Hi Dodi,
Looking at your scenarios-
dodiy wrote:
The scenarios can be like these:
1. Employee access service desk within company network which is join domain. (this will use Single Sign On)
2. Employee access service desk at home/outside (this will use LDAP integration)
3. Normal user access service desk from outside (use LANDesk credential)
4. Normal user access service desk within company network (use LANDesk credential)
We had a customer with an almost identical request, they wanted integrated (single sign-on) access internally and externally they wanted LDAP authentication AND they only wanted one webaddress for WebAccess. Initially we thought this wouldn't be do-able, however their server team came up with a great solution- If you enable Basic Authentication and Windows Authentication for the WebAccess application in IIS then internally it performs integrated login but externally it will prompt them to login using their LDAP credentials. You set a default Domain in the Basic Auth configuration in IIS and it works like a charm.
If you combine this with Karen's article on setting up a failover to go to explicit if integrated fails then you should be able to meet all of your scenario requirements without needing to configure LDAP.
Note: You should use HTTPS browsing for WebAccess when running this configuration otherwise Basic Auth sends usernames and passwords unencrypted, but HTTPS will cover this.
Cheers,
Hadyn