This is a one-time step that must be performed in order to register the Files Advanced Web Server with the Kerberos server on the domain. We will use 'setspn.exe' to specify which LDAP account will be queried for SSO authentication checks.
Note: If you want to use mobile clients with certificate authentication, the DNS entry for the Files Advanced Web Server must be different than the name of the computer. If the Files Advanced Web Server's SPN is just the name of the computer, the Gateway server will treat the Files Advanced Web Server as "on my machine", and will not attempt to perform Kerberos authentication.
for example, computerAccess.domain.com / computer.domain.com and computerAccess.domain.com / computerGW.domain.com will work
for example, computer.domain.com / computerGW.domain.com will NOT work
Configuring the LDAP account that will handle SSO
Note: If you want to use SMB or SharePoint Data Sources, you must configure the Active Directory account to permit Kerberos delegation to each of your SMB and SharePoint data sources. For more information, please visit the Advanced Delegation Configurations article.
Note: You must be logged in with a domain account and have the rights to use setspn
e.g. If your Files Advanced Web Server is installed on ahsoka.acme.com and you want to use john@acme.com as the pre-authenticated LDAP account to grant Kerberos tickets, the command will look like this:
setspn -s HTTP/ahsoka.acme.com john
Note: The LDAP account name used in the command above MUST match the account which you will specify by the spnego.preauth.username property in web.xml.
Note: This account will typically match the LDAP account specified by the administrator in the Files Advanced web interface at General Settings -> LDAP -> LDAP Username / LDAP Password, but this is not mandatory.
e.g. If your server is running on port 444, the command will be:
setspn -s HTTP/ahsoka.acme.com:444 john
Note: The HTTP in the commands above refer to the HTTP service class, not the HTTP protocol. The HTTP service class handles both HTTP and HTTPS requests. You do not need to, and should NOT, create an SPN using HTTPS as a service class name.
Configuring the SPN for the Gateway Server
In order for the KDC ("Key Distribution Center") Kerberos server to be able to authenticate users to the gateway server, the gateway service must be registered with the KDC server by running setspn and specifying the hostname of the server on which it is running as the 'user' in the setspn command.
For this configuration to work, you will need to set an additional DNS entry for your Gateway server.
e.g. ahsoka-gw.acme.com
For example, if you gateway server is running on host 'ahsoka' in the domain and your DNS entry is ahsoka-gw.acme.com , run this command:
setspn -s HTTP/ahsoka-gw.acme.com ahsoka
setspn -s HTTP/ahsoka-gw.acme.com:444 ahsoka
Note: Both addresses should be the same and should be updated to the correct DNS entry.