Adding Kerberos Constrained Delegation Authentication

Once you have setup and verified the AppTunnel works via Username/Password authentication for Acronis Access, you can modify the configurations created to allow Kerberos Constrained Delegation authentication to the Acronis Access Gateway. When this is properly configured the end user will not have to supply a username or password to enroll with management or to browse data sources.

This document will set up the basic configuration and delegate to one Acronis Acess Gateway server running on the same server as the management server to allow enrollment to that local management server and browsing of datasources configured on that gateway. Additional delegation will be required for additional Gateways, Sharepoint servers, and reshares.

If you are going to use the same iOS device to test the Kerberos Constained Delegation it is recommended you uninstall the Acronis Access Mobile client at this time.

In this section

Create a Kerberos Service Account

Create a keytab for the Kerberos Service Account

Delegate HTTP service to the Acronis Access server

Additional SCEP configuration

Additional Sentry configuration

Verify sentry/KCD communication

Testing the iOS client

Create a Kerberos Service Account
  1. Log in to your KDC server as an administrator.
  2. From the Windows Start menu, select All Programs, select Administrative Tools > Active Directory Users and Computers.
  3. In the newly opened console, expand the domain (Kerberos refers to a domain as a realm).
  4. Right-click Users and select New > User.

  5. Click Next.

  6. Click Next.
  7. Click Finish.
Create a keytab for the Kerberos Service Account

When you create a keytab, the Sentry service account is concurrently mapped to the servicePrincipalName.

  1. On the KDC server, open a command prompt window
  2. At the prompt, type the following command: ktpass /out nameofsentry.keytab /mapuser nameofuser@domain /princ HTTP/nameofuser /pass password

E.g. ktpass /out timsentry.keytab /mapuser timsentry@glilabs2008.com /princ HTTP/timsentry@glilabs2008.com /pass 123456


This warning can be ignored.

Delegate HTTP service to the Acronis Access server
  1. From the Windows Start menu, select All Programs and open Administrative Tools > Active Directory Users and Computers
  2. In the newly opened console, expand the realm (domain).
  3. Click on Users.
  4. Find and select the Kerberos user account that you created in "Create a Kerberos Service Account".
  5. Right-click on the account and select Properties.

  6. Press Add….
  7. Press Users or Computers….

  8. Click OK.
  9. Find and select the "http" service in the Add Services window.

  10. Click OK.

Note: For a large deployment with multiple Gateway Servers you should repeat steps 6 through 10 for each Gateway Server. However, for the initial setup, it's best to begin with a single Gateway Server hosting some local test folders. Once you have confirmed access to those, then you can expand to additional Gateway Servers and non-local folders.

Additional SCEP configuration
  1. Open the MobileIron VSP Admin Portal.
  2. Select Policies & Configs and open Configurations.
  3. Find the SCEP created in "Create a new SCEP".
  4. Click on its name and click Edit in the panel on the right.

  5. Click Save.

  6. Since you have modified the SCEP, you will have to re-provision the device in Mobile@Work before testing the iOS client.

Additional Sentry configuration
  1. Still in the MobileIron VSP Admin Portal, select Settings and open Sentry.
  2. Find the Sentry created in "Add and Configure the Sentry".
  3. Click on the Edit icon.

  4. Click Save.
Verify sentry/KCD communication

Using either the Sentry EXEC or the Sentry logs in the System Manager verify the Sentry is able to reach and receive a Kerberos ticket from the KDC.

Find the line "Informational only: Successfully Received Sentry Service Ticket from KDC". This verifies the Sentry is able to reach and communicate with the KDC.

Testing the iOS client

The changes we made to the SCEP must be pushed down to the iOS device. The changes we made to the Sentry can take several minutes to be pushed down to it.

On the device, open the AppConnect app -> Settings -> Check for updates and tap on "Re-Enroll Device" and follow the prompts.

You can verify the SCEP is properly updated using the iOS Settings app. Under Settings -> General -> Profiles -> The SCEP name you created -> More Details -> Certificate -> The portion after CN= you enter in the subject name of the SCEP, you should see entries for "Subject Alternative Name" and "Directory Name". If this is properly pulled from Active Directory it should match the user that you used to activate Mobile@Work.

If that is correct reinstall the Acronis Access Mobile Client. Repeat the enrollment steps from before but leave the username and password fields blank. If all is successful you should be enrolled using the account that matched the NT Principal Name in the profile you just examined.