Forum Discussion
Kerberos Question
Technically speaking, APM Kerberos SSO (server side) employs Kerberos Protocol Transition (KPT - S4U2Self) and Kerberos Constrained Delegation (KCD - S4U2Proxy). APM uses an account in the realm as a delegation anchor. A Kerberos AS_REQ is generated for this delegation account to get a TGT. The first TGS_REQ is the S4U2Self to get a delegated TGT for the user, and the second TGS_REQ is the S4U2Proxy KCD request for a ticket to the target service.
The SPN of the target pool member can be derived in one of three primary ways:
-
By default APM Kerberos SSO will perform a reverse DNS lookup into the realm with the chosen pool member's IP address. The returned name is then crafted into a SPN value (assuming the local system "owns" the web service)
-
A "SPN pattern" can be applied to the APM Kerberos SSO profile to circumvent the above lookup for a statically defined string value (ex. HTTP/target-service.domain.com@DOMAIN.COM)
-
You can use a wildcard in the SPN pattern field to either derive the hostname from the incoming host name - %h, or from a local Hosts entry based on the pool member IP address - %s (ex. HTTP/%s@DOMAIN.COM)
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com