On Fri, Nov 28, 2014 at 12:29 AM, Rick van Rein <r...@openfortress.nl>
wrote:

> Here is a detailed discussion of how to configure FreeRADIUS to use
> Kerberos with 802.1x authentication:
>
> http://freeradius.1045715.n5.nabble.com/802-1x-amp-kerberos-td2765708.html
>

That discussion is how to setup a PAP request inside an EAP-TTLS tunnel,
which is then backended by Kerberos.  IOW, the client has to send the
password.  This is rather server-specific (how to configure different
authentication databases) and not really a "Kerberos" authentication.

I didn't read the document, but from the name of it the EAP-GSS method I
noted earlier would be a true Kerberos authentication -- the client has to
pass on a kerberos token, not a password.  It sounded like that's what you
were going after.  I'm wouldn't be surprised if this isn't well
implemented/supported/documented.  It would require the KDC to be out in
the open (to get the ticket used for the VPN auth) and most folks aren't
going to do that.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to