Forum Discussion
kerberos and ntlm authentication using APM
Hi,
I have setup sharepoint 2010 iApp, using NTLM authentication and it is working well(using the F5 login page), however, I now have a requirement to use kerberos authentication, as well as NTLM. In effect, if the kerberos is not present, then the NTLM should be used as the default. Another requirement, is that if a user is already logged into their windows 7 workstation, then their credentials should be silently passed to the F5 to allow kerberos authentication "transparently" without the user having to see a login page.
Currently I have read many documents, but settled on the "Access policy manager, Single Sign On configuration guide" for v11.3(HF3). This details the NTLM setup nicely and also a "client based certificate" setup using kerberos. Whilst this is instructive, it does not actually help, as my scenario does not involve client side certificates(unless I am mistaken). I have created a kerberos SSO config, and am at the stage of editing the access policy, but it is at this piont, where I seem to have a lot of choices and not much documentation. Has anyone done this already, and could offer me any pionters. As a first off, I would like to just get kerberos SSO working, then I could work on getting both NTLM and Kerberos.
any links to documentation, or even better a similar example would be extemely appreciated.
thanks
Sc0tt....
- Kevin_StewartEmployeeOne of the beauties of APM's authentication FULL proxy is its native distinction between client side and server side authentication functions. While you can do client side certificate to server side Kerberos, the only things that Kerberos really needs is a valid domain username and realm, and it doesn't matter how it gets those. That said, you present a few (doable) challenges in your request that should be addressed separately.
- elastic_82555NimbostratusKevin,
- elastic_82555NimbostratusHI,
- Kevin_StewartEmployeeThat's a decent document, though I would add a few thoughts:
- emssie_128887NimbostratusI am new to this forum and to F5 prodcuts in general. I was troubleshooting an issue with APM Kerberos Auth AAA and stumbled to this forum. Very good discussion indeed. I have done most of the things pointed out on this article
- Kevin_StewartEmployeeOkay, to start with let's clarify that the Kerberos AAA is a client side config. If you have to use Kerberos on the server side, that's a completely different set of options. Here are some things to look at as you troubleshoot APM Kerberos AAA:
- Kevin_StewartEmployeeThe above klist command should be:
- emssie_128887NimbostratusThank you Kevin,
- Kevin_StewartEmployeeTry this:
- emssie_128887Nimbostratus
OK, I finally got this to work. on creating the keytab file, I notieced I was using the "domainname\UserName" parameter while mapping the user to the SPN as show below
ktpass -princ HTTP/www.example.com@EXAMPLE.COM -mapuser example\joe.user -ptype KRB5_NT_PRINCIPAL -pass password -out c:\temp\www.example.com.keytab
I created a new keytab file but changed the -mapuser to "username@EXAMPLE.COM.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com