Enportal/5.6/admin/user administration/sso/kerberos: Difference between revisions
imported>Jason.nicholls |
imported>Jason.nicholls |
||
Line 39: | Line 39: | ||
The steps for managing SSO tokens at this point are the same as for the other authentication types, refer to the main [[enportal/5.6/admin/user_administration/sso|SSO documentation]] for further information. | The steps for managing SSO tokens at this point are the same as for the other authentication types, refer to the main [[enportal/5.6/admin/user_administration/sso|SSO documentation]] for further information. | ||
=== Additional Logging === | |||
When setting up Kerberos for the first time, or trying to understand authentication issues, it may be useful to turn on additional logging: | |||
# Create or edit the file: <tt>[INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/custom.properties</tt> | |||
# Add the following on a new line: <tt>crs.kerberos.debug=true</tt> | |||
# Save the file. | |||
# Restart enPortal. | |||
With this flag enabled a lot of additional debug information will be logged to <tt>catalina.out</tt>. This setting should not be used in production. |
Latest revision as of 16:11, 21 May 2015
Overview
Kerberos authentication differs from basic, NTLM, and custom (application specific) authentication as enPortal also needs to communicate both with the proxied web application and the Kerberos authentication server as shown in the diagram below.
For configuration purposes managing SSO tokens is exactly the same as for the other authentication types. Kerberos does require an additional configuration file however which contains details about the authentication Domain and servers.
Configuring Kerberos
Pre-requisite
enPortal must be able to communicate with the KDC as configured in the Server Configuration below. By default this would require access from the enPortal server to the KDC on port 88.
Server Configuration: krb5.conf
For enPortal to perform Kerberos authentication it requires information about the authentication realm / domain and the actual kerberos servers to communicate with.
- Create or edit the file: [INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/krb5.conf
- Use the following as a basic template and update the details to reflect the installation environment:
[libdefaults] default_realm = AD.EXAMPLE.NET udp_preference_limit = 1 [realms] AD.EXAMPLE.NET = { kdc = KDC.AD.EXAMPLE.NET } [domain_realms] .ad.example.net=AD.EXAMPLE.NET ad.example.net=AD.EXAMPLE.NET
- Restart enPortal.
By default this file is automatically included in full system backups.
Managing SSO
The steps for managing SSO tokens at this point are the same as for the other authentication types, refer to the main SSO documentation for further information.
Additional Logging
When setting up Kerberos for the first time, or trying to understand authentication issues, it may be useful to turn on additional logging:
- Create or edit the file: [INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/custom.properties
- Add the following on a new line: crs.kerberos.debug=true
- Save the file.
- Restart enPortal.
With this flag enabled a lot of additional debug information will be logged to catalina.out. This setting should not be used in production.