Using Windows Pass-Through (Kerberos) Authentication (2024)

Using Windows Pass-Through (Kerberos) Authentication

It is recommended to configure SAML 2.0 Single Sign On rather than Kerberos. SAML is compatible with all device types and reduces the need to manage multiple SSO methods.

Introduction

By default AppsAnywhere presents all users with a web based login page.

Integrated Windows Authentication can also be used to allow Single Sign On (SSO) from domain machines using Kerberos. To initiate SSO automatically, you can direct users on domain machines to the following URL: https://appanywhere.uni.edu/labs

Our recommended approach is to use this URL when creating shortcuts to the AppsAnywhere portal for end-users on managed Windows devices.

You can then easily disable first-time user prompts for SSO in AppsAnywhere General Settings.

Using Windows Pass-Through (Kerberos) Authentication (1)

Note

  1. This is presuming you have already completed a Managed Deployment of AppsAnywhere Client and Cloudpaging Player to domain joined devices.

  2. From Load Balancer Configuration; all traffic sent to the backend servers from the load balancer MUST be over HTTPS/443 for Kerberos to function.

Classrooms

In a classroom environment you may also want to suppress all user prompts including the first time welcome tour and EULA.

This is to avoid students getting a slightly different experience at the start of class, which can be off-putting for tutors. To do this direct users to the special URL of: https://appanywhere.uni.edu/labs

Other SSO Methods

AppsAnywhere also supports a range of additional SSO methods for web based Single Sign On. Please refer to Single Sign On Settings for these options.

This article is focused on configuring SSO for domain joined Windows machines.

Configuring for SSO with Integrated Windows Authentication

For SSO to work on domain Windows devices using Kerberos, the following need to be in place:

  • Your AppsAnywhere appliance must be Configured for Single Sign On

  • SPN records must be created for your AppsAnywhere service account (also via the above link).

    • Single Sign On must be enabled in AppsAnywhere Admin Settings > Single Sign On

  • The Active Directory user must be imported, or be a member of an imported AD group

  • The user is logged in to a domain machine with their AD account.

  • The user is running one of the latest versions of Edge or Internet Explorer*

  • Internet Explorer is configured for automatic login either locally in Internet Options or via GPO (this is sometimes referred to as pass-thru authentication)

  • The user visits one of the above special URLs

*It is also possible to configure SSO with Google Chrome and most other browsers. We have provided some details on how to test this below but you may need to refer to the publisher for details of how to apply global browser settings in your environment.

AppsAnywhere Single Sign On Settings

As noted above; Single Sign On must be enabled in AppsAnywhere Admin Settings > Single Sign On.

However, we recommend that you leave the Action for Unauthenticated Users set to Redirect to Login. Otherwise AppsAnywhere will attempt SSO even when users visit your normal service URL (e.g.https://appanywhere.uni.edu).

The above is not normally desirable, as users on BYOD devices will never be able to use Integrated Windows Authentication for SSO.

Configuring your browser for testing Integrated Windows Authentication

Microsoft Edge

Procedure

  1. Verify that you are logged into Windows as a user in the domain.

  2. Update Internet Options.

    1. Use Windows Search and openInternet Options

    2. Navigate to the Security tab.

    3. Select Local Intranet

    4. ClickCustom level.

    5. SelectAutomatic login only in Intranet zone.

      Using Windows Pass-Through (Kerberos) Authentication (2)
    6. ClickOK.

  3. Verify that the AppsAnywhere domain is part of the local intranet zone.

    1. In theInternet Optionsdialog box on theSecurity Settingstab withLocal intranetstill selected, clickSites.

    2. In theLocal intranetdialog box, clickAdvanced.

    3. In the next dialog box (also titledLocal intranet), type the URL of your load balanced address (e.g.https://appanywhere.uni.edu) in theAdd this Web site to the zonebox, and then clickAdd.

    4. In theLocal intranetdialog, box clickOK.

    5. In the originalLocal intranetdialog box, clickOK.

    6. In theInternet Optionsdialog box, clickOK.

Firefox

Procedure

  1. In the URL text box of the Firefox browser, enterabout:configto access the advanced settings.

  2. ClickI'll be careful, I promise!.

  3. Double-clicknetwork.negotiate-auth.trusted-urisin the Preference Name column.

  4. Enter your AppsAnywhere Service URL in the text box. e.g. https://appanywhere.uni.edu

  5. ClickOK.

  6. Double-clicknetwork.negotiate-auth.delegation-urisin the Preference Name column.

  7. Enter your AppsAnywhere Service URL in the text box e.g.https://appanywhere.uni.edu

  8. ClickOK.

  9. Test Kerberos functionality by using the Firefox browser to log in to login URL e.g.https://appanywhere.uni.edu/labs

Chrome

To make SSO work in Google Chrome, configure Internet Explorer using the method described above (Chrome uses IE setting).

In addition, it should be noted that all new versions of Chrome automatically detect Kerberos support on the website.

If you are using one of the earlier Chrome (Chromium) versions, run it with the following parameters to make Kerberos authentication on your web servers work correctly:

--auth-server-whitelist="*.software2.com"
--auth-negotiate-delegate-whitelist="*.software2.com"

For example:

"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe” --auth-server-whitelist="*.software2.com " --auth-negotiate-delegate-whitelist="*.software2.com"

Finally, test Kerberos functionality by using the Firefox browser to log in to login URL e.g.https://appanywhere.uni.edu/labs

Using Windows Pass-Through (Kerberos) Authentication (3)

If the Kerberos authentication is successful, the test URL goes to the Web interface.

Deploy to managed devices

  1. Deploy the above internet settings to managed devices using Group Policy

  2. Ensure all managed devices load AppsAnywhere SSO on login using the configured URL e.g. https://appsanywhere.uni.edu/labs

Using Windows Pass-Through (Kerberos) Authentication (2024)

FAQs

Does Windows Authentication use Kerberos? ›

Integrated Windows authentication enables users to log in with their Windows credentials, using Kerberos or NTLM.

How to enable Kerberos authentication in Windows? ›

Configuring the Kerberos Configuration File
  1. Create a standard krb5. ini file and place it in the C:\Windows directory.
  2. Ensure that the KDC and Admin server specified in the krb5.ini file can be resolved from your terminal. If necessary, you can modify the following: C:\Windows\System32\drivers\etc\hosts.

Does Microsoft still use Kerberos? ›

Kerberos has been the default Windows authentication protocol since 2000, but there are still scenarios where it can't be used and where Windows falls back to NTLM.

How Kerberos can be used to perform user authentication? ›

Kerberos uses symmetric key cryptography and a key distribution center (KDC) to authenticate and verify user identities. A KDC involves three aspects: A ticket-granting server (TGS) that connects the user with the service server (SS) A Kerberos database that stores the password and identification of all verified users.

Why is Windows using NTLM instead of Kerberos? ›

Even though the Kerberos protocol is Microsoft's default authentication method today, NTLM serves as a backup. If Kerberos fails to authenticate the user, the system will attempt to use NTLM instead.

What are the disadvantages of Windows authentication? ›

Disadvantages of Windows authentication

DBAs do not have control over the AD logins and groups. The AD group membership is not known to the DBA. You do not get a notification if a user is added or removed from the AD groups.

How does Windows Kerberos authentication work? ›

Kerberos authentication uses conventional shared secret cryptography to prevent packets traveling across the network from being read or changed. It also protects messages from eavesdropping and replay attacks. Work on Kerberos began in the late 1980s.

How does Windows use Kerberos? ›

The client constructs an authenticator, which includes a date and time, and some other information. This is sent to the KDC or domain controller, which can then verify the user's identity. Kerberos uses the user's password as an encryption key, and the domain controller can see the key in clear text.

What happened to Kerberos authentication? ›

With the November 2022 security update, some things were changed as to how the Kerberos Key Distribution Center (KDC) Service on the Domain Controller determines what encryption types are supported by the KDC and what encryption types are supported by default for users, computers, Group Managed Service Accounts (gMSA), ...

What replaced Kerberos? ›

What is NTLM? NTLM is an authentication protocol. It was the default protocol used in old windows versions, but it's still used today. If for any reason Kerberos fails, NTLM will be used instead.

What version of Kerberos is on Windows? ›

Version 5

Can Kerberos replace NTLM? ›

NTLM was the preferred authentication protocol in Windows versions earlier to Windows 2000; it was then replaced by Kerberos. Microsoft still supports NTLM to provide backward compatibility.

What is Kerberos authentication for dummies? ›

Kerberos Authentication Process

A client requests a ticket for a user from the KDC, using the user's password to encrypt the request. If the KDC can decrypt the request with the user's password it has stored, it knows the client has supplied the correct password for the user.

What are the vulnerabilities of Kerberos authentication? ›

Vulnerabilities in Kerberos authentication. Still, the Kerberos authentication process is not without potential issues. In particular, the protocol is vulnerable to Kerberoasting, Golden Ticket and Silver Ticket attacks, and pass-the-ticket attacks.

How does Kerberos work step by step? ›

Kerberos Authentication Steps
  1. Step 1: The User Sends a Request to the AS. ...
  2. Step 2: The AS Issues a TGT. ...
  3. Step 3: The User Sends a Request to the TGS. ...
  4. Step 4: TGS Issues a Service Ticket. ...
  5. Step 5: The User Contacts the File Server with the Service Ticket. ...
  6. Step 6: The User Opens the Document.
Oct 1, 2020

What protocol does Windows authentication use? ›

The Windows operating system implements a default set of authentication protocols, including Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), and Digest, as part of an extensible architecture.

What authentication is used in Windows? ›

Windows authentication is designed to manage credentials for applications or services that do not require user interaction. Applications in user mode are limited in terms of what system resources they have access to, while services can have unrestricted access to the system memory and external devices.

What type of authentication is Windows authentication? ›

When you enable Windows authentication, the client browser sends a strongly hashed version of the password in a cryptographic exchange with your Web server. Windows authentication supports two authentication protocols, Kerberos and NTLM, which are defined in the <providers> element.

Does Windows authentication use LDAP? ›

Windows (NTLM) authentication can be used concurrently with LDAP authentication. Windows authentication requires entering login credentials in the browser. During LDAP authentication, user's password is checked on the Active Directory server.

Top Articles
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 5867

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.