Here is more detail into what I went through for setting up Apache Tomcat.:
I configured each Apache Tomcat instance using this bit of documentation:
SPNEGO
http://spnego.sourceforge.net/

I also used this documentation in order to get my workstation to accept
Kerberos authentication and not default to NTLM.
https://ping.force.com/Support/PingFederate/Integrations/How-to-configure-supported-browsers-for-Kerberos-NTLM

*I created/configured the following based on what was outlined from the
SPNEGO doc:*
login.conf
krb.conf
HelloKDC.java successfully connected when testing
The SPNEGO filter in Apache Tomcat's web.xml
Took the source code for spnego.jar and placed it in Apache Tomcat's library
hello_spnego.jsp successfully displayed the correct remote user on the web
page
hello_delegate.jsp successfully displayed the correct delegated credentials
on the webpage.

Once I was able to verify that the above steps worked on Apache Tomcat. I
tested the same web pages on Apache HTTPD. I ran into issues when testing
hello_spnego.jsp and hello_delegate.jsp.

Here have been my results:
hello_spnego.jsp -> "hello root !" (root being a unix user and not the
AD/Windows user signed onto the domain).
hello_delegate.jsp -> "No delegated creds."

*Here is the section of the SPNEGO doc source on how to setup
hello_delegation.jsp and create hello_spnego.jsp:*
http://spnego.sourceforge.net/credential_delegation.html

*Here is how I have Apache HTTPD forwarding requests to Tomcat. *
Header add Set-Cookie "ROUTEID=.%{BALANCER_WORKER_ROUTE}e; path=/"
env=BALANCER_ROUTE_CHANGED
<Proxy balancer://application>
    BalancerMember "http://localhost:8081/application"; route=node1
   BalancerMember "http://localhost:8082/application"; route=node2
   BalancerMember "http://localhost:8083/application"; route=node3
    ProxySet lbmethod=byrequests stickysession=ROUTEID
</Proxy>

ProxyPass /application balancer://application/
ProxyPassReverse /application balancer://application/



On Wed, Sep 19, 2018 at 7:57 AM André Warnier (tomcat) <a...@ice-sa.com>
wrote:

> On 18.09.2018 23:24, Thomas Delaney wrote:
> > Hello All,
> >
> > I have recently configured Apache Tomcat on a SuSe Enterprise 12 SP3
> server
> > to get Kerberos SSO working with a web client application. I have also in
> > addition configured Apache HTTPD 2.4.29 on the same machine.When I reach
> > that website I am failing to get SSO working. The web server is not
> passing
> > off the delegation credentials to Apache Tomcat server. I have the web
> > server load balance proxying it's request to multiple Apache Tomcat
> > instances. I have tried applying mody_proxy_http environment variables,
> but
> > the site continues to fail SSO. Is there a guide or configuration that
> > HTTPD and Apache Tomcat both use to involve Apache HTTPD passing off
> > delegation credentials to Apache Tomcat?
> >
>
> If you would like someone here to be able to help you, you would need to
> be much more
>   precise than that.  You write "I have done this" and "I have done that",
> but without
>   giving any clue as to /how/ you did this or that.
> You are not even saying /where/ you have configured the Kerberos SSO.
> Under the Apache
> httpd front-end ? or under Tomcat ?
>
> To point you nevertheless in a possible direction, read this :
>
> https://tomcat.apache.org/tomcat-8.0-doc/windows-auth-howto.html#Apache_httpd
> (and, in your mind, substitute "Windows authentication" by "Kerberos
> authentication")
>
>
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to