This section provides instructions for configuring Sentinel to work with Kerberos authentication.
Before you continue, ensure that you have met all prerequisites. For more information, see Prerequisites for MFA, Kerberos, and OAuth.
NOTE:Before you continue, ensure that you have read the enablement considerations and met all prerequisites. For more information, see Enablement Considerations and Prerequisites for MFA, Kerberos, and OAuth.
To use Kerberos authentication in Sentinel, you must complete the following steps on the Sentinel server.
Log in to the Sentinel server as the novell user.
Go to the <sentinel_installation_path>/etc/opt/novell/sentinel/config directory and complete the following steps:
Open the osp-configuration.properties file.
Add the following properties:
com.netiq.sentinel.osp.krb.enabled=true
com.netiq.sentinel.osp.login.method=krb
To use Kerberos authentication in Sentinel, you need to create a new Active Directory user account for the Sentinel server. The user account name must use the DNS name of the Sentinel server. Use the Active Directory administration tools to configure Active Directory for Kerberos authentication.
NOTE:For domain or realm references, use uppercase format. For example @MYCOMPANY.COM.
As an Administrator in Active Directory, use the Microsoft Management Console (MMC) to create a new user account with the DNS name of the Sentinel server.
For example, if the DNS name of the Sentinel server is sentinel.mycompany.com, ensure the following:
First name: sentinel
User logon name: HTTP_sentinel.mycompany.com
NOTE:The slash character ( / ) is not supported during user creation. After you save the user account, edit the user account and replace / with an underscore ( _ ).
Pre-windows logon name: sentinel
Set password: Specify the appropriate password
Password never expires: TRUE
User must change password at next logon: FALSE
This account supports Kerberos AES 128 bit encryption: TRUE
This account supports Kerberos AES 256 bit encryption: TRUE
Do not require Kerberos preauthentication: TRUE
To associate the new user with the Service Principal Name (SPN), complete the following steps:
Open a cmd shell.
Run the following command:
setspn -A HTTP/DNS_Sentinel_server@WINDOWS-DOMAIN userID
For example:
setspn -A HTTP/sentinel.mycompany.com@MYCOMPANY.COM sentinel
To generate the keytab file, complete the following steps:
At the command prompt, enter the following:
ktpass /out filename.keytab /princ servicePrincipalName /mapuser userPrincipalName /pass password /crypto AES256-SHA1 /ptype KRB5_NT_PRINCIPAL
For example:
ktpass /out sentinel.keytab /princ HTTP/sentinel.mycompany.com@MYCOMPANY.COM /mapuser sentinel /pass Passw0rd /crypto AES256-SHA1 /ptype KRB5_NT_PRINCIPAL
IMPORTANT:For domain or realm references, use uppercase format. For example, @MYCOMPANY.COM.
Copy the filename.keytab file to the /etc/opt/novell/sentinel/config directory on the Sentinel server, and then change the file permission to novell.
Log in to the Sentinel server as the novel user.
Go to the <sentinel_installation_path>/etc/opt/novell/sentinel/config directory and create krb5.conf.
Open krb5.conf and add the following:
# Default Kerberos Realm [libdefaults] default_realm = <WINDOWS-DOMAIN> kdc_timeout = 15000 max_retries = 2 udp_preference_limit = 1 admin_server = <DomainControllerIPAddress> default_tkt_enctypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96 default_tgs_enctypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96 permitted_enctypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96 # Define Kerberos Realms. Each realm needs to be in its own section [realms] <WINDOWS-DOMAIN> = { kdc = <DomainControllerIPAddress> } # Define Domain to Kerberos Realm mapping for each realm [domain_realm] <Windows-Domain> = <WINDOWS-DOMAIN> # Logging [logging] kdc = FILE:/home/novell/kdc.log admin_server = FILE:/home/novell/admin.log default = SYSLOG:NOTICE:DAEMON
In the <sentinel_installation_path>/etc/opt/novell/sentinel/config directory, open the auth.login file and add the following entry:
com.sun.security.jgss.krb5.accept { com.sun.security.auth.module.Krb5LoginModule required debug="true" refreshKrb5Config="true" doNotPrompt="true" principal="HTTP/<DNS_Sentinel_server>@<WINDOWS-DOMAIN>" useKeyTab="true" keyTab="/etc/opt/novell/sentinel/config/<filename>.keytab" useTicketCache="false" storeKey="true"; };
(Optional) To enable debug logs for troubleshooting, complete the following steps:
In the /etc/opt/novell/sentinel/config directory, open the server.conf file.
Ensure the following:
wrapper.java.additional.50=-Dsun.security.krb5.debug=true
com.netiq.sentinel.osp.logging.level=ALL
Ensure that user mapping are correct between AD, LDAP, and Sentinel.
Restart the Sentinel server:
systemctl restart sentinel.service
or
<sentinel_installation_path>/opt/novell/sentinel/bin/server.sh restart
(Conditional) If you are running Sentinel in an HA environment, log in to the active node of the HA cluster and run the following command:
csync2 -x -v
To use Kerberos authentication in Sentinel, any browser you use to access Sentinel must use Integrated Windows Authentication.
NOTE:You must perform this procedure for each user’s computer.
In the Internet Options dialog box, click Security.
Click Trusted Sites > Sites.
Add the DNS name of the Sentinel server.
For example: https://sentinel.mycompany.com
Click Add, then click Close.
Click Custom level.
Under User Authentication, select Automatic logon with current user name and password.
Click OK.
Repeat this procedure for each end-user computer.
In the browser’s address field, type about:config.
Set the Value of the following Preferences to the Windows domain name, such as .mycompany.com:
network.automatic-ntlm-auth.trusted-uris
network.negotiate-auth.trusted-uris
Repeat this procedure for each end-user computer.
Go to Settings, and then click Show advanced settings.
Under Network, click Change proxy settings.
In the Internet Properties dialog box, click Security.
Click Trusted Sites > Sites.
Add the DNS name of the Sentinel server.
For example: https://sentinel.mycompany.com
Click Add, then click Close.
Click Custom level.
Under User Authentication, select Automatic logon with current user name and password.
Click OK.
Repeat this procedure for each end-user computer.