Setting up SSO Kerberos
This article describes how to enable BlueMind to recognize Kerberos authentication in a Windows infrastructure.
How Kerberos authentication works
Kerberos' authentication enables users with a Windows account already associated with their BlueMind account (via an AD import) to authenticate automatically, without having to go through a login screen (SSO).
To do this:
-
the user must be in a Windows session on the domain with which Kerberos SSO has been activated
Multi-domain installation
In the case of Multi-domain Messaging, each domain can have its own Kerberos configuration. If Kerberos is configured on several domains, each domain must have its own URL
If Kerberos is configured on 1 domain only, use the global URL -
the user must use a browser where SPNEGO is active for the BlueMind global URL
Kerberos configuration
In the rest of this documentation, we consider the following elements:
-
BlueMind's external URL (global URL):
bluemind.domain.tld -
Active Directory server (IP address or name of Windows domain AD server):
ad.domain.tld -
Active Directory domain (or realm, corresponds to the Windows domain in uppercase):
DOMAIN.TLD⚠️ Add the AD domain to the BM domain aliases if different from the BM domain name.
All Kerberos configuration is done with the global URL. Do not use the URL of the domain concerned, either to generate the keytab file (and setspn), or for client configuration, even when Kerberos is configured on several domains.
Consequently, if the global URL is modified (see External URL Configuration), all keytabs (and setspn) must be re-generated, and all clients reconfigured with the new global URL.
Generate Keytab file
The keytab file is generated in 2 stages.
Open a cmd.exe console, then :
-
Create a user dedicated to Kerberos authentication in ActiveDirectory
- Enable the "This account supports Kerberos AES 256 bit encryption" option in the "Account" tab:

- Add the role to the user by running the following command:
where username =bmkrb; password =krbpwd.
setspn -A HTTP/bluemind.domain.tld bmkrbThe command should return a result equivalent to the following rows:
Registering ServicePrincipalNames for CN=bmkrb,CN=Users,DC=domain,DC=tld
HTTP/bluemind.domain.tld
Updated object - Enable the "This account supports Kerberos AES 256 bit encryption" option in the "Account" tab:
-
Create the keytab file with the following command:
- Windows 2012R2
- Windows 2016 & +
ktpass /out C:\bluemind.keytab
/mapuser bmkrb@DOMAIN.TLD
/princ HTTP/bluemind.domain.tld@DOMAIN.TLD
/pass krbpwd
/kvno 0
# paramètre optionnel, voir la remarque "Key Version Number" ci-après
/ptype KRB5_NT_PRINCIPALktpass /out C:\bluemind.keytab
/crypto AES256-SHA1
/mapuser bmkrb@DOMAIN.TLD
/princ HTTP/bluemind.domain.tld@DOMAIN.TLD
/pass krbpwd
/kvno 0
# paramètre optionnel, voir la remarque "Key Version Number" ci-après
/ptype KRB5_NT_PRINCIPALThe result should look like the following rows:
Targeting domain controller: AD.domain.tld
Using legacy password setting method
Successfully mapped HTTP/bluemind.domain.tld to bmkrb.
Output keytab to C:\bluemind.keytab
The Kvno (Key Version Number) parameter is used to manage multiple keys for a user.
The value of the ktpass command (/kvno 0) given in the examples above is a generic value, which will work in most cases. However, this value can be blocking depending on the users and any keys already present or in use. Only the AD administrator knows exactly what this information is.
It is possible not to specify this parameter. In this case, a new key will be created automatically with the version number following the one already present in the AD for this account.
For more information on the Kvno parameter, see the Microsoft documentation on the ktpass command: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/ktpass
Activation via the administration console
- In the administration console, go to System management > Supervised domains > choose domain > Security tab.
- Select the Kerberos authentication mode and fill in the associated form:
- Active Directory domain
- Active Directory server
- Active Directory keytab file: check the box and select the previously created file
- Click on "Save" to save your changes.
Customer configuration
When the AD domain is different from the BlueMind domain, the client web browser may not trust the BlueMind domain. The BlueMind url access must therefore be added as a trusted site in the web browser.
Firefox
Manual configuration
To add a trusted site, you need to access the browser settings :
-
in the web browser address bar, type:
about:config -
Validate the warning by clicking on "Accept the risk and continue".
-
In the search box, type:
trusted -
Double-click on the
network.negotiate-auth.trusted-urisparameter or click on the pencil at the end of the line to edit it. -
Enter the BlueMind domain address (here
bluemind.domain.tld) and confirm.
💡 The parameter appears in bold: this means that it has been modified, and no longer has its default value.
-
Restart Firefox for the change to take effect.
GPO configuration
Here is an example of how to configure GPOs for Firefox :
-
Add "Windows policies" to the AD server
-
Download templates in ADMX format here: https://github.com/mozilla/policy-templates/releases
-
Put them in ``\Windows\PolicyDefinitions```
💡 The
.admxfiles are in the root directory and the.admlfiles in the corresponding language folders.
-
-
Set up the Kerberos-specific GPO
-
Go to : Computer configuration > Policies > Administrative templates > Mozilla > Firefox > Authentication
-
Find and open the "SPNEGO" parameter
-
Press "Activate"
-
In the "Options" field, press "Display" and enter the address of the desired network resource
ℹ️ If several addresses are to be entered, enter one address per row.
-
Press the "OK" button to close the windows with the changes applied
-
For more information on GPO configuration, please refer to the following documentation:
- https://gpsearch.azurewebsites.net
- https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/group-policy/group-policy-management-console
As well as Firefox documentation:
Microsoft Edge
Manual configuration
Microsoft Edge is configured manually on the workstation:
- Run Regedit as administrator
- Go to
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edgeand create the missing registry keys if necessary. - Create a value of type "String value (REG_SZ)", with name
AuthServerAllowlistand valuebluemind.domain.tld. - Restart Edge for the change to take effect.
In the event of a malfunction, ensure that the policy is taken into account:
- Start Edge
- Enter
edge://policyin the URL field - Check that the
AuthServerAllowlistpolicy appears in the "Microsoft Edge Policies" section, with the value entered above. If not, click onReload strategies. If it still doesn't appear, check that you have modified the register as described above.
For more information on Edge strategies, see the Microsoft documentation :
GPO configuration
Here is an example of how to configure GPOs for Edge:
- Add "Windows policies" to the AD server
-
Download templates in ADMX format here: https://www.microsoft.com/en-en/edge/business/download?cs=4134690573&form=MA13FJ
-
Put them in ``\Windows\PolicyDefinitions```
💡 The
.admxfiles are in the root directory and the.admlfiles in the corresponding language folders.
-
- Set up the Kerberos-specific GPO
-
Go to : Computer configuration > Administrative templates > Microsoft Edge > HTTP authentication
-
Find and open the "Configure list of authorized authentication servers" parameter
-
Press "Activate"
-
In the "Options" field, enter the address of the desired network resource
ℹ️ If several addresses are to be entered, separate them with commas
-
Press the "OK" button to close the windows with the changes applied
-
For more information on GPO configuration, please refer to the following documentation:
- https://gpsearch.azurewebsites.net
- https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/group-policy/group-policy-management-console
Chrome
Manual configuration
Google Chrome is configured manually on the workstation:
- Run Regedit as administrator
- Go to
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chromeand create the missing keys if necessary. - Create a value of type "String value (REG_SZ)", with name
AuthServerAllowlistand valuebluemind.domain.tld. - Restart Chrome for the change to take effect.
In the event of a malfunction, ensure that the policy is taken into account:
- Start Chrome
- Enter
chrome://policyin the URL field - Check that the
AuthServerAllowlistpolicy appears in the "Chrome Policies" section, with the value entered above. If not, click onReload strategies. If it still doesn't appear, check that you have modified the register as described above.
For more information on Chrome strategies, see the Google documentation:
GPO configuration
Here is an example of how to configure GPOs for Chrome :
- Add "Windows policies" to the AD server
-
Download templates in ADMX format here: https://support.google.com/chrome/a/answer/187202?hl=fr#zippy=%2Cwindows
-
Put them in ``\Windows\PolicyDefinitions```
💡 The
.admxfiles are in the root directory and the.admlfiles in the corresponding language folders.
-
- Set up Kerberos-specific GPO
-
Go to : Computer configuration > Administrative templates > Google > Google Chrome > HTTP authentication
-
Find and open the "Authentication server authorization list" parameter
-
Press "Activate"
-
In the "Options" field, enter the address of the desired network resource
ℹ️ If several addresses are to be entered, separate them with commas
-
Press the "OK" button to close the windows with the changes applied
-
For more information on GPO configuration, please refer to the following documentation:
- https://gpsearch.azurewebsites.net
- https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/group-policy/group-policy-management-console