Front-side NTLM authentication

Concept

The following diagram shows the general workflow of an NTLM authentication:

27824734.png

  1. The user tries to access the resource under /protected. The corresponding mapping on the airlock is protected and uses Airlock IAM as one-shot authenticator.
  2. There is no NTLM header in the request. Hence, Airlock IAM requests to do NTLM authentication with the user by adding the "WWW-AUTHENTICATE NTLM" header to the message. Note that in case BASIC-authentication is configured, also a "WWW-AUTHENTICATE Basic realm="..."" header with a configurable realm is added.
  3. The user's browser sends an NTLM T1 message. Airlock forwards this message to its one-shot authenticator Airlock IAM. Airlock IAM answers with an NTLM T2 message.
  4. The user's browser responds with an NTLM T2 message. Airlock also forwards this message to its one-shot authenticator Airlock IAM. Airlock IAM extracts the information from the T3 message and starts a NETLOGON call with a domain controller. When the domain controller accepts the username/password combination, Airlock IAM performs an optional internal authentication and afterward the identity propagation.
  5. Finally, Airlock IAM tells Airlock Gateway (WAF) to forward the request to the backend.

Note that the NTLM connection is based upon connections and does not care about the Session Cookie inside Airlock.