Enportal/5.6/admin/user administration/sso/kerberos: Difference between revisions

imported>Jason.nicholls
No edit summary
imported>Jason.nicholls
 
(4 intermediate revisions by the same user not shown)
Line 2: Line 2:
{{DISPLAYTITLE:Kerberos Configuration for SSO}}
{{DISPLAYTITLE:Kerberos Configuration for SSO}}
==Overview==
==Overview==
Kerberos authentication differs from basic, NTLM, and custom (application specific) authentication as enPortal also needs to communicate both with the proxied web application and the Kerberos authentication server as shown in the diagram below.
For configuration purposes managing SSO tokens is exactly the same as for the other authentication types. Kerberos does require an additional configuration file however which contains details about the authentication Domain and servers.


[[File:enportal-5.6-kerberos-sso.png|frame|center|SSO with Kerberos]]
[[File:enportal-5.6-kerberos-sso.png|frame|center|SSO with Kerberos]]
== Configuring Kerberos ==
=== Pre-requisite ===
enPortal must be able to communicate with the KDC as configured in the Server Configuration below. By default this would require access from the enPortal server to the KDC on port 88.
=== Server Configuration: krb5.conf ===
For enPortal to perform Kerberos authentication it requires information about the authentication realm / domain and the actual kerberos servers to communicate with.
# Create or edit the file: <tt>[INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/krb5.conf</tt>
# Use the following as a basic template and update the details to reflect the installation environment:
  [libdefaults]
      default_realm = AD.EXAMPLE.NET
      udp_preference_limit = 1
  [realms]
      AD.EXAMPLE.NET = {
          kdc = KDC.AD.EXAMPLE.NET
      }
  [domain_realms]
  .ad.example.net=AD.EXAMPLE.NET
  ad.example.net=AD.EXAMPLE.NET
<ol start='3'><li>Restart enPortal.</li></ol>
By default this file is automatically included in full system backups.
=== Managing SSO ===
The steps for managing SSO tokens at this point are the same as for the other authentication types, refer to the main [[enportal/5.6/admin/user_administration/sso|SSO documentation]] for further information.
=== Additional Logging ===
When setting up Kerberos for the first time, or trying to understand authentication issues, it may be useful to turn on additional logging:
# Create or edit the file: <tt>[INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/custom.properties</tt>
# Add the following on a new line: <tt>crs.kerberos.debug=true</tt>
# Save the file.
# Restart enPortal.
With this flag enabled a lot of additional debug information will be logged to <tt>catalina.out</tt>. This setting should not be used in production.

Latest revision as of 16:11, 21 May 2015


Overview

Kerberos authentication differs from basic, NTLM, and custom (application specific) authentication as enPortal also needs to communicate both with the proxied web application and the Kerberos authentication server as shown in the diagram below.

For configuration purposes managing SSO tokens is exactly the same as for the other authentication types. Kerberos does require an additional configuration file however which contains details about the authentication Domain and servers.

SSO with Kerberos


Configuring Kerberos

Pre-requisite

enPortal must be able to communicate with the KDC as configured in the Server Configuration below. By default this would require access from the enPortal server to the KDC on port 88.

Server Configuration: krb5.conf

For enPortal to perform Kerberos authentication it requires information about the authentication realm / domain and the actual kerberos servers to communicate with.

  1. Create or edit the file: [INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/krb5.conf
  2. Use the following as a basic template and update the details to reflect the installation environment:
  [libdefaults]
      default_realm = AD.EXAMPLE.NET
      udp_preference_limit = 1
  [realms]
      AD.EXAMPLE.NET = {
          kdc = KDC.AD.EXAMPLE.NET
      }
  [domain_realms]
  .ad.example.net=AD.EXAMPLE.NET
  ad.example.net=AD.EXAMPLE.NET
  1. Restart enPortal.

By default this file is automatically included in full system backups.

Managing SSO

The steps for managing SSO tokens at this point are the same as for the other authentication types, refer to the main SSO documentation for further information.

Additional Logging

When setting up Kerberos for the first time, or trying to understand authentication issues, it may be useful to turn on additional logging:

  1. Create or edit the file: [INSTALL_HOME]/server/webapps/enportal/WEB-INF/config/custom.properties
  2. Add the following on a new line: crs.kerberos.debug=true
  3. Save the file.
  4. Restart enPortal.

With this flag enabled a lot of additional debug information will be logged to catalina.out. This setting should not be used in production.