Skip To Content

Use Integrated Windows Authentication

You can secure access to your organization using Integrated Windows Authentication (IWA). When you use IWA, logins are managed through Microsoft Windows Active Directory. Users do not sign in and out of the organization; instead, when they open the website, they are signed in using the same accounts they used to sign in to Windows.

To use Integrated Windows Authentication, you must use ArcGIS Web Adaptor (IIS) deployed to Microsoft IIS web server. You cannot use ArcGIS Web Adaptor (Java Platform) to perform Integrated Windows Authentication. If you haven't done so already, install and configure ArcGIS Web Adaptor (IIS) with your portal.

Configure your organization to use Windows Active Directory

By default, ArcGIS Enterprise enforces HTTPS for all communication. If you have previously changed this option to allow both HTTP and HTTPS communication, you will need to reconfigure the portal to use HTTPS-only communication by following the steps below.

Note:

Using an Active Directory identity store, ArcGIS Enterprise supports authentication from multiple domains with a single forest, but does not provide cross-forest authentication. To support organization-specific users from multiple forests, a SAML identity provider is required.

Configure the organization to use HTTPS for all communication

Complete the following steps to configure the organization to use HTTPS:

  1. Sign in to the organization website as an administrator.

    The URL is in the format https://webadaptorhost.domain.com/webadaptorname/home.

  2. Click Organization and click the Settings tab, and then click Security on the left side of the page.
  3. Enable Allow access to the portal through HTTPS only.

Update your portal's identity store

Next, update your portal's identity store to use Active Directory users and groups.

  1. Sign in to the ArcGIS Portal Directory as an Administrator of your organization.

    The URL is in the format https://webadaptorhost.domain.com/webadaptorname/portaladmin.

  2. Click Security > Config > Update Identity Store.
  3. In the User store configuration (in JSON format) text box, paste your organization's Windows Active Directory user configuration information (in JSON format).

    Alternatively, you can update the following sample with user information specific to your organization:

    {
      "type": "WINDOWS",
      "properties": {
        "userPassword": "secret",
        "isPasswordEncrypted": "false",
        "user": "mydomain\\winaccount",
        "userFullnameAttribute": "cn",
        "userEmailAttribute": "mail",
        "userGivenNameAttribute": "givenName",
        "userSurnameAttribute": "sn",
        "caseSensitive": "false"
      }
    }

    In most cases, you'll only need to alter values for the userPassword and user parameters. Although you type the password in clear text, it will be encrypted when you click Update Configuration (below). The account you specify for the user parameter only needs permissions to look up the email address and full name of Windows accounts on the network. If possible, specify an account whose password does not expire.

    In the rare case where your Windows Active Directory is configured to be case sensitive, set the caseSensitive parameter to true.

  4. If you want to create groups in the portal that leverage the existing Active Directory groups in your identity store, paste your organization's Windows Active Directory group configuration information (in JSON format) in the Group store configuration (in JSON format) text box as shown below. If you only want to use the portal's built-in groups, delete any information in the text box and skip this step.

    Alternatively, you can update the following sample with group information specific to your organization.

    {
      "type": "WINDOWS",
      "properties": {
        "isPasswordEncrypted": "false",
        "userPassword": "secret",
        "user": "mydomain\\winaccount"
      }
    }

    In most cases, you'll only need to alter values for the userPassword and user parameters. Although you type the password in clear text, it will be encrypted when you click Update Configuration (below). The account you specify for the user parameter only needs permissions to look up the names of Windows groups on the network. If possible, specify an account whose password does not expire.

  5. Click Update Configuration to save your changes.
  6. If you've configured a highly available portal, restart each portal machine. See Stop and start the portal for full instructions.

Configure additional identity store parameters

Optionally, you can modify additional identity store configuration parameters using the ArcGIS Enterprise Administration API. These parameters include restricting whether groups are refreshed automatically when an organization-specific user signs in to the organization, setting the membership refresh interval, and defining whether to check for multiple user name formats. See Update Identity Store for details.

Add organization-specific accounts

By default, organization-specific users can access the ArcGIS Enterprise organization. However, they can only view items that have been shared with everyone in the organization. This is because the organization-specific accounts have not been added and granted access privileges.

Add accounts to your organization using one of the following methods:

It's recommended that you designate at least one organization-specific account as an Administrator of your portal. You can do this by choosing the Administrator role when adding the account. When you have an alternate portal administrator account, you can assign the initial administrator account to the User role or delete the account. See About the initial administrator account for more information.

Once the accounts have been added and you complete the steps below, users will be able to sign in to the organization and access content.

Configure ArcGIS Web Adaptor to use IWA

To configure ArcGIS Web Adaptor to use IWA, complete the following steps:

  1. Open Internet Information Server (IIS) Manager.
  2. In the Connections panel, locate and expand the website hosting ArcGIS Web Adaptor.
  3. Click the name of ArcGIS Web Adaptor.

    The default is arcgis.

  4. In the Home panel, double-click Authentication.
  5. Select Anonymous Authentication and click Disable.
  6. Select Windows Authentication and click Enable.
  7. Close Internet Information Server (IIS) Manager.

Verify portal access using IWA

To verify you can access the portal using IWA, complete the following steps:

  1. Open the ArcGIS Enterprise portal.

    The URL is in the format: https://organization.example.com/<context>/home.

  2. Verify that you are prompted for your organization-specific account credentials or automatically signed in using your organization-specific account. If you do not see this behavior, confirm that the Windows account you used to sign in to the machine was added to the portal.

Prevent users from creating their own built-in accounts

You can prevent users from creating their own built-in accounts by disabling the ability for users to create new built-in accounts in the organization settings.