End-to-end steps for configuring Kerberos authentication with Active Directory
The following topics are provided:
Overview
MIT Kerberos is a trusted third-party authentication service. It provides a centralized authentication server whose function is to authenticate users to servers and servers to users. It uses symmetric encryption with keys shared with the authentication server. Kerberos keeps a database containing the keys of clients and servers, and uses the keys to authenticate one network node to another. Kerberos also generates temporary session keys to be shared by the two parties in a conversation. All communications between the two parties are then encrypted with the session key. This topic describes the process of setting up BMC Atrium Single Sign-On to use Kerberos authentication.
Before you begin
- To make changes to the Microsoft Windows Active Directory, you must have administrator permissions on the domain controller computer and in the domain itself. To make changes to the BMC Atrium Single Sign-On server, you must also have administrator permissions for the BMC Atrium SSO Admin Console.
- Ensure that no BMC products have already been integrated with BMC Atrium Single Sign-On.
Configuring Kerberos authentication with Active Directory
Refer to the following topics to configure Kerberos with Active Directory.
Task | Description |
---|---|
1. Understanding how Kerberos works | Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. To understand theconceptual framework of Kerberos authentication, see Kerberos-authentication. |
2. Setting up Kerberos authentication | Follow the steps necessary for configuring Kerberos authentication with Microsoft Windows Active Directory:
For information about performing these tasks, see Configuring-Kerberos-authentication-with-Active-Directory. Note: To successfully complete the installation, perform the tasks in the sequence shown. |
3. Setting up Kerberos authentication for BMC Atrium Single Sign-On running in HA mode | To set up Kerberos authentication when the BMC Atrium Single Sign-On server is running in High Availability (HA) mode, perform the procedure mentioned in Configuring-Kerberos-authentication-in-High-Availability-mode. |
4. Chaining Kerberos with other modules | If a complex authentication chain is needed, you can create a certificate chain by using the Realm Editor on the BMC Atrium SSO Admin Console. Perform the procedures mentioned in Chaining-Kerberos-with-other-modules. |
Troubleshooting Kerberos authentication
Refer to the following topics for troubleshooting issues related to Kerberos authentication.
Issue | Description |
---|---|
Problems with krb5.ini | Debug the issue using the topic, krb5-ini-file-issues. |
Chained authentication failure for IE | Debug the issue using the topic, Chained-authentication-failure-in-Microsoft-Internet-Explorer. |
Invalid service principal name | Debug the issue using the topic, Invalid service principal name in Kerberos authentication. |
Invalid keytab index number | Debug the issue using the topic, Invalid-keytab-index-number-for-Kerberos-authentication. |
Enabling debug log in BMC Atrium Single Sign-On server | Enable the debug logs using the topic, Enabling-debug-logging-in-BMC-Atrium-SSO-server. |
Enabling Kerberos logging in JVM through system properties | To enable Kerberos logging, set the system property sun.security.krb5.debug to true. This setting allows you to monitor the execution of the Kerberos V5 protocol. |
Increasing HTTP header size in Tomcat | A Kerberos service ticket is passed as a header value in the http request. The default maximum header size in Tomcat is 4096 (4KB). At the same time, under some circumstances, the size of the header containing Kerberos service ticket might reach even 28 KB. This large size causes the logon to fail and the browser to display an error message, because Tomcat does not respond to such requests. To fix this issue, specify a maxHttpHeaderSize attribute on the http connector and set a value (in bytes) that is large enough to accommodate the header size. |
Enabling Kerberos logging on a specific computer | Microsoft Windows 2000, Windows Server 2003, and Windows Server 2008 can trace detailed Kerberos events through the event log mechanism. You can use these event logs when you troubleshoot Kerberos, particularly when you need to find service principal name (SPN) lookup problems.
|