Citrix Blogs

Your guide to Citrix FAS multi-forest selective authentication

With more of our customers moving to secure Windows enterprise deployments, separating user and resources objects in Active Directory is one architectural decision they consider. This model can provide service isolation to protect certain segments of an organization.

As a consultant on the Citrix Consulting Public Sector team, I’ve worked with many organizations that are integrating Citrix solutions into complex Active Directory infrastructures that leverage this isolation model. In this post, I’ll share implementation guidance on deploying Federated Authentication Services (FAS) in a multi-forest Active Directory that leverages selective authentication.

A common Active Directory deployment model includes leveraging multiple forests to segment components and provide additional security. This Active Directory forest segmentation is commonly based on the types of resources, computer objects and user accounts. This design is what Microsoft calls a resource forest model. One forest includes all the computer objects such as the Delivery Controllers, VDAs, FAS, and Certificate Authority while the other forest includes only user accounts. Different types of Active Directory trusts can be configured between the separate forests. When working with customers, we commonly see two-way Forest trusts configured with forest-wide authentication. This means bi-directional authentication is automatically established between all objects in the forests. However, some deployments may require a more restrictive authentication model between forests, where rights must be explicitly configured for every object. When this level of security is required, Selective Authentication is used to provide a “deny all, only allowed what is required” permissions model.

This article only covers the FAS configurations required. Other considerations must be taken into account when integrating other Citrix components such as the Delivery Controller or StoreFront in multi-domain environments. This is one of the more complex configurations, but it’s becoming more popular. Always remember, every Active Directory deployment is slightly different, so additional steps may be required to get your solution working. The configurations detailed below have been validated in both production and lab environments. For the OS, Windows Server 2016 was used for all infrastructure and Active Directory was at a 2012 functional level. The goal of this post is to provide the least-privilege configurations to enable FAS in this type of Active Directory deployment. We’ve covered most of the gotchas in this blog to help you get your FAS deployment up and running in no time.

Active Directory

Below are the required configurations that must be completed in each Active Directory forest. I’ve also included some of the common errors that you’ll see if the configuration is not implemented properly. I will be referencing the diagram below when referring to the location of items in Active Directory.

One of the items that has come to my attention is the confusion related to the multi-domain permissions detailed in this Citrix Knowledge Center article. This article recommends adding computer objects to the Windows Authorization Group on the users domain to allow for cross forest functionality. Configuring these permissions will not allow cross-forest authentication to work with Selective Authentication. Additionally, based on my testing, these permissions are also not required using separate forests with forest-wide authentication.

The information table shows the errors seen on Federated Authentication Services (FAS) and StoreFront when the permissions discussed above are not configured on the FAS server. If the users are not given the “Allowed to Auth” permissions on the StoreFront server specifically, you will get the “There was a failure with the mapped account” error when logging in via the website.


Federated Authentication Services
[S102] Server [RAL\XDC-001$] failed to assert UPN [roger2@users.local] (Exception: The computer you are signing into is protected by an authentication firewall. The specified account is not allowed to authenticate to the computer.
at System.Security.Principal.WindowsIdentity.KerbS4ULogon(String upn, SafeAccessTokenHandle& safeTokenHandle)
at System.Security.Principal.WindowsIdentity..ctor(String sUserPrincipalName, String type)
at System.Security.Principal.WindowsIdentity..ctor(String sUserPrincipalName)
at Citrix.Authentication.UserCredentialServices.Server.ConvertCredentials.CreateCookieForCertificate(WindowsIdentity caller, String upn, SecurityIdentifier sid, RoleConfig roleConfig, String securityContext, Boolean wait))

StoreFront
Failed to launch the resource ‘XDC1.Writeqqqq’ using the Citrix XML Service at address ‘??’. An unknown error occurred interacting with the Federated Authentication Service. See the inner exception for more details.
Citrix.DeliveryServices.FederatedAuthenticationService.VdaLogonDataProvider.Diagnostics.FasException, Citrix.DeliveryServices.FederatedAuthenticationService.VdaLogonDataProvider, Version=3.12.0.0, Culture=neutral, PublicKeyToken=null
An unknown error occurred interacting with the Federated Authentication Service. See the inner exception for more details.

System.ServiceModel.FaultException`1[[Citrix.Authentication.UserCredentialServices.FederatedAuthenticationServerFault, Citrix.Authentication.UserCredentialServices, Version=7.15.4000.0, Culture=neutral, PublicKeyToken=a80ce61cfbf8b47a]], System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
Access Denied

Federated Authentication Services
Windows Event Logs:
"Logon failure: the user has not been granted the requested logon type at this computer."
You will see the following error in the Windows Event logs on the StoreFront Server and you will see the error below when authenticating to the StoreFront website.

StoreFront
Windows Event Logs:
“An authentication attempt was made for user: roger2@users.local with realm context <unknown> that resulted in: Failed (Windows Error code: -1073741477)”

On the StoreFront website:
“There was a failure with the mapped account”

Certificates

Once the Active Directory configurations above have been complete, you should be able to successfully generate a user certificate and receive an ICA file to launch a virtual app or desktop resource. However, the next roadblock will be the trusts required to successfully authenticate to Windows. For that reason, the items below must be completed to enable users to authenticate.

If the certificates from Domain A are not placed on the Domain Controllers for Domain B, which hosts the user accounts, the following errors will appear on each component:

On the Users Domain Controller:
The client certificate for the user USERS\roger is not valid, and resulted in a failed smartcard logon. Please contact the user for more information about the certificate they're attempting to use for smartcard logon. The chain status was : A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.

On the Virtual Delivery Agent:
Event Logs When Launching Desktop or App: The domain controller rejected the client certificate of user roger@users.local, used for smart card logon. The following error was returned from the certificate validation process: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.

Message on the VDA: “the username or password is incorrect”

Key Takeaways

After all of that, you should have the knowledge you need to deploy FAS in a multi-forest selective auth AD configuration! If you want first-hand experience integrating a solution like the one described in this article, contact Citrix Consulting for assistance. I’ll leave you with a quick recap of the key items I want to make sure you’ve learned from this post:


Citrix Tech Bytes – Created by Citrix Experts, made for Citrix Technologists! Learn from passionate Citrix Experts and gain technical insights into the latest Citrix Technologies.

Click here for more Tech Bytes and subscribe.

Want specific Tech Bytes? Let us know! tech-content-feedback@citrix.com.

Exit mobile version