- Kerberos authentication must be enabled in Active Directory.
- Install Identity Gateway and ensure the Java environment truststore is setup to trust server certificates.
- Ensure the Identity Gateway and the Active Directory servers can reach one another.
- Synchronize the time between the Identity Gateway and the Active Directory server.
- Create krb5.conf in the Java environment /lib/security/ directory. Here is a sample krb5.conf file.
- Create spengo.conf. Here is a sample spengo.conf file. You will need the path of this file in a later step.
- Create an Active Directory service account for Identity Gateway.
- Issue the following command on the Active Directory server assuming demoig.server.frdpcloud.org is the fully qualified domain name of the Identity Gateway Server and igsa is the service account samaccountname:
setspn -s HTTP/demoig.server.frdpcloud.org igsa
- Follow the Gateway Communication node setup.
- Ensure the Client you will use to test the Kerberos Authentication has a valid Kerberos Ticket.
- Ensure the Client you will use to test the Kerberos Authentication has added the Identity Gateway FQDN to the sites in the following zone -
IE -> Internet Options -> Security -> Local Intranet -> Sites -> Advance
- Replace the AuthenticateLocalUser Groovy script in the IdentityAssertionRoute.json with the sample Kerberos Groovy script
- Ensure the service account credentials are properly configured in the Kerberos Groovy script.
- Ensure the spengo.conf file location is properly configured in the Kerberos Groovy script.
- Modify the CreateAssertionJwt to include the attribute.kerbUsername. You can simply replace line 103 in the IdentityAssertionRoute.json with
"samaccountname": "${attribute.kerbUsername}"
- In the sample Journey ensure the samaccountname is mapped to the username.
- Ensure a test user exists in your Identity Cloud environment with the same username as the samaccountname of the user you plan on testing within.
Run the sample Journey from the Client browser with a valid Kerberos ticket that can reach both Identity Cloud and Identity Gateway. The result should be the user can login with a Kerberos ticket in Identity Cloud.