Verify kerberos authentication
Hi,
I have configured kerberos for the fim portal and fim service and everything seems to be working fine. However how can I verify that kerberos actually is being used and not NTLM?
Regards
Zid
November 5th, 2010 9:47am
You could capture the network traffic by using
Netmon or disable NTLM authentication on the related computers.
Cheers,
Markus
Markus Vilcinskas, Knowledge Engineer, Microsoft Corporation
Free Windows Admin Tool Kit Click here and download it now
November 5th, 2010 10:25am
If you configure the FIM Server's Audit policy to audit successful Account Logon events &
Logon events and start the FIM portal you should see in the Security Event log, among others, EventIDs 4769, which tells you that a Kerberos ticket was requested and issued successfully.
/Matthias /Matthias
November 5th, 2010 11:10am
Hi Zid-
The free Fiddler addon for IE/Firefox will let you look at the authentication headers when you browse to the portal. This is usually how I troubleshoot/investigate this.My Book - Active Directory, 4th Edition
My Blog - www.briandesmond.com
Free Windows Admin Tool Kit Click here and download it now
November 5th, 2010 1:15pm
For just seeing whether Kerberos is used I prefer Matthias his suggestion: by default those logon (success) events are logged I think. So in the security log of the Portal server you should see an entry stating your client IP, user name and whether Kerberos
was used.
It comes in handy if you use real test user so you can clearly see his name pop up in the event log and not your admin account where are you are logged on with on the portal server
And very important: test from a remote workstation. Don't test from on the FIM Portal Server itself.
Besides the event log, "klist" (built-in 2008/2008 R2/W7) can show you which Kerberos tickets the user requested. Kerbtray can do this as well:
http://setspn.blogspot.com/2010/06/kerberos-basic-troubleshooting-tip-1.html
http://setspn.blogspot.com
November 6th, 2010 6:31am
Thanks for all the good replies!
When enabling auditing I see the following in the event log when restarting the Forefront Identity Manager Service:
An account was successfully logged on.
Subject:
Security ID: SYSTEM
Account Name: FIM01$
Account Domain: AFAB
Logon ID: 0x3e7
Logon Type: 5
New Logon:
Security ID: DOMAINA\FIMS
Account Name: FIMS
Account Domain: DOMAINA
Logon ID: 0xf8d8b1
Logon GUID: {62ccbe63-18b4-a9cc-7fe7-0991c502f827}
Process Information:
Process ID: 0x228
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name: SE01
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
How can I tell if kerberos is being used or not when reading this log?
Regards
Zid
Free Windows Admin Tool Kit Click here and download it now
November 8th, 2010 6:51am
This is what I'm seeing:
Detailed Authentication Information:
Logon Process: Kerberos
Authentication Package: Kerberos
Transited Services:
Advapi -> Negotiate is mostly present when you perform an interactive logon I think. Like when pressing ctrl-alt-del and entering credentials are when logging on through remote desktop services. Perhaps it's also possible if you configured IIS for
basic authN.
I think you are looking at the wrong event. You can filter your security eventlog on the fim portal for event id 4624 and then search for your username. I really advise you to use a new dummy user, which does not appear in all event logs already.http://setspn.blogspot.com
November 8th, 2010 7:17am
When accessing the portal from a remote computer using
https://fimportal.test I see the same as you:
An account was successfully logged on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
New Logon:
Security ID: DOMAINA\testuser1
Account Name: testuser1
Account Domain: DOMAINA
Logon ID: 0x130dff0
Logon GUID: {74cbd5c3-cdee-6793-a3b2-faf65f6e7850}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name:
Source Network Address: 192.168.10.11
Source Port: 61764
Detailed Authentication Information:
Logon Process: Kerberos
Authentication Package: Kerberos
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
However when I go to services on the FIM Portal/FIM Service server and restart the Forefront Identity Manager Service I see the information displayed in the previous post in the log. Should I not also see kerberos being used when restarting the service?
Free Windows Admin Tool Kit Click here and download it now
November 9th, 2010 2:22am
Ahah, that's why It stated "services.exe" in your first event. The negotiate logon makes sence there. It's like a user loging on to a workation with username/password in the ctrl-alt-del screen. The FIM Service is configured in the services.msc console.
At installation it was configured with a username to run under and a specific password. When the service starts it uses these credentials and performs an negotiate logon on this server.
More specific this means that when the service afterwards has to authenticate to something it can use both NTLM (it has the username/password) and Kerberos (it's authenticated)http://setspn.blogspot.com
November 9th, 2010 3:21am
You could also try this instead:
To activate Kerberos protocol only
Open the Web.config file, which is usually located at C:\inetpub\wwwroot\wss\VirtualDirectories\80.
Note
You need an elevated command prompt or Windows Explorer to access this folder.
Locate the element <resourceManagementClient . . . />
Add requireKerberos=”true” so that it reads
<resourceManagementClient requireKerberos="true" . . . />
Save the Web.config file.
Run iisreset from a command prompt.
Free Windows Admin Tool Kit Click here and download it now
November 10th, 2010 10:25pm
I added the requireKerberos="true" value to the web.config file and ran iisreset. Does this mean that only kerberos and not ntlm will be used on this web site?
Everything is still working as it should. I guess this means that Kerberos is enabled or else something would not work?
November 12th, 2010 3:00am
This is correct, you should not be able to access the portal with more insecure authentication mechanisms.
You can easily test this out... find out the IP for your FIM Portal (ping FIMHOSTNAME)
Navigate to http(s)://FIM_IPv4/identitymanagement/default.aspx
When accessing the site via IP, Kerberos won't be able to negotiate and your browser would fallback to NTLM, which would be denied by the above configuration setting - you should see access denied or some equivalent error in that case.
Free Windows Admin Tool Kit Click here and download it now
November 15th, 2010 3:24am
I verified this today and it's not working using just the IP so everything is good it seems.
Thanks to everyone for their help!
November 17th, 2010 1:39am