Forum Discussion
My issue in the Single-Sign-on (SSO) used by Kerberos Constrained Delegation when we redirect the traffic to the F5 load balancer.
Dears,
I am facing an issue in the Single-Sign-on (SSO) used by Kerberos Constrained Delegation when integrated with F5.
We are using Web Proxy over the cloud, our Web services are published over this cloud portal so basically the client is accessing the portal in the cloud by using their Office 365 credentials then redirected to our internal primes applications when they click any of the published services over the portal, the authentication is working seamless where the user authenticate only once when access the portal (Kerberos is doing its job), this SSO break when we redirect the traffic to the load balancer, the user is getting another credential request once he is trying to access a service.
I was reading this article and i am not sure if this is applicable to my case coz i dont want to use a logon page from the F5 APM, i need only to pass the authentication when the server send the 401 response which contain the challaenge: https://devcentral.f5.com/articles/apm-cookbook-single-sign-on-sso-using-kerberos
At the other side, i was reading this document, also i am not sure if it is working for my case: https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-6-0/9.html
I would appreciate any help for my scenario and what should i do?
Regards, Muhannad
- Muhannad_64809
Nimbostratus
Dears,
Anyone can help me in this?
Regards, Muhannad
Maybe you could give a more specific example of what exactly doesn’t work. What does the redirect to the load balancer look like? Somethings like a drawing may help us to get a better picture.
- Muhannad_64809
Nimbostratus
If I understand correctly, the Web Proxy portal is the Identity Provider (IDP) and the LTM/APM box in your setup is a Service Provider (SP). Have you established an SAML (Federation) connection between the LTM/APM box and the Azure Web Proxy?
- Muhannad_64809
Nimbostratus
Hi Niels,
No i didn't make any SAML Federation between them, can you please provide me with any documentations to test it?
Regards, Muhannad
- Muhannad_64809
Nimbostratus
Hi Niels,
I am visiting the client site tomorrow, i will try to collect all the data for further investigations and i will share it with you.
Many thanks for your kind support.
Regards, Muhannad
- Muhannad_64809
Nimbostratus
Hi Niels,
I have checked how the client environment operates for SSO with Azure Web Proxy, the solution is providing the client with two factor authentication then grant them seamless authentication to all the Web services, it is basically a proxy that redirect the requests from the cloud to Web servers in the datacenter and there is a connector that handle the Kerbores tickets with AD, the best article that can explain the solution can be found below: https://docs.microsoft.com/en-us/azure/active-directory/active-directory-application-proxy-sso-using-kcd
Also i have done a packet sniffer from the server side when the F5-LTM bypassed, to see that the client is including an authorization negotiate when it is requesting the service (Kerboras ticket and token has been seen in the Get request, which means that there should be a kind of pre-authenticating process between Azure and AD when the client start the session.
I think that F5-APM should be part of this Kerberos Constrained Delegation process but i am not sure how this can be done.
I would appreciate your assistance about the proper integration that should be done from F5 side.
Thanks again for your help, Muhannad
In your setup, do you also use the Azure AD Proxy Connector or do you want to replace the Azure AD Proxy Connector with the BIG-IP? If you use both the Azure AD Proxy Connector and the BIG-IP, I think you don't need to use an APM Access Policy, because Kerberos Constrained Delegation is performed by the Azure AD Proxy Connector.
- Muhannad_64809
Nimbostratus
In our case we have the AD proxy connector making the delegation and it is working fine when the traffic flow to the Web Server directly but we are facing the issue when the traffic redirected to the LTM, we are unable to see the kerboras ticket in the client initial get, to be honest i am not sure why this trust domain failed once the traffic redirected to the LTM.
I would welcome any clue to check further the issue.
How do you redirect the traffic from the Web Proxy to the Server? Do you make changes in DNS? Kerberos is always picky on DNS. Make sure that the VIP on the BIG-IP has both A and PTR records set correctly.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com