kerberos authentication: who am I?

So I'm not a big fan of STAS, NTML, SSO or heartbeat authentication. What can I say, I'm a hater. Anyway - kerberos has been introduced in this version but I don't really know how to "get it going". I've enabled the AD SSO authentication, enabled SSO under device access for LAN, disabled the STAS service on my DC and then done some testing. So far it just looks like NTLM standard browser authentication that only works in IE.

What's new, what should I expect from the new kerberos stuff?

Parents
  • The HowTo is quite simple:

     

    Create DNS Record on your DNS Server. 

    Create a DNS Request Route to your DNS Server

    (Windows: DNS Manager - DNS - Your Server - Forward Lookup Zones - Your Domain - Create new Host(A) XG(Hostname) XG Interface IP).

    Activate AD SSO in your Zones. 

    Activate AD SSO in Services - Web Authentication. 

    Create the AD Server on XG with Administrator Rights (or at least rights to read Kerberos and Add a Machine to AD). 

    Simply "save" the AD Server, if the server was already in place. 

     

    You should be able to resolve the hostname of XG (for example your XG Hostname is "XG"). XG needs to be able to do it. Try the Diagnostic DNS Lookup, put XG.domain.local and it should give you a lookup. 

     

    (At this time, the XG should self join the AD).

     

     

    Most of those steps are already done on most setups. 

     

    Maybe disable NTLM on the AD SSO Zone. 

    __________________________________________________________________________________________________________________

  • I appear to have made some positive progress from the notes above, thank you. The only thing that doesn't marry up and would be great - is the option to turn off NTLM, and just have kerberos, passing to captive portal if that fails.

    I don't even know if that makes sense, but if I browse on my domain joined machine, it looks great (with and WITHOUT proxy settings, which is interesting) - however if I browse on my none domain joined machine I'm getting an NTLM prompt , which is ugly, I'd rather the captive portal in this case. There is no option to untick "NTLM" under device access anymore, seems to be bundled with AD SSO.

     

    edit: ahh disable NTLM on the Zone, not the device access... I see. I'll try that in the coming days. Cheers.

    ------------------------------------------------

    worlds number one free ICMP monitoring platform: https://pinescore.com

Reply
  • I appear to have made some positive progress from the notes above, thank you. The only thing that doesn't marry up and would be great - is the option to turn off NTLM, and just have kerberos, passing to captive portal if that fails.

    I don't even know if that makes sense, but if I browse on my domain joined machine, it looks great (with and WITHOUT proxy settings, which is interesting) - however if I browse on my none domain joined machine I'm getting an NTLM prompt , which is ugly, I'd rather the captive portal in this case. There is no option to untick "NTLM" under device access anymore, seems to be bundled with AD SSO.

     

    edit: ahh disable NTLM on the Zone, not the device access... I see. I'll try that in the coming days. Cheers.

    ------------------------------------------------

    worlds number one free ICMP monitoring platform: https://pinescore.com

Children
No Data