I think there are several layers here, each of which has its own question:
How can I get to the web service inside my LAN from the DMZ?
This is a difficult task because it really violates the DMZ / LAN separation concept. Usually, the connections between the LAN and the DMZ are allowed (and on a limited basis) from the local network — in this way, the unified DMZ cannot initiate contact with the local network and is extremely limited by what it can do (it cannot issue arbitrary requests, only respond to requests from the local network).
How can I use the service on another computer to authenticate username / password?
Again, this is a sticky problem - you are transmitting passwords over the network - is it possible that they are intercepted. With AD, this is solved using kerberos, a call / response system that ensures that the password is never transmitted. Of course, kerberos and similar protocols are quite complicated - you should never try to minimize your own, as this is likely to be less secure and then use something existing - for example, your web service can run on https, so, at least passwords are only plaintext on two servers, not the connection between them. Certificates can also be used to prevent traffic destined for the web service of your local network from being redirected to a reconfigured DMZ machine (the created DMZ device will not be able to fake a certificate, and therefore your system may determine that it is connected to a fake server before sending information to authentication)
In my own experience, these problems lead to the fact that AD outside the local network is simply not running. Companies prefer either to go beyond the people on the local network using VPNs authenticated with RSA keys (those small trinkets that show a constantly changing set of numbers), or they use a completely separate set of logins for services in the DMZ area.
David
source share