Forum Discussion

drugovm_149811's avatar
drugovm_149811
Icon for Nimbostratus rankNimbostratus
Apr 03, 2014

Kerberos Authenication cross multiple domains

Hi there,

 

I'm having a hard time getting kerberos to work a cross multiple domains (two way trust) Version of APM 11.5

 

Within a domain Kerberos Authentication works fine but when I attempt to access resource from another domain it's failing

 

My setup is something like this

 

trusteddomain.local untrusteddomain.local

 

SPN and all kerberos setting were created in unstrusted domain

 

I did the following steps to implement it (maybe it will help somebody else as well)

 

On the untrusted domain

 

setspn -U -A HTTP/internal.something.org f5kerberos ktpass -princ HTTP/internal.something.org@UNTRUSTEDDOMAIN.LOCAL -mapuser f5kerberos@UNTRUSTEDDOMAIN.LOCAL -crypto rc4-hmac-nt -ptype KRB5_NT_SRV_HST -pass supersecret -out C:\f5kerberos

 

On F5

 

AAA Server

 

Auth Realm: UNTRUSTEDDOMAIN.LOCAL Service name: HTTP Principal: HTTP/internal.something.org@UNTRUSTEDDOMAIN.LOCAL

 

SSO Config

 

Kerberos Realm: UNTRUSTEDDOMAIN.LOCAL Account name: f5kerberos Account password supersecret

 

Access policy

 

HTTP 401 response

 

basic+negotiate

 

Basic Auth Realm: MHPSHP.LOCAL

 

On negotiate - kerberos - sso - allow

 

Evertyhing works fine from untrusteddomain but doesn't work from trusteddomain.

 

I tried implementing NTLM Auth and it was failing as well. My main point is to get seamless authentication for the user and the use form based sso to login to some other web apps

 

4 Replies

  • Thank you. I went over document and I see that in the access policy you are not calling kerberos authentication for seamless login. You are using form for user credentials that then passing over to KDC to get the ticket and then passing over to sso

     

    This kind of setup works in my setup but my main point is to implement seamless login for the end users and be able to manipulate user credentials

     

  • Looks like you have found limitation for constrained delegation in cross forest trust:

     

    See Microsoft DS team answer in this post:

     

    http://social.technet.microsoft.com/Forums/en-US/f47b10c6-f546-49b4-9bff-4ef534297675/crossforest-kerberos-authentication-delegation-of-client-credentials?forum=winserverDS

     

  • I'm scratching Kerberos all together. Sharepoint is already setup to accept ntlm from second domain