<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kerberos Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8177#M6043</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Johan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PAN firewall does not directly participate in Kerberos authentication of clients, it relays the requests from the client to the servers that are configured in your Kerberos authentication profile.&amp;nbsp; Consequently, no trust needs to be established with the firewall, as both members will have the keys necessary as they are both in the same domain.&amp;nbsp; Also, TGT renewal requests will be renewed by the end user's workstation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like more information on Kerberos, please follow this link to Microsoft's TechNet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/cc961976.aspx"&gt;http://technet.microsoft.com/en-us/library/cc961976.aspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Feb 2012 17:58:18 GMT</pubDate>
    <dc:creator>ggarrison</dc:creator>
    <dc:date>2012-02-17T17:58:18Z</dc:date>
    <item>
      <title>Kerberos Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8174#M6040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to understand how Kerberos authentication works on the PAN. From what I understand is that Kerberos does not send any passwords over the network but generates tickets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) When a user logs on a SSL VPN portal which is configured for Kerberos authentication, the user types in the password. But how handle the PAN the password? The KDC (AD) does not have a plaintext version of the user his password. So how is the ticket generated ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Is there a possibility to use Kerberos delegation? Since the KDC does not have an account of the PAN in directory, there is no mutual authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt; Johan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 15:40:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8174#M6040</guid>
      <dc:creator>u5273</dc:creator>
      <dc:date>2012-01-16T15:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8175#M6041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Johan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an online document here:&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1762"&gt;https://live.paloaltonetworks.com/docs/DOC-1762&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It talks about how to configure and how Kerberos works.&lt;/P&gt;&lt;P&gt;Please review this information and let us know if this answers your question or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2012 15:59:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8175#M6041</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2012-01-25T15:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8176#M6042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This document describes how to implement Kerberos. I'm looking for more detailed explanation how it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the end user connects to the SSL Portal, he is prompted to enter his credentials, username and password. Since the PA device plays the role of a Kerberos client, how can the PA 'protect' the password of the client. Does the PA have access to the shared secret key ? And if yes, how does the domain controller knows if the request comes from the PA device. There is no trust between the domain controller and the PA device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On one of my previous implementations I've used MS ISA server. Kerberos authentication was only possible if the device is a member of the domain. But the PA is no member of the domain. Or more simple, a Windows client needs to be a member of the domain before he can use Kerberos. Then we have a 'trust'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, if the ticket is about to expire, who renewes the TGT. The end user or the PA device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;P&gt;Johan&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jan 2012 08:00:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8176#M6042</guid>
      <dc:creator>u5273</dc:creator>
      <dc:date>2012-01-26T08:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8177#M6043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Johan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PAN firewall does not directly participate in Kerberos authentication of clients, it relays the requests from the client to the servers that are configured in your Kerberos authentication profile.&amp;nbsp; Consequently, no trust needs to be established with the firewall, as both members will have the keys necessary as they are both in the same domain.&amp;nbsp; Also, TGT renewal requests will be renewed by the end user's workstation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like more information on Kerberos, please follow this link to Microsoft's TechNet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/cc961976.aspx"&gt;http://technet.microsoft.com/en-us/library/cc961976.aspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2012 17:58:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-authentication/m-p/8177#M6043</guid>
      <dc:creator>ggarrison</dc:creator>
      <dc:date>2012-02-17T17:58:18Z</dc:date>
    </item>
  </channel>
</rss>

