In order to use Kerberos authentication in browser access of a station, a few things need to be configured on your local (browser) client PC (in addition to the Browser-independent setup).
First, make sure you can connect to the station using a fully qualified domain name, rather than an IP address. When authenticating
via Kerberos via a browser, the browser assumes that if you are on an address “http://some.domain.come/somepage”, then you are trying to access the service “HTTP/some.domain.com” in the Kerberos database.
Since Kerberos processes names and not IPs, your IP must be mapped to the name of the service that is intended to use. If
the correct entry is already in your DNS server, you do not need to do anything additional. If not, you can edit your client
PC’s hosts file to add an entry similar to:
“nnn.nnn.nnn.nnn some.domain.com”
For example,
172.16.10.10 kerbtest2.tridium.net
Where the IP address above maps to the Kerberos service associated with kerbtest2 on tridium.net.
Note that hosts file method is acceptable for testing, but not so good once the site is live and many people need to access it.
Next, you’ll need to set up your browsers to use Kerberos. As each browser is different, a separate procedure is given for the following popular browsers:
Using Firefox for browser access (as a Kerberos authenticated LDAP user) to a NiagaraAX station requires some client side setup. For prerequisites, see Browser-independent setup and Browser-specific setup.
Configuring Firefox to use Kerberos for LDAP
To configure Firefox on a client LDAP host to use Kerberos:
Open a Firefox window.
Type “about:config” in the location bar and press Enter.
If a warning appears, continue on (“Promise to be careful”).
In the Search box near the top of the page, type “negotiate”. This filters to six or seven attributes.
Edit the following two entries:
network.negotiate-auth.delegation-uris
network.negotiate-auth.trusted-uris
Set each to include the uris of the station(s) you will be accessing via the browser, using a comma to separate if multiple stations.
For example, if accessing stations using the URLs http://host1.domain.com/somepage, and http://host2.domain.com/somepage, enter the value in these fields to:
host1.domain.com,host2.domain.com
Firefox should now be ready for Kerberos authentication. You should now be able to log in to stations without being prompted for a username and password.
At the time of this document, only Windows-based stations (Supervisor, AX SoftJACE, or JACE-NXT) or Linux-based stations support
the “SSO login feature” from a browser. QNX-based JACE stations do not, and so require LDAP user login. For related details,
see Browser access via Kerberos.
Using Internet Explorer for browser access (as a Kerberos authenticated LDAP user) to NiagaraAX stations requires some client side setup. For prerequisites, see Browser-independent setup and Browser-specific setup.
Configuring Internet Explorer to use Kerberos for LDAP
To configure Internet Explorer on a client LDAP host to use Kerberos, you must change security settings.
Open an Internet Explorer window.
On the menu bar, go to ->
In the Internet Options dialog, click the Security tab, and select the Local intranet zone.
Click the button, and in the popup click .
Another popup appears to “Add a website to this zone”.
Type in the URL for a station and click .
For example, http://host1.domain.com
or, for SSL use (if HTTPS is enabled), https://host1.domain.com
If multiple stations, repeat each time by typing in the URL and clicking .
When done adding stations, click then to return to the Security tab.
With the Local intranet zone selected, click the button.
A popup Security Settings - Local intranet dialog appears.
Scroll down to the “User Authentication” section (near the bottom), and select “Automatic logon only in Intranet zone” to use Kerberos authentication without a prompt. If you prefer to be prompted, select the option to “Prompt for user name and password”.
Click twice to close the Internet Options dialog.
Internet Explorer should now be ready for Kerberos authentication. You should now be able to log in to stations without being prompted for a username and password.
At the time of this document, only Windows-based stations (Supervisor, AX SoftJACE, or JACE-NXT) or Linux-based stations support
the “SSO login feature” from a browser. QNX-based JACE stations do not, and so require LDAP user login. For related details,
see Browser access via Kerberos.
Using Google Chrome for browser access (as a Kerberos authenticated LDAP user) to NiagaraAX stations requires some client side setup. For prerequisites, see Browser-independent setup and Browser-specific setup.
To configure Google Chrome on a client LDAP host to use Kerberos, you must change security settings to be like those on Internet Explorer, as well as specify additional startup arguments.
Configuring Google Chrome security to use Kerberos for LDAP
If you previously configured Internet Explorer to use Kerberos for LDAP access to NiagaraAX stations, this may already be
done. However, the Chrome startup arguments still need configuration.
Configuring Google Chrome security to use Kerberos for LDAP
Open a Google Chrome window.
From the customize menu, select (or type “chrome:settings” in the location bar and press Enter) for the “Chrome Settings” page. Click “Show advanced settings...” (near the bottom).
Scroll down to the section Network, and click the button.
In the Internet Options dialog, click the Security tab, and select the Local intranet zone.
Click the button, and in the popup click .
Another popup appears to “Add a website to this zone”.
Type in the URL for a station and click .
For example, http://host1.domain.com
If multiple stations, repeat each time by typing in the URL and clicking .
When done adding stations, click then to return to the Security tab.
With the Local intranet zone selected, click the button.
A popup Security Settings - Local intranet dialog appears.
Scroll down to the “User Authentication” section (near the bottom), and select “Automatic logon only in Intranet zone” to use Kerberos authentication without a prompt. If you prefer to be prompted, select the option to “Prompt for user name and password”.
Click twice to close the Internet Options dialog.
Close all Chrome windows. See Configuring Google Chrome startup arguments.
Configuring Google Chrome startup arguments
When you start Chrome (chrome.exe), you need the following two arguments appended:
--auth-negotiate-delegate-whitelist=”host1.domain.com” ” --auth-server-whitelist=”host1.domain.com”
Where the URL for the station(s) is in quotation marks as shown above. Note if multiple stations, use a comma to separate each one, as shown below.
--auth-negotiate-delegate-whitelist=”host1.domain.com”,”host2.domain.com” ” --auth-server-whitelist=”host1.domain.com”,”host2.domain.com”
If starting Chrome from a command line, append the arguments above to the end of the command.
If starting Chrome from a shortcut, do the following:
Right-click the shortcut used to start Chrome and select “Properties”.
From the “Shortcut” tab, click in the “Target” field, and go to the end (click ).
Append the arguments as shown above to the command (after any quotation marks that may already be there).
Click to save the shortcut.
Google Chrome should now be ready for Kerberos authentication. You should now be able to log in to stations without being prompted for a username and password.
At the time of this document, only Windows-based stations (Supervisor, AX SoftJACE, or JACE-NXT) or Linux-based stations support
the “SSO login feature” from a browser. QNX-based JACE stations do not, and so require LDAP user login. For related details,
see Browser access via Kerberos.
Copyright © 2000-2014 Tridium Inc. All rights reserved.