Reference Guide
Kron PAM Administration
Windows Authentication on the Kron PAM GUI
5 min
windows authentication can be used to log in to the kron pam gui the required settings are outlined in this section the following terms are used in the configuration steps domain controller domaincontrollerfqdn (ex win test singleconnect com) kron pam server schostnamefqdn (ex sc test singleconnect com) domain name domainname (ex singleconnect com) domain controller configuration the following configurations should be set on the domain controller create a user (ex username win auth, password 123) create an spn (service principal name) for this user, using the following command setspn a http/ singleserverhostname username (ex setspn a http/ sc test singleconnect com win auth) create an “sc keytab” file using the following command ktpass /out c \sc keytab /mapuser usernamefqnd /princ http/ schostnamefqdn\@domainname /pass password /kvno 0 ptype krb5 nt principal (ex\ ktpass /out c \sc keytab /mapuser win auth\@singleconnect com /princ http/sc test singleconnect com\@singleconnect com /pass 123 /kvno ptype krb5 nt principal) kron pam server configuration the following configurations should be set on the single connect server establish an ssh connection to kron pam as the pamuser user move the “sc keytab” file under “$catalina base/conf/” (the default catalina base directory is “u01/netright tomcat”) create the “krb5 ini” file in the tomcat server under “$catalina base/conf/” with the following example content \[libdefaults] default realm = singleconnect com default keytab name = file /u01/netright tomcat/conf/sc keytab default tkt enctypes = rc4 hmac,aes256 cts hmac sha1 96,aes128 cts hmac sha1 96 default tgs enctypes = rc4 hmac,aes256 cts hmac sha1 96,aes128 cts hmac sha1 96 forwardable=true allow weak crypto=true \[realms] singleconnect com = { kdc = win test singleconnect com 88 } \[domain realm] singleconnect com= singleconnect com singleconnect com= singleconnect com add the following lines in pam gui service file under /usr/lib/systemd/system directory djava security krb5 conf=/u01/netright tomcat/conf/krb5 ini djavax security auth usesubjectcredsonly=false example environment="java opts= djava security krb5 conf=/u01/netright tomcat/conf/krb5 ini djavax security auth usesubjectcredsonly=false agentlib\ jdwp=transport=dt socket,server=y,suspend=n,address=8000 xmx2048m xms256m duser language=en duser region=us duser timezone=etc/gmt 3 dlog4j2 formatmsgnolookups=true djava security properties=/u01/kron/security/java security dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml dlog4j configurationfile=/u01/netright tomcat/conf/log4j2 xml" client browser configuration the following configurations should be set on the client’s browser configurations made for internet explorer (ie) also activate the edge and chrome browsers for internet explorer (ie) go to settings > internet options > security select local intranet zone , click the sites button, check all three options, and click the advanced button to add the kron pam server name to this zone ex http //sc test singleconnect com select local intranet zone , click the custom level button, and select automatic logon only intranet for firefox type about\ config on the address bar, accept the warning and change the network negotiate auth trusted uris value to kron pam server hostname ex http //sc test singleconnect com restart the computer access the application by typing the kron pam server hostname on the address bar, without the ip ex http //sc test singleconnect com kron pam gui configuration add the following parameters in the system config manager navigate to administration > system config man add these parameters windows auth keytab path = /u01/netright tomcat/conf/sc keytab windows auth spn = http/singleconnectservername example value http/sc test singleconnect com aioc auth windows = true