Customer has both internal domain and DMZ domain. There is no trust between both domains at this point. We have web application which is deployed at DMZ zone since the application has some interaction with external users as well.
- Internal users from internal domain would need to be able to login into our web application through Kerberos authentication, is that possible considering the app pool of web application would need to be able to decrypt service ticket from internal users while the app pool account is from DMZ domain?
- Let's assume that #1 is possible, after internal users are logged in, we would need to do LDAP query for people picker on other internal users and group. Here we would like to do LDAP query to internal domain via Kerbeos delegation. Just wonder how we could find the internal domain controller in this case. Any way to query GC for this? or should we just make it configurable at config file or maybe we could get from UPN of logged in user? Assume now that we have the internal domain controller address, how we could query by impersonating the logged in internal user through Kerbeos constrained delegation? With C# DirectoryEntry Constructor
public DirectoryEntry (string path, string username, string password, System.DirectoryServices.AuthenticationTypes authenticationType);
we could supply an authenticationType as Delegation although I still need to supply user name and password which I don't have.