From: markt Date: Tue, 29 Mar 2011 14:51:17 +0000 (+0000) Subject: Add domain configuration that is known to work X-Git-Url: https://git.internetallee.de/?a=commitdiff_plain;h=0200bdf671a2c803bd050c14999a3acca9b3da86;p=tomcat7.0 Add domain configuration that is known to work git-svn-id: https://svn.apache.org/repos/asf/tomcat/trunk@1086611 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/webapps/docs/windows-auth-howto.xml b/webapps/docs/windows-auth-howto.xml index 28fc4a866..556ba90e1 100644 --- a/webapps/docs/windows-auth-howto.xml +++ b/webapps/docs/windows-auth-howto.xml @@ -51,7 +51,66 @@ sections.

-

TBD.

+

This is a work in progress. This warning should be removed once the +end-to-end testing is complete

+

There are four components to the configuration of the built-in Tomcat +support for Windows authentication. The domain controller, the server hosting +Tomcat, the web application wishing to use Windows authentication and the client +machine. The following sections describe the configuration required for each +component.

+

The names of the three machines used in the configuration examples below are +win-dc01.dev.local (the domain controller), win-tc01.dev.local (the Tomcat +instance) and win-pc01.dev.local (client). The Tomcat server and the client are +both members of the domain.

+

Note: In order to use the passwords in the steps below, the domain password +policy had to be relaxed. This is not recommended for production environments. +

+ + +

These steps assume that the server has already been configured to act as a + domain controller. Configuration of a Windows server as a domain controller is + outside the scope of this how-to. The steps to configure the domain controller + to enable Tomcat to support Windows authentication are as follows: +

    +
  • Create a domain user that will be mapped to the service name used by the + Tomcat server. In this how-to, this user is called tc01 and has a + password of tc01pass.
  • +
  • Map the service principal name (SPN) to the user account. SPNs take the + form + <service class>/<host>:<port>/<service name>. + The SPN used in this how-to is HTTP/win-tc01.dev.local. To + map the user to the SPN, run the following: + setspn -A HTTP/win-tc01.dev.local tc01 +
  • +
  • Generate the keytab file that the Tomcat server will use to authenticate + itself to the domain controller. This file contains the Tomcat private key for + the service provider account and should be protected accordingly. To generate + the file, run the following command (all on a single line): + ktpass /out c:\tc01.keytab /mapuser tc01@DEV.LOCAL + /princ HTTP/win-tc01.dev.local@DEV.LOCAL + +andPass /kvno 0
  • +
  • Create a domain user to be used on the client. In this how-to the domain + user is test with a password of testpass.
  • +
+

+

The above steps have been tested on a domain controller running Windows + Server 2008 R2 64-bit Standard using the Windows Server 2003 functional level + for both the forest and the domain. +

+
+ + +

TBD

+
+ + +

TBD

+
+ + +

TBD

+
+