Kerberos Ticket Hand-off No Good on Chrome on macOS XRenewing kerberos ticket without user interventionNTLM token sent instead of Kerberos ticketSquid Kerberos/LDAP Active Directory only works on IE not on Firefox and chromeGoogle Chrome and kerberos authentication against ApacheWill IE send a Kerberos ticket if not in a Domain?Get a user's kerberos ticket updated over VPNProxy Kerberos Authentication - Kerberos Service Ticket IssuesConfiguring Google Chrome to Connect to AD Configured with Kerberos and Using ADFSDelegation works on some browsers but not on othersHow to prevent browser password prompts when no Active Directory single-sign-on?

Split into three!

Computing elements of a 1000 x 60 matrix exhausts RAM

Way of refund if scammed?

Sony VAIO Duo 13 Wifi not working on Ubuntu 16.04

If a character has cast the Fly spell on themselves, can they "hand off" to the Levitate spell without interruption?

Singular Integration

Make the `diff` command look only for differences from a specified range of lines

Caught with my phone during an exam

Which are the advantages/disadvantages of includestandalone?

How to tease a romance without a cat and mouse chase?

Why is 'additive' EQ more difficult to use than 'subtractive'?

Is it OK to look at the list of played moves during the game to determine the status of the 50 move rule?

How to become an Editorial board member?

What pc resources are used when bruteforcing?

What is the winged creature on the back of the Mordenkainen's Tome of Foes book?

csname in newenviroment

Can a UK national work as a paid shop assistant in the USA?

Does attacking (or having a rider attack) cancel Charge/Pounce-like abilities?

Shell builtin `printf` line limit?

Why did Nick Fury not hesitate in blowing up the plane he thought was carrying a nuke?

How to test if argument is a single space?

(For training purposes) Are there any openings with rook pawns that are more effective than others (and if so, what are they)?

Is it normal to "extract a paper" from a master thesis?

What is this dime sized black bug with white on the segments near Loveland Colorodao?



Kerberos Ticket Hand-off No Good on Chrome on macOS X


Renewing kerberos ticket without user interventionNTLM token sent instead of Kerberos ticketSquid Kerberos/LDAP Active Directory only works on IE not on Firefox and chromeGoogle Chrome and kerberos authentication against ApacheWill IE send a Kerberos ticket if not in a Domain?Get a user's kerberos ticket updated over VPNProxy Kerberos Authentication - Kerberos Service Ticket IssuesConfiguring Google Chrome to Connect to AD Configured with Kerberos and Using ADFSDelegation works on some browsers but not on othersHow to prevent browser password prompts when no Active Directory single-sign-on?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I am implementing Okta as a single-sign on provider in an enterprise environment of about 90 users. One of Okta's features is Desktop Single Sign On - the ability for users to be authenticated with Okta simply by virtue of having logged into their machine and thereby authenticating with the domain. The user simply opens a browser, goes to the company's Okta tenant URL, and they are logged in.



Without this feature, the user would be prompted for their credentials when loading up the Okta tenant URL.



DSSO is accomplished by the browser picking up a Kerberos ticket from the OS that itself is generated when the user authenticates with the Active Directory domain. The browser then hands this ticket back to the server, and the server communicates with the Okta cloud to authenticate the user.



The authentication flow in our environment goes like this:



  1. User logs into their machine. A kerberos ticket is generated upon login and authentication with the domain.

  2. User opens their browser, and either tries to access an Okta-protected/integrated app, or goes directly to their Okta portal.

  3. User is redirected by Okta to our load balancer, which terminates the request at the IWA web app on the web server

  4. IWA web app challenges the browser for authentication

  5. Browser grabs the Kerberos ticket from the OS and hands it to the load balancer, which passes it to the IWA web app

  6. IWA app validates the ticket and fetches user profile from AD

  7. IWA app generates and digitally signs an SSO token and sends it to the browser

  8. Browser returns the tokent to Okta via HTML form POST

  9. Okta completes the sign-in request and returns the user to the app with an SSO token

The process is failing on step 5, and I know this is the case because:



  1. Chrome prompts the user for NTLM credentials when the Okta tenant URL is requested

  2. This prompt happens before the IWA web app and the browser is configured properly for DSSO (per the documentation I linked at the beginning)

  3. The prompt does not happen on Chrome, Firefox, and Internet Explorer on Windows (DSSO works on Windows with Chrome, Firefox, and IE)

  4. This prompt does not happen in Safari on macOS X, but does happen with Chrome and Firefox in OS X

What I cannot figure out is why Chrome and Firefox are not picking up the Kerberos ticket from the OS in macOS X, but the same browsers in Windows are picking up the ticket without a hitch.



Steps I've tried:




  1. Setting Chrome's whitelist settings with the following terminal
    commands (recommended by Okta's documentation):



    $ defaults write com.google.Chrome AuthServerWhitelist
    "*.example.com"



    $ defaults write com.google.Chrome AuthNegotiateDelegateWhitelist
    "*.example.com"



  2. Setting Chrome's whitelist settings with SimpleMDM configuration push (this method actually succeeded in pushing the settings to Chrome - proven by going to chrome://policy and seeing the settings)

  3. Uninstalling anti-virus

  4. Adding every possible FQDN to the list of servers whitelisted in step 2 - first just the servers we have whitelisted in Windows (because Windows actually works), and then a list of Okta servers recommended by Okta support

I still cannot get this feature to work and I am now trying to figure out if there's a way to troubleshoot the process Chrome uses to pickup the Kerberos ticket from the OS. Some kind of debugger for Chrome's Kerberos ticket pickup mechanism would be great, but I imagine no such thing is available.










share|improve this question




























    0















    I am implementing Okta as a single-sign on provider in an enterprise environment of about 90 users. One of Okta's features is Desktop Single Sign On - the ability for users to be authenticated with Okta simply by virtue of having logged into their machine and thereby authenticating with the domain. The user simply opens a browser, goes to the company's Okta tenant URL, and they are logged in.



    Without this feature, the user would be prompted for their credentials when loading up the Okta tenant URL.



    DSSO is accomplished by the browser picking up a Kerberos ticket from the OS that itself is generated when the user authenticates with the Active Directory domain. The browser then hands this ticket back to the server, and the server communicates with the Okta cloud to authenticate the user.



    The authentication flow in our environment goes like this:



    1. User logs into their machine. A kerberos ticket is generated upon login and authentication with the domain.

    2. User opens their browser, and either tries to access an Okta-protected/integrated app, or goes directly to their Okta portal.

    3. User is redirected by Okta to our load balancer, which terminates the request at the IWA web app on the web server

    4. IWA web app challenges the browser for authentication

    5. Browser grabs the Kerberos ticket from the OS and hands it to the load balancer, which passes it to the IWA web app

    6. IWA app validates the ticket and fetches user profile from AD

    7. IWA app generates and digitally signs an SSO token and sends it to the browser

    8. Browser returns the tokent to Okta via HTML form POST

    9. Okta completes the sign-in request and returns the user to the app with an SSO token

    The process is failing on step 5, and I know this is the case because:



    1. Chrome prompts the user for NTLM credentials when the Okta tenant URL is requested

    2. This prompt happens before the IWA web app and the browser is configured properly for DSSO (per the documentation I linked at the beginning)

    3. The prompt does not happen on Chrome, Firefox, and Internet Explorer on Windows (DSSO works on Windows with Chrome, Firefox, and IE)

    4. This prompt does not happen in Safari on macOS X, but does happen with Chrome and Firefox in OS X

    What I cannot figure out is why Chrome and Firefox are not picking up the Kerberos ticket from the OS in macOS X, but the same browsers in Windows are picking up the ticket without a hitch.



    Steps I've tried:




    1. Setting Chrome's whitelist settings with the following terminal
      commands (recommended by Okta's documentation):



      $ defaults write com.google.Chrome AuthServerWhitelist
      "*.example.com"



      $ defaults write com.google.Chrome AuthNegotiateDelegateWhitelist
      "*.example.com"



    2. Setting Chrome's whitelist settings with SimpleMDM configuration push (this method actually succeeded in pushing the settings to Chrome - proven by going to chrome://policy and seeing the settings)

    3. Uninstalling anti-virus

    4. Adding every possible FQDN to the list of servers whitelisted in step 2 - first just the servers we have whitelisted in Windows (because Windows actually works), and then a list of Okta servers recommended by Okta support

    I still cannot get this feature to work and I am now trying to figure out if there's a way to troubleshoot the process Chrome uses to pickup the Kerberos ticket from the OS. Some kind of debugger for Chrome's Kerberos ticket pickup mechanism would be great, but I imagine no such thing is available.










    share|improve this question
























      0












      0








      0








      I am implementing Okta as a single-sign on provider in an enterprise environment of about 90 users. One of Okta's features is Desktop Single Sign On - the ability for users to be authenticated with Okta simply by virtue of having logged into their machine and thereby authenticating with the domain. The user simply opens a browser, goes to the company's Okta tenant URL, and they are logged in.



      Without this feature, the user would be prompted for their credentials when loading up the Okta tenant URL.



      DSSO is accomplished by the browser picking up a Kerberos ticket from the OS that itself is generated when the user authenticates with the Active Directory domain. The browser then hands this ticket back to the server, and the server communicates with the Okta cloud to authenticate the user.



      The authentication flow in our environment goes like this:



      1. User logs into their machine. A kerberos ticket is generated upon login and authentication with the domain.

      2. User opens their browser, and either tries to access an Okta-protected/integrated app, or goes directly to their Okta portal.

      3. User is redirected by Okta to our load balancer, which terminates the request at the IWA web app on the web server

      4. IWA web app challenges the browser for authentication

      5. Browser grabs the Kerberos ticket from the OS and hands it to the load balancer, which passes it to the IWA web app

      6. IWA app validates the ticket and fetches user profile from AD

      7. IWA app generates and digitally signs an SSO token and sends it to the browser

      8. Browser returns the tokent to Okta via HTML form POST

      9. Okta completes the sign-in request and returns the user to the app with an SSO token

      The process is failing on step 5, and I know this is the case because:



      1. Chrome prompts the user for NTLM credentials when the Okta tenant URL is requested

      2. This prompt happens before the IWA web app and the browser is configured properly for DSSO (per the documentation I linked at the beginning)

      3. The prompt does not happen on Chrome, Firefox, and Internet Explorer on Windows (DSSO works on Windows with Chrome, Firefox, and IE)

      4. This prompt does not happen in Safari on macOS X, but does happen with Chrome and Firefox in OS X

      What I cannot figure out is why Chrome and Firefox are not picking up the Kerberos ticket from the OS in macOS X, but the same browsers in Windows are picking up the ticket without a hitch.



      Steps I've tried:




      1. Setting Chrome's whitelist settings with the following terminal
        commands (recommended by Okta's documentation):



        $ defaults write com.google.Chrome AuthServerWhitelist
        "*.example.com"



        $ defaults write com.google.Chrome AuthNegotiateDelegateWhitelist
        "*.example.com"



      2. Setting Chrome's whitelist settings with SimpleMDM configuration push (this method actually succeeded in pushing the settings to Chrome - proven by going to chrome://policy and seeing the settings)

      3. Uninstalling anti-virus

      4. Adding every possible FQDN to the list of servers whitelisted in step 2 - first just the servers we have whitelisted in Windows (because Windows actually works), and then a list of Okta servers recommended by Okta support

      I still cannot get this feature to work and I am now trying to figure out if there's a way to troubleshoot the process Chrome uses to pickup the Kerberos ticket from the OS. Some kind of debugger for Chrome's Kerberos ticket pickup mechanism would be great, but I imagine no such thing is available.










      share|improve this question














      I am implementing Okta as a single-sign on provider in an enterprise environment of about 90 users. One of Okta's features is Desktop Single Sign On - the ability for users to be authenticated with Okta simply by virtue of having logged into their machine and thereby authenticating with the domain. The user simply opens a browser, goes to the company's Okta tenant URL, and they are logged in.



      Without this feature, the user would be prompted for their credentials when loading up the Okta tenant URL.



      DSSO is accomplished by the browser picking up a Kerberos ticket from the OS that itself is generated when the user authenticates with the Active Directory domain. The browser then hands this ticket back to the server, and the server communicates with the Okta cloud to authenticate the user.



      The authentication flow in our environment goes like this:



      1. User logs into their machine. A kerberos ticket is generated upon login and authentication with the domain.

      2. User opens their browser, and either tries to access an Okta-protected/integrated app, or goes directly to their Okta portal.

      3. User is redirected by Okta to our load balancer, which terminates the request at the IWA web app on the web server

      4. IWA web app challenges the browser for authentication

      5. Browser grabs the Kerberos ticket from the OS and hands it to the load balancer, which passes it to the IWA web app

      6. IWA app validates the ticket and fetches user profile from AD

      7. IWA app generates and digitally signs an SSO token and sends it to the browser

      8. Browser returns the tokent to Okta via HTML form POST

      9. Okta completes the sign-in request and returns the user to the app with an SSO token

      The process is failing on step 5, and I know this is the case because:



      1. Chrome prompts the user for NTLM credentials when the Okta tenant URL is requested

      2. This prompt happens before the IWA web app and the browser is configured properly for DSSO (per the documentation I linked at the beginning)

      3. The prompt does not happen on Chrome, Firefox, and Internet Explorer on Windows (DSSO works on Windows with Chrome, Firefox, and IE)

      4. This prompt does not happen in Safari on macOS X, but does happen with Chrome and Firefox in OS X

      What I cannot figure out is why Chrome and Firefox are not picking up the Kerberos ticket from the OS in macOS X, but the same browsers in Windows are picking up the ticket without a hitch.



      Steps I've tried:




      1. Setting Chrome's whitelist settings with the following terminal
        commands (recommended by Okta's documentation):



        $ defaults write com.google.Chrome AuthServerWhitelist
        "*.example.com"



        $ defaults write com.google.Chrome AuthNegotiateDelegateWhitelist
        "*.example.com"



      2. Setting Chrome's whitelist settings with SimpleMDM configuration push (this method actually succeeded in pushing the settings to Chrome - proven by going to chrome://policy and seeing the settings)

      3. Uninstalling anti-virus

      4. Adding every possible FQDN to the list of servers whitelisted in step 2 - first just the servers we have whitelisted in Windows (because Windows actually works), and then a list of Okta servers recommended by Okta support

      I still cannot get this feature to work and I am now trying to figure out if there's a way to troubleshoot the process Chrome uses to pickup the Kerberos ticket from the OS. Some kind of debugger for Chrome's Kerberos ticket pickup mechanism would be great, but I imagine no such thing is available.







      mac-osx kerberos google-chrome






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked May 8 at 11:55









      user490549user490549

      11




      11




















          0






          active

          oldest

          votes












          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f966368%2fkerberos-ticket-hand-off-no-good-on-chrome-on-macos-x%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f966368%2fkerberos-ticket-hand-off-no-good-on-chrome-on-macos-x%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

          Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

          What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company