Skip to main content

Configuring Form-Based Authentication for OWA 2003

Problem

You want to enable form-based authentication (FBA) for your OWA 2003 servers.

Solution

Using a graphical user interface
  1. Open the Exchange System Manager (Exchange System Manager.msc).
  2. In the left pane, expand the appropriate Administrative Groups container and expand the Servers container.
  3. Expand the target server and expand its Protocols container.
  4. Expand the HTTP node, then right-click the Exchange Virtual Server object and choose Properties.
  5. Switch to the Settings tab.
  6. Click the Enable Forms Based Authentication checkbox.
  7. Optionally, select a compression method from the Compression pulldown. (See the Discussion section for more on compression.)
  8. Click OK.
  9. ESM will display a warning dialog telling you that FBA requires SSL. Click OK.
  10. Restart IIS by opening a command window and using the iisreset command.

Discussion

The idea behind FBA is simple, but understanding it requires some background. If you've used the Exchange 5.5 version of OWA, you probably remember its logon form, which was embedded in an HTML page. The Exchange 2000 version of OWA did away with this logon page; instead, when you try to log on to Exchange, your browser would prompt for logon credentials. In Exchange Server 2003, you get to choose the approach you preferbut which one is better? The difference between these two approaches is significant but subtle.
When a web browser gets an authentication request from a server, it has to ask the user for credentials. After the user types his credentials in, the browser could make him type them over and over again for subsequent pages; instead, browsers cache the credentials and send them for each subsequent page. This is easy for the user, but it raises some potential security problems. If the credentials are protected using basic authentication, an attacker could easily capture them from an unencrypted connection. Even if the connection is encrypted, there's no good way to force the browser to "forget" the credentials after a set time period has passedleading to the sadly common situation where user A logs on to OWA, leaves the machine, and has user B come along and continue their OWA session.
FBA attacks this problem by eliminating the browser's access to credentials. When you use the OWA 2003 logon page, your credentials are sent as form fields to the Exchange server, but the communication is protected by SSL (which is why FBA requires SSL). The user name and password arrive at the server, which uses them to authenticate you against the Exchange mailbox you've requested access to. If the authentication request succeeds, the OWA server sends an encrypted cookie back to your browser. The browser supplies the cookie on each subsequent page reload, and the server can decrypt it and see if it's valid. Net result: credentials are only sent once, and the rest of the time the cookie is passed from client to server. Better still, the server controls the contents of the cookie, so it can include a time stamp. By checking the time-stamp value each time the cookie is presented by the browser, it's possible to set session time limits, once the timestamp indicates that the cookie has expired, the server redirects the user to the logon page to get a new cookie.

Changing OWA 2003 Session Timeouts

Problem

You want to adjust the time out for OWA 2003 user's session.

Solution

Using a graphical user interface
  1. Log on to the OWA server.
  2. Open the Registry Editor (regedit.exe).
  3. Select the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSEx-changeWeb\OWA registry key.
  4. Choose New DWORD Value from the Edit menu.
  5. Name the new value PublicClientTimeout.
  6. Double-click PublicClientTimeout and set its value to the number of minutes after which you want a logon session from a public client to time out. The default value is 15 minutes, but you can assign any value between 0 and 43,200 minutes.
  7. Choose New DWORD Value from the Edit menu.
  8. Name the new value TrustedClientTimeout.
  9. Double-click TrustedClientTimeout and set its value to the number of minutes after which you want a logon session from a trusted client to time out. The default value is 1440, with a permissible range of 0 to 43200.
  10. Stop and restart the WWW publishing service.
Using a command-line interface
The following commands set the timeout to 30 minutes:  > reg add HKLM\System\CurrentControlSet\Services\MSExchangeWeb\OWA      /t REG_DWORD /v "PublicClientTimeout" /d 30  > reg add HKLM\System\CurrentControlSet\Services\MSExchangeWeb\OWA      /t REG_DWORD /v "TrustedClientTimeout" /d 30
> net stop w3svc > net start w3svc

Using VBScript
' This code sets the public and private machine timeouts for OWA 2003  ' ------ SCRIPT CONFIGURATION ------  strOWA = "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeWeb\OWA\"  ' ------ END CONFIGURATION ---------    Set objWSH = wscript.CreateObject("WScript.Shell")  objWSH.RegWrite strOWA & "PublicClientTimeout", 5, "REG_DWORD"  WScript.echo "Public machine timeout set to 5 minutes."  objWSH.RegWrite strOWA & "TrustedClientTimeout", 30, "REG_DWORD"  WScript.echo "Private machine timeout set to 30 minutes."

Discussion
When you use FBA, as described earlier, the server generates a timestamped, encrypted cookie that it can use to determine when the user's OWA session should time out. OWA 2003 distinguishes between trusted clients, which are presumably secure, and public clients, which are machines (like airport kiosks or public-access terminals in hotels) that can't necessarily be trusted. There are separate timeout values for each of these client types, controlled by the two registry values previously described. Of course, since OWA can't tell what kind of client it's running on, the ultimate selection of a client type comes from the radio buttons on the OWA logon page: clicking Public or shared computer tells OWA to apply the public client timeout value, and clicking Private computer causes the trusted client timeout to apply.

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.