Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Windows/AD and UNIX commands and configuration to generate and use Keytabs with nginx #91

Open
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

vjt
Copy link
Contributor

@vjt vjt commented May 3, 2019

Dear @stnoonan -

first, thanks for your work on this nginx module, that has proven very robust and reliable in the last 5 years it has been in production for us.

This pull is for discussion only, as it contains only README changes on how to obtain a Windows service account mapped to specific service names that are not dependant on the system's host name where nginx is running.

The scenario here is that you may have multiple boxes with nginx on them serving the same app, say, "foo.example.com", behind a load balancer. The nginx servers need to have a keytab that has both the host/foo.example.com and HTTP/foo.example.com, and on the AD side the service account used for Kerberos authentication need to have these two SPNs mapped to it, in the very same "host/" first and "HTTP/" after order.

It is also possible to have different service names mapped to the same service account, as long as the host/ and HTTP/ entries in the Windows SPN database are in the right order.

The documentation in this pull shows all the steps required to achieve the above, that allow for great flexibility and that has been tested with AD on Windows Server 2008, 2012, 2016 and with both IE 11 and Chrome on Windows 7 and Windows 10.

Thanks for your time,

vjt added 4 commits July 20, 2015 15:44
* upstream/master:
  Fix off by one error in spnego token length
  Return NGX_HTTP_UNAUTHORIZED if Basic auth failed
  Converting into a dynamic module
  Properly initialize buffer when output token length is zero.
  Stop setting KRB5_KTNAME in environment
@vjt vjt changed the title Add Active Directory commands and configuration to support multiple host names Add Windows/AD and UNIX commands and configuration to generate and use Keytabs with nginx May 3, 2019
This fork only contains a README change from the original source
http://github.com/stnoonan/spnego-http-auth-nginx-module that
explains how to set up NGINX and Active Directory Kerberos authentication
with multiple host names using the same service account.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Delete these lines :-).

are [available in this PPA](https://launchpad.net/~bcandrea/+archive/nginx-stable).


Crash course to Windows KDC Configuration
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Split this out into a separate file and link it from the readme? Otherwise, lgtm.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants