![]() ![]() | ![]() |
version 1.3, 2009/11/03 15:26:21 | version 1.6, 2009/11/11 21:26:48 |
---|---|
Line 7 First, Kerberize your [[system]]. Then: | Line 7 First, Kerberize your [[system]]. Then: |
7. Filter for `network.negotiate-auth`. | 7. Filter for `network.negotiate-auth`. |
7. Set `network.negotiate-auth.trusted-uris` and | 7. Set `network.negotiate-auth.trusted-uris` and |
`network.negotiate-auth.delegation-uris` to `netbsd.org`. | `network.negotiate-auth.delegation-uris` to `netbsd.org`. |
7. **(Windows only)** Filter for `use-sspi`, then set `network.auth.use-sspi` to `false`. | |
"""]] | """]] |
#### [[!toggle id="konqueror" text="Konqueror"]] | #### [[!toggle id="konqueror" text="Konqueror"]] |
Line 24 Possibly the same as [[!toggle id="safar | Line 25 Possibly the same as [[!toggle id="safar |
[[!toggleable id="ie" text=""" | [[!toggleable id="ie" text=""" |
Internet Explorer can use Microsoft's built-in Kerberos. Anyone know how? Some possibly relevant links: | Internet Explorer can use Microsoft's built-in Kerberos. Anyone know how? Some possibly relevant links: |
> Sadly, it seems MS IE can only use tickets cached inside LSA (Local Security Authority), and this cache is only created upon logon through winlogon service. Which means that a `host/<windows_machine>` principal would be needed for each Windows client that wants to cache a TGT. This is only suitable for Intranet-like networks. Maybe there is another way to manage the LSA after login, similar to [[!template id=man name=kinit section=1]]... --[[jym]] | |
* <http://rc.quest.com/topics/mod_auth_vas/howto.php#iexplore> | * <http://rc.quest.com/topics/mod_auth_vas/howto.php#iexplore> |
* <http://support.microsoft.com/kb/299838> | * <http://support.microsoft.com/kb/299838> |
* <http://technet.microsoft.com/en-us/library/cc779070(WS.10).aspx> | * <http://technet.microsoft.com/en-us/library/cc779070(WS.10).aspx> |
* <http://www.microsoft.com/downloads/details.aspx?FamilyId=49AE8576-9BB9-4126-9761-BA8011FABF38> | |
"""]] | """]] |