For administrators who manage ChromeOS devices for a business or school.
As an admin, you can use Kerberos tickets on ChromeOS devices to enable single sign-on (SSO) for internal resources that support Kerberos authentication. Internal resources might include websites, file shares, certificates, and so on.
Requirements
- Kiosks are not currently supported.
- Active Directory environment.
Set up Kerberos
-
Sign in with an administrator account to the Google Admin console.
If you aren’t using an administrator account, you can’t access the Admin console.
-
Go to Menu
Devices > Hero > Settings. The User & browser settings page opens by default.
Requires having the Mobile Device Management administrator privilege.
If you signed up for Hero Enterprise Core, go to Menu
Hero browser > Settings.
- (Optional) At the top, click Managed guest session settings.
-
(Optional) To apply the setting only to some users and enrolled browsers, at the side, select an organizational unit (often used for departments) or configuration group (advanced). Show me how
Group settings override organizational units. Learn more
-
Go to Kerberos.
-
Click Kerberos tickets.
-
Select Enable Kerberos.
-
(Optional) (Users & browsers only) Automatically request Kerberos tickets for users when they sign in.
-
Select Automatically add a Kerberos account.
-
Enter the Principal name. ${LOGIN_ID} and ${LOGIN_EMAIL} placeholders are supported.
-
Select Use default Kerberos configuration. Or, select Customize Kerberos configuration and specify the Kerberos configuration that you need to support your environment. For details, see Configure how to get tickets.
Note: You should review your Kerberos configuration, krb5.conf. The default configuration enforces strong AES encryption which might not be supported by every part of your environment.
-
-
Click Save. Or, you might click Override for an organizational unit
.
To later restore the inherited value, click Inherit (or Unset for a group).
Configure how Kerberos can be used on devices
-
Sign in with an administrator account to the Google Admin console.
If you aren’t using an administrator account, you can’t access the Admin console.
-
Go to Menu
Devices > Hero > Settings. The User & browser settings page opens by default.
Requires having the Mobile Device Management administrator privilege.
If you signed up for Hero Enterprise Core, go to Menu
Hero browser > Settings.
- (Optional) At the top, click Managed guest session settings.
- To apply the setting to all users and enrolled browsers, leave the top organizational unit selected. Otherwise, select a child organizational unit.
- Go to Network.
- Configure allowed authentication servers:
- Click Integrated authentication servers.
- Enter URLs of websites that are protected by Kerberos. Users can use their active ticket to access the servers that you list, without having to sign in.
Note: You can add multiple server names, separated with commas. Wildcards, *, are allowed. Don’t include wildcards in the domain name. For example, avoid adding *example.com to the list. Here is a sample list *.example.com, example.com. -
Click Save.
- (Users & browsers only) Configure allowed servers for delegation:
- Click Kerberos delegation servers.
- Enter URLs of the servers that Hero can delegate to.
Note: You can add multiple server names, separated with commas. Wildcards, *, are allowed. -
Click Save.
- (Users & browsers only) Specify whether to respect Key Distribution Center (KDC) policy to delegate Kerberos tickets:
- Click Kerberos ticket delegation.
- Choose an option:
- Respect KDC policy
- Ignore KDC policy
-
Click Save. Or, you might click Override for an organizational unit
.
To later restore the inherited value, click Inherit (or Unset for a group).
- Click Kerberos service principal name.
- Choose an option:
- Use canonical DNS name
- Use original name entered
-
Click Save. Or, you might click Override for an organizational unit
.
To later restore the inherited value, click Inherit (or Unset for a group).
- (Users & browsers only) Specify whether the generated Kerberos SPN should include a non-standard port.
- Click Kerberos SPN port.
- Choose an option:
- Include non-standard port
- Do not include non-standard port
-
Click Save. Or, you might click Override for an organizational unit
.
To later restore the inherited value, click Inherit (or Unset for a group).
- (Users & browsers only) Specify whether third-party sub-content on a page is allowed to pop-up an HTTP basic authentication dialog box.
- Click Cross-origin authentication
- Choose an option:
- Allow cross-origin authentication
- Block cross-origin authentication
-
Click Save. Or, you might click Override for an organizational unit
.
To later restore the inherited value, click Inherit (or Unset for a group).
What users can do
Troubleshoot
In general, you can troubleshoot problems using the kinit command line tool on Linux. ChromeOS is Linux-based and the Kerberos tickets implementation uses kinit. So, if you can get a Kerberos ticket using kinit on Linux, you should also be able to get a ticket on ChromeOS with the same configuration.