N.B: <\/strong><\/em>Once the application is configured to use Kerberos, user can still authenticate and use the application using the internal application name<\/p>\n\n\n\nAdd SPN<\/h2>\n\n\n\n
You need to had a SPN of type HTTP on the Active Directory account which running the web application (Machine Account or Service Account) with the internal URL, you can use the machine name as an URL.<\/p>\n\n\n\n
Exemple: HTTP\/myinternalapplication.mydomain.tld<\/code><\/p>\n\n\n\nConfigure Kerberos Delegation<\/h2>\n\n\n\n- Go in Active Directory User an Computers console<\/li>
- Open the Web Application Proxy account<\/li>
- Go in the Delegation tab<\/li>
- Click on Trust this computer for delegation to specified services only<\/li>
- Click on Use Kerberos Only<\/li>
- Click Add<\/li>
- Click on User or Computer<\/li>
- Type the Active Directory account where you have added the SPN<\/li>
- Select the corresponding SPN of type HTTP<\/li>
- Validate everything<\/li><\/ol>\n\n\n\n
Web Application Proxy Configuration<\/h1>\n\n\n\n- Go in Remote Access Management console<\/li>
- Click on Publish<\/li>
- Select ADFS<\/li>
- Select the Non-Claims-Aware Relying party trust<\/li>
- Give a unique name<\/li>
- Add the external URL<\/li>
- Select the Certificate\n
\n- Wildcard certificate can be used, subject name must match external URL<\/li>\n<\/ol>\n<\/li>
- Add the internal URL<\/li>
- Add the SPN added previously<\/li>
- Click Publish<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"
This article talk about Web Application Proxy but only on Windows Server 2012 R2, please review TechNet pages for other…<\/p>\n","protected":false},"author":5614970,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2478882,39106140,159543117],"tags":[672890818,672890819,672890817],"_links":{"self":[{"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/posts\/38"}],"collection":[{"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/users\/5614970"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":8,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/posts\/38\/revisions"}],"predecessor-version":[{"id":758,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/posts\/38\/revisions\/758"}],"wp:attachment":[{"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/media?parent=38"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/categories?post=38"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.n-dol.org\/wp-json\/wp\/v2\/tags?post=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}