERENCES
For additional information about setting up IAS servers, search Help and Support Center for "deploying IAS".
back to the top
Read more about:
MicrosoftAbout the Author
You May Also Like