...
Create the domain user
In Active directory create user named
svcKeycloak
. The user should only need to be a Domain User.Once the user is made, run a
dsquery
command to get the Bind DN string (ie.CN=svcKeycloak,OU=ServiceAccounts,OU=Users,OU=VirtualWorks,DC=e1,DC=internal
)
Run the following command on domain controller to assign a SPN to the user and generate a keytab file:
Code Block ktpass -out keycloak.keytab -princ HTTP/locator.internal@COMPANY.INTERNAL -mapUser Keycloak@COMPANY.INTERNAL -pass password! -kvno 0 -ptype KRB5_NT_PRINCIPAL -crypto RC4-HMAC-NT
Configuring Active Directory integration
Go to User Storage Federation menu option
On the right side, there is a list box labeled Add Provider. Select the LDAP provider type and you will be sent to the provider's settings page.
Adjusts settings according to screen below:
Enter the display name for the provider
Choose Active Directory in Vendor field
Set Import users to On. Authority Service will import users into local database.
Set Edit Mode to Read Only. You will be unable to modify the username, email address, first and last names, or any other mapped attributes. Updates to passwords are not supported.
Set Sync registrations to Off. Users created in Authority Service will not be synced back to LDAP.
The remaining settings are dependent on particular Active Directory setup. You should adjusts example to your current configuration. To learn more about these settings, hover your mouse pointer over the tooltips in the Authority Service Admin Console.
Configuring
...
Single Sign On
Info |
---|
This configuration is optional. Perform following steps only if you want to enable Kerberos Signle Sign On. |
Run the following command on domain controller to assign a SPN to the user and generate a keytab file:
Code Block ktpass -out keycloak.keytab -princ HTTP/locator.internal@COMPANY.INTERNAL -mapUser Keycloak@COMPANY.INTERNAL -pass password! -kvno 0 -ptype KRB5_NT_PRINCIPAL -crypto RC4-HMAC-NT
Copy keycloak.ktab file to
<Saga Directory>\volumes\authority\docker-entrypoint.d
In LDAP provider configuration, turn on Kerberos integration and fill in details according to screen below
Set Allow Kerberos authentication to ON
Set your Kerberos Realm (ie.
COMPANY.INTERNAL
)Set your Server principal according to spn set on domain user (ie.
HTTP/locator.internal@COMPANY.INTERNAL
)Point to keytabfile ie.
c:\docker-entrypoint.d\keycloak.ktab
if you have copied ktab to<Saga Directory>\volumes\authority\docker-entrypoint.d
If you want to debug your configuration, set Debug to On.
Set Use Kerberos For Password Authentication to On.
...
Configuring Active Directory group mappings
This feature enables you to configure group mappings from Active Directory to Authority Service. The group mapper may be used to convert Active Directory groups from a specific branch of an LDAP tree to Authority Service groups. Additionally, it will import user-group mappings from Active Directory to Authority Service user-group mappings.
...
In LDAP provider configuration go to the Mappers tab
...
Add new mapper of type group-ldap-mapper
...
Configure as in example below
Enter LDAP Groups DN specific for your AD setup
Enter
objectSid
as Mapped Group Attributes to import group sids
...
Limitations
Active Directory user federation through LDAPS requires that the domain controller has a valid SSL certificate issued by a well-known authority.