Our marketing department comes back with \"active directory integration\" being a key customer request, but our company does not seem to have the attention span to (1) decide on
As someone who is both the AD Administrator and is currently developing an internal app which needs to be AD-integrated, here are my thoughts:
from a administrators perspective i want a ad-integration to do the following things
being able to set a security group eg "ApplicationXYZ Users" to be used for software distribution and rights (shared folders, ...) if necessary but this should obey number 1., so the admin creates the security group and tells the appserver which one it is.
single sign-on (makes it easier for the users cause they only need to know their windows login, and enforces the domain wide password policy)
a deactivated AD-User, or a AD-User that is no longer in "ApplicationXYZ Users" should not be able to login
link AD-Group to Application Group but that would be optional, i really can life without that
hth
One of the main advantages of using AD is that it enables a dedicated team to manage all the user/grants things. Typically, when a new user arrives, his manager asks to the dedicated team to give him access to application A B and C, and this team can do all this stuff directly from AD. In fact, they often duplicate another user (typically a co worker).
Is the user signed on to your app by virtue of being signed on to Windows?
To me this is first and foremost what AD integration means (apart from Windows lockin :-). So for example if the organisation has implemented public key login, you get it in your app for nothing.
Do you have to prove your login process protects user passwords?
You should typically never even see a password if you're using AD, unless you have some legacy NT4 around (certainly shouldn't have to store a password).
Do administrators assign users to security groups within your app or outside via AD? Does it matter?
Via AD. After single sign on, a major benefit would be to be able to use any AD tools you have to security admin the application, report on permissions, create ACLs, etc. You shouldn't have to reinvent this stuff for every application.
As key to map AD-users/groups to stuff in the application, I typically use the Security Identifier (SID) from the AD-user/group.