The AIMMS PRO framework allows you to link any environment to an Active Directory domain. This setup slightly differs if your PRO server is not in the AD domain.

Link to Active Directory for AD Member Servers

If your PRO server is a member server of your Active Directory domain, setting up the link is straightforward: push the link icon on the right side of the environment box. This will open a dialog in which you must specify the name of the Active Directory domain and the authentication URL for the Active Directory. Typically, the default values provided by the dialog will be ok already. If the server is a member of the Active Directory itself, the default value that is filled in for the Active Directory domain is the name of the domain the AIMMS PRO server is a member of. The Authenticator URI will automatically point to the AIMMS PRO Server at hand.

…For a Server not in the AD Domain

The AIMMS PRO framework also allows setting up a link to an Active Directory domain, if the PRO server is not a member of the Active Directory domain. In that case, some additional steps are required:

  1. Your IT department needs to set up a service account, with rights to delegate to any service using Kerberos.
  2. You need to specify the credentials of this service account in the corresponding section of the AIMMS PRO configurator.
  3. You need to associate the Service Principal Name of your PRO server with this service account through the setspn command.
  4. The users’ browsers need to be properly configured.

Setting up a service account
As mentioned above your IT department needs to set up a service account, with rights to delegate to any service using Kerberos. This procedure won’t be covered in this manual.
But let’s assume that now you have such an account with username ADUser and password ADPassword. And you have a domain called ADDomain that will be used for your users to access AIMMS PRO. And your PRO portal is available at host

Set Active directory settings in PRO Configurator
1. Navigate to Active directory configuration section of the AIMMS PRO configurator.
2. Enter ADDomain in domain field, ADUser in Username field, ADPassword in Password field.
3. Save your configuration by clicking the corresponding button.

Associate the Service Principal Name

To determine the Service Principal Name (SPN) for your PRO server, you must know the DNS name by which PRO clients will reach the PRO server. This is the host name you specified in the Web URI field in the PRO Configurator for this node. Assuming this DNS name is, the Service Principal Name you need to associate with the service account will be


(please note the capitals used). If the service account username is ADUser within the AD domain ADDomain, you can associate the SPN with it through the command

setspn -a HTTP/ ADUser

If needed, you can associate multiple SPNs with a single service account. Important notice: do not run this command for PRO server instances that ARE in the AD domain. Running the command will result in breaking AD functionality (and this can be fixed by invoking setspn -d …).

You can check which SPNs are associated with the account by entering

setspn -l ADUser

After you have added the association, it may take some time before these changes are replicated throughout your AD forest.

After you have prepared the service account as above, you can associate a PRO environment with ADDomain by clicking the link icon on the right side of the environment box. Because your PRO server is now not a member of an AD domain, the domain field will show noDomain. You should replace it by ADDomain.

Please see the section Group SIDs (for a Server not in the AD Domain) below in order to understand how to create user groups for a Server not in the AD Domain.

Browser configuration

Below, you can find the configuration that needs to be done to the browsers of the AIMMS PRO users. You will need to go through these steps for HTTP as well as for HTTPS.

Note for IT administrators
To reduce the hassle for your users, you could propagate this setting as a Windows Group Policy. For more information, visit the Adding Sites to the Enhanced Security Configuration Zones page.

Single Sign-on

After enabling an environment for Active Directory authentication, any user navigating to the AIMMS PRO portal will be logged in automatically (without seeing the login screen) with his/her Active Directory account. As a result of a successful authentication, the PRO server will create a corresponding user within the Active Directory enabled environment. In order to log in as a different user or on a different environment, the user should log out. When that happens (manually logout), the user will be returned to the AIMMS PRO login screen.

Single Environment for Each Domain

Because of the way the single sign-on procedure works, you should only have a single environment linked to any particular Active Directory domain. If you try to link another environment to an Active Directory domain which already has an environment linked to it, you will see a corresponding error message and your changes will not be saved.

Role-based Authentication

When you add groups to an Active Directory enabled environment of which the name matches the name of a security group within the Active Directory domain,
logged on users will be dynamically added to the user groups within the environment that correspond to security groups of which they are a member. When the group membership changes upon a next logon, the group membership within the AIMMS PRO environment will change accordingly. Group membership of the admin group of the environment or groups within other environments will not be affected by this dynamic group membership modification mechanism.

Group SIDs (for a Server not in the AD Domain)

When the PRO server is not a member server of your AD domain, it will not be able to retrieve the names of the security groups of which AD users are a member, because such servers do not have, or need to have, a direct connection to your Active Directory infrastructure. In such a case, the server will have access to the Security Identifier (SID) of any group of which the logged-on user is a member. In such a case, you should enter the group SID of any AD security group you want to link to the PRO environment in the description field of the corresponding PRO group. This will allow the PRO server to also match PRO and AD groups on the basis of SIDs.

Tip: To obtain the AD group SID, use the command psgetsid from the Sysinternals suite.

On-demand User Information Retrieval

After you link an environment to an Active Directory, the environment will not be populated with all users and security groups from the Active Directory. When a user logs in via an environment that is linked to an Active Directory, AIMMS PRO will only check if any of the Active Directory security groups that the user is a member of, matches with a user group in AIMMS PRO. If a matching user group is found, the user is automatically added to this user group in the environment. When no matching groups can be found, the user will be denied access to the AIMMS PRO server. This means that in order to work with role-based authentication, you must first add a user group to the environment for each Active Directory security group that is relevant.

Project Publishing Rights for Active Directory Users

In order for a user to be allowed to publish AIMMS projects, the user needs to be a member of the AppPublishers group in the ROOT environment. However, Active Directory users are only added to user groups in the environments that correspond to the Active Directory security groups they are a member of, after they login for the first time. This means that before you can add a specific Active Directory user to the AppPublishers group, this user must first have logged in once to the AIMMS PRO Framework. After this, you can give app publishing permissions to this user with the following steps:

Following the same steps, but only dragging the user into the AimmsPublishers group will give AIMMS version publishing rights to the Active Directory user.

Return to AIMMS PRO Manual Index