Configure Kerberos Delegation
The supports Kerberos Delegation. This allows the Gateway to extract credentials from the Kerberos token to request a service ticket for routing.
gateway83
The
API Gateway
supports Kerberos Delegation. This allows the Gateway to extract credentials from the Kerberos token to request a service ticket for routing. Refer to the diagram in Configure the Gateway for Kerberos Token-Based Authentication to see where this task fits within the configuration workflow.
You can also configure Kerberos delegation through the
API Gateway
- XML VPN Client
. For details on how to do this, see "Authenticate a Client via Kerberos" in the XML VPN Client
online documentation. If the XML VPN Client is used, it must be connected to a Gateway policy that contains the Require WS-Security Kerberos Token Profile Credentials Assertion.
To configure Kerberos delegation on the Gateway
:- Ensure that the client is logged into the domain that is trusted by the Key Distribution Center (KDC). The client must be able to acquire the Kerberos ticket from the KDC that issued the keytab.The KDC is also known as the "Active Directory". The KDC is displayed when you run Manage Kerberos Configuration.
- Ensure that the service policy contains both these assertions:
- Access thePropertiesfor the Route via HTTP(S) assertion.
- Under theAuthenticationtab, selectUse Windows Integratedand then selectUse Delegated Credentials.
- ClickOKto exit the assertion properties.
When the Gateway authenticates a client using Kerberos delegation, the Authorization Data attributes from the Kerberos ticket are placed into context variables. For a list of the attributes, see Kerberos Ticket Authorization Context Variables.