Home Data Center Kerberos Authentication on Citrix NetScaler, is it true???

Kerberos Authentication on Citrix NetScaler, is it true???

0
0

NetScaler has feature rich AAA module from many releases and works with external AAA servers. With latest 9.3 nCore release we took the AAA module to altogether different layer by adding Kerberos support. Kerberos is a well-known network authentication protocol accepted in all kind of deployments. Kerberos becomes a mechanism to authenticate a client to any service without sending password on the wire. Most of the common browsers support Kerberos and many times you get logged into various network services transparently through Kerberos. There are many benefits of using Kerberos and common one is ability to do Single Sign-on. Kerberos is used heavily in Windows environment as Windows Server has Kerberos Key Distribution Center built-in.

NetScaler implementation of Kerberos only supports Windows Server version of KDC. NetScaler uses user land Likewise processes for handling Kerberos authentication on Traffic Management vserver. In case of Kerberos failure the authentication agent falls back on NTML authentication mode. Kerberos is supported over High Availability NetScaler setup and at any point in time only the Primary NetScaler is part of the logical domain. Following diagram shows how Kerberos authentication happens with authentication vserver on NetScaler.

Here are the key configuration steps to set it up:

To learn more and to read the entire article at its source, please refer to the following page, Kerberos Authentication on NetScaler, is it true???- The Citrix Blogs

Featured Resources:

Related Articles:

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!

Leave a Reply

| LATEST RESOURCES

White Papers

    Gartner: My “How to Hunt for Security Threats” Paper Published

    My mini-paper on threat hunting is out!Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security are starting to explore the mysterious practice of “threat hunting” to improve their security monitoring and operations. This requires uniquely skilled personnel and wide-ranging data collection […]

    Downloads

      Base Image Script Framework (BIS-F) – Version 6.0.0

      The perfect way to seal your Base Image Every time you build you’re base Image from scratch or update it, you must seal it before deploying it to your cloned devices. No matter if you are using Citrix XenApp/XenDesktop with Machine Creation Services (MCS) or Provisioning Services (PVS), VMware View or Microsoft only, BIS-F supports […]

      On-Demand Webinars

        Latest Videos

          Microsoft Video: Transforming customer care with Business Analytics & AI

          In this session, we present Cortana Intelligence and the  intelligent services such as Cognitive Services and Bot Framework, and the business values it provides for industries. There will also be a state of the art demo on advanced customer care using Azure Bots and CRM. For more information on Cortana Intelligence, please visit: https://aka.ms/cortanayt This video […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close
          Do NOT follow this link or you will be banned from the site!