kerberos authentication: who am I?

So I'm not a big fan of STAS, NTML, SSO or heartbeat authentication. What can I say, I'm a hater. Anyway - kerberos has been introduced in this version but I don't really know how to "get it going". I've enabled the AD SSO authentication, enabled SSO under device access for LAN, disabled the STAS service on my DC and then done some testing. So far it just looks like NTLM standard browser authentication that only works in IE.

What's new, what should I expect from the new kerberos stuff?

  • Hi Richard,

    Thanks for the detailed explanation!

    In the UTM, and any kerberos keytab based system I've encountered, the keytab entries could become stale or fail to renew so therefore rejoining the domain is necessary. How is this done without deleting every AD server and remaking them?

    Additionally, does this mean that the user account used in the auth server must be capable of joining devices to the domain (traditionally a domain admin)?

    Follow up, after the domain join "process" has been completed, can the user be changed to a standard user for ldap/ad traversal and authentication only?

    Lastly, where can we observe the keytabs, is it a similar process outline for any linux based system that does kerberos/AD joins?

    I'm thinking of this as an ongoing support for future reference.

    Thanks in advance,

    Emile