Based on what your are describing, Windows Authentication in IIS will do the trick.
First some links:
However note the following:
Single singon (i.e. accessing the application without providing a username and password) will occur if all the following are true:
- The client computer and the server are part of the same Active Directory domain.
- The user session on the client computer is a user from the AD domain.
- The client computer has access to a domain server (i.e. the server responsible for the user login)
- The browser is Internet Explorer.
- The URL used points to the FQDN of the server (i.e. http://SERVERNAME.DOMAIN.NAME/ not just http://SERVERNAME/
- The authorized users must have read access to the application directory if you are using impersonate. The application will be running with their credential basically. (more details in the MSDN article)
Under any other cicompstances the user will be prompted for credential (username and password) for an account within the Active Directory Domain. So user accessing your webserver from the internet would get a popup asking them to provide a username and password.
Be advise that for user not using single signon (user being prompted for username and password) the HTTP authentication mode will most likely be BASIC which mean that any body that can intercept that connection will be able to see the username and password being exchanged. If you go with this technique make that the connection between client and server is encrypted (HTTPS or maybe a VPN).