Reference Guide
...
Windows Authentication on the ...
Windows Authentication on the Kron PAM Desktop Client
windows authentication can be used to log in to the kron pam desktop client as well the required settings are outlined in this section the following terms are used in the configuration steps domain controller configuration the following configurations should be set on the domain controller create a user (ex username ssotest , password 123 ) create an spn (service principal name) for this user, using the following command setspn a http/ kronpamserverhostname username example setspn a http/testsso krontech new\ internal ssotest create a ssotest keytab file using the following command krb5 nt principal ) ktpass /out c \ keytabfilename /mapuser username @ domainname /princ http/ kronpamserverhostname\@domainname /pass password /kvno 0 ptype krb5 nt principal (ex ktpass /out c \ ssotest keytab /mapuser ssotest @ krontech new\ internal /princ http/ testsso krontech new\ internal @ krontech new\ internal /pass 123 /kvno 0 ptype krb5 nt principal) kron pam server configuration the following configurations should be set on the kron pam server connect to kronpam cli as the pamuser user move the “ssotest keytab” file under “$catalina base/conf/” the default catalina base directory is pam/gui/ create the krb5 ini file in the tomcat server under $ catalina base/conf/ with the following example content \[libdefaults] default realm = krontech new\ internal default keytab name = file /pam/gui/conf/ ssotest keytab default tkt enctypes = rc4 hmac,aes256 cts hmac sha1 96,aes128 cts hmac sha1 96 default tgs enctypes = rc4 hmac,aes256 cts hmac sha1 96,aes128 cts hmac sha1 96 forwardable=true allow weak crypto=true \[realms] krontech new\ internal = { kdc = krontech dc krontech new\ internal 88 } \[domain realm] krontech new\ internal = krontech new\ internal krontech new\ internal = krontech new\ internal add the following lines in pam gui service file under /usr/lib/systemd/system/ directory djava security krb5 conf=/pam/gui/conf/krb5 ini djavax security auth usesubjectcredsonly=false example environment="java opts= djava security krb5 conf=/pam/gui/conf/krb5 ini djavax security auth usesubjectcredsonly=false agentlib\ jdwp=transport=dt socket,server=y,suspend=n,address=8000 xmx2048m xms256m duser language=en duser region=us duser timezone=etc/gmt 3 dlog4j2 formatmsgnolookups=true … systemctl daemon reload and then restart pam gui service for windows authentication within desktop client, the internet explorer should be configured as explained in the next section client internet explorer configuration the following configurations should be set on the client’s internet explorer go to settings > internet options > security select local intranet zone, click the sites button, check all three options, and click the advanced button to add the kronpamserverhostname with https to this zone ex https //testsso krontech new\ internal select local intranet zone click the custom level button and select automatic logon only intranet kron pam gui configuration add the following parameters in the system config manager navigate to administration > system config man add these parameters windows auth keytab path = /pam/gui/conf/ ssotest keytab windows auth spn = http/ kronpamserverhostname example value http/ testsso krontech new\ internal aioc auth rdc = true restart pam gui service again