Kaspersky Security Center Linux enables you to use domain authentication over the Kerberos protocol. Domain authentication allows you to enable secure authentication in Kaspersky Security Center Web Console without having to re-enter the password on the corporate network (single sign-on).
You must first configure your domain controller to use Kerberos and generate a keytab file. For more information, refer to the documentation for your domain controller.
Generating a keytab file for FreeIPA and AldPro
To generate a keytab file:
ipa dnsrecord-add <zoneName> <recordName> --a-rec <Administration Server IP address>
ipa host-add --password=<password> <Administration Server host address>
ipa service-add HTTP/<Administration Server host FQDN>@<DOMAIN WRITTEN IN CAPITAL LETTERS> --ok-to-auth-as-delegate=true --pac-type PAD
ipa service-allow-retrieve-keytab HTTP/<Administration Server host address>@<DOMAIN WRITTEN IN CAPITAL LETTERS> --user=<user>
ipa-getkeytab -s <domain controller address> -p HTTP/<Administration Server host address>@<DOMAIN WRITTEN IN CAPITAL LETTERS> -k /tmp/h.keytab
Generating a keytab file for Microsoft Active Directory
To generate a keytab file:
You can enable the Password never expires option to avoid reissuing the keytab file each time the password expires.
setspn -S HTTP/<Administration Server host FQDN> <DOMAIN WRITTEN IN CAPITAL LETTERS>\<user>
ktpass -out C:\<folder>\<keytab file name> -princ HTTP/<Administration Server host FQDN>@<DOMAIN WRITTEN IN CAPITAL LETTERS> -mapuser <DOMAIN WRITTEN IN CAPITAL LETTERS>\<user> -crypto AES256-SHA1 -ptype KRB5_NT_PRINCIPAL -pass <user password> -mapop set
Generating a keytab file for Samba
To generate a keytab file:
samba-tool user add <user>
samba-tool spn add HTTP/<Administration Server host FQDN> <user>
samba-tool domain exportkeytab /tmp/file.keytab --principal=HTTP/<Administration Server host FQDN>
Enabling Kerberos domain authentication
To enable Kerberos domain authentication:
Kerberos domain authentication is enabled for domain users.