What are problems and pitfalls with a public facing Active Directory
Posted
by Ralph Shillington
on Server Fault
See other posts from Server Fault
or by Ralph Shillington
Published on 2010-05-12T19:08:49Z
Indexed on
2010/05/12
19:14 UTC
Read the original article
Hit count: 294
The situation that i'm faced with is this: We plan on using a number of server applications hosted on Amazon EC2 machines, mainly Microsoft Team Foundation Server. These services rely heavily on Active Directory. Since our servers are in the Amazon cloud it should go without saying (but I will) that all our users are remote.
It seems that we can't setup VPN on our EC2 instance -- so the users will have to join the domain, directly over the internet then they'll be able to authenticate and once authenticated, use that token for accessing resources such as TFS.
on the DC instance, I can shut down all ports, except those needed for joining/authenicating to the domain. I can also filter the IP on that machine to just those address that we are expecting our users to be at (it's a small group)
On the web based application servers, I imagine all we need to open is port 80 (or 8080 in the case of TFS)
One of the problems that I'm faced with is what domain name to use for this Active directory. Should I go with "ourDomainName.com" or "OurDomainName.local" If I choose the latter, does that not mean that I'll have to get all our users to change their DNS address to point to our server, so it can resolve the domain name (I guess I could also distribute a host file)
Perhaps there is another alternative that I'm completely missing.
© Server Fault or respective owner