KEYCLOAK-1852 Improve Kerberos example documentation and user experience
This commit is contained in:
parent
f9af8ba1a0
commit
95967b9c79
5 changed files with 156 additions and 11 deletions
|
@ -9,17 +9,22 @@ It also needs to enable forwardable ticket support in Kerberos configuration and
|
||||||
|
|
||||||
Detailed steps:
|
Detailed steps:
|
||||||
|
|
||||||
**1)** Build and deploy this sample's WAR file. For this example, deploy on the same server that is running the Keycloak Server, although this is not required for real world scenarios.
|
**1)** Build and deploy this sample's WAR file. For this example, deploy on the same server that is running the Keycloak Server (the easiest way is to use Keycloak Demo distribution), although this is not required for real world scenarios.
|
||||||
|
|
||||||
|
If Keycloak Server is running locally, you can deploy the WAR using maven:
|
||||||
|
|
||||||
**2)** Copy `http.keytab` file from the root directory of example to `/tmp` directory (On Linux):
|
mvn wildfly:deploy
|
||||||
|
|
||||||
|
**2)** Open `kerberosrealm.json` file for edit. Find `keyTab` config property, and adjust the path to `http.keytab` file, which is in project's root directory, to be an absolute path.
|
||||||
|
For example:
|
||||||
```
|
```
|
||||||
cp http.keytab /tmp/http.keytab
|
"keyTab" : "/home/user1/devel/keycloak/examples/kerberos/http.keytab"
|
||||||
```
|
```
|
||||||
|
|
||||||
Alternative is to configure different location for `keyTab` property in `kerberosrealm.json` configuration file (On Windows this will be needed).
|
On Windows you have to use forward slashes or double backslashes (\\) - e.g.`c:/Users/User1/devel/keycloak/examples/kerberos/http.keytab`.
|
||||||
**WARNING**: In production, keytab file should be in secured location accessible just to the user under which is Keycloak server running.
|
|
||||||
|
You can also move the file to another location if you want.
|
||||||
|
**WARNING**: In production, keytab file should be in secured location accessible only to the user under which the Keycloak server is running.
|
||||||
|
|
||||||
|
|
||||||
**3)** Run Keycloak server and import `kerberosrealm.json` into it through admin console. This will import realm with sample application
|
**3)** Run Keycloak server and import `kerberosrealm.json` into it through admin console. This will import realm with sample application
|
||||||
|
@ -37,13 +42,16 @@ Also if you are on Linux, make sure that record like:
|
||||||
```
|
```
|
||||||
is in your `/etc/hosts` before other records for the 127.0.0.1 host to avoid issues related to incompatible reverse lookup (Ensure the similar for other OS as well)
|
is in your `/etc/hosts` before other records for the 127.0.0.1 host to avoid issues related to incompatible reverse lookup (Ensure the similar for other OS as well)
|
||||||
|
|
||||||
**4)** Install kerberos client. This is platform dependent. If you are on Fedora, Ubuntu or RHEL, you can install package `freeipa-client`, which contains Kerberos client and bunch of other stuff.
|
**4)** Install kerberos client. This is platform dependent. If you are on Fedora, Ubuntu or RHEL, you can install package `freeipa-client`, which contains Kerberos client and bunch of other stuff.
|
||||||
|
|
||||||
|
|
||||||
**5)** Configure Kerberos client (On linux it's in file `/etc/krb5.conf` ). You need to configure `KEYCLOAK.ORG` realm for host `localhost` and enable `forwardable` flag, which is needed
|
**5)** Configure Kerberos client (On linux it's in file `/etc/krb5.conf` ). You need to configure `KEYCLOAK.ORG` realm for host `localhost` and enable `forwardable` flag, which is needed
|
||||||
for credential delegation example, as application needs to forward Kerberos ticket and authenticate with it against LDAP server.
|
for credential delegation example, as application needs to forward Kerberos ticket and authenticate with it against LDAP server.
|
||||||
See [this file](https://github.com/keycloak/keycloak/blob/master/testsuite/integration/src/test/resources/kerberos/test-krb5.conf) for inspiration.
|
See [this file](https://github.com/keycloak/keycloak/blob/master/testsuite/integration/src/test/resources/kerberos/test-krb5.conf) for inspiration.
|
||||||
|
On OS X the file to edit (or create) is `/Library/Preferences/edu.mit.Kerberos` with the same syntax as `krb5.conf`.
|
||||||
|
On Windows the file to edit (or create) is `c:\Windows\krb5.ini` with the same syntax as `krb5.conf`.
|
||||||
|
|
||||||
**6)** Run ApacheDS based LDAP server. You can run the command like this (assuming you're in the "kerberos" directory with this example):
|
**6)** Run ApacheDS based LDAP server. You can run the command like this (assuming you're in the `kerberos` directory with this example):
|
||||||
|
|
||||||
```
|
```
|
||||||
mvn exec:java -Pkerberos
|
mvn exec:java -Pkerberos
|
||||||
|
@ -60,7 +68,7 @@ both `network.negotiate-auth.trusted-uris` and `network.negotiate-auth.delegatio
|
||||||
A bit more details in [testsuite README](https://github.com/keycloak/keycloak/blob/master/misc/Testsuite.md#kerberos-server) .
|
A bit more details in [testsuite README](https://github.com/keycloak/keycloak/blob/master/misc/Testsuite.md#kerberos-server) .
|
||||||
|
|
||||||
|
|
||||||
**8)** Test the example. Obtain kerberos ticket by running command from CMD (on linux):
|
**8)** Test the example. Obtain kerberos ticket by running command from Terminal / CMD:
|
||||||
```
|
```
|
||||||
kinit hnelson@KEYCLOAK.ORG
|
kinit hnelson@KEYCLOAK.ORG
|
||||||
```
|
```
|
||||||
|
@ -68,4 +76,132 @@ with password `secret` .
|
||||||
|
|
||||||
Then in your web browser open `http://localhost:8080/kerberos-portal` . You should be logged-in automatically through SPNEGO without displaying Keycloak login screen.
|
Then in your web browser open `http://localhost:8080/kerberos-portal` . You should be logged-in automatically through SPNEGO without displaying Keycloak login screen.
|
||||||
Keycloak will also transmit the delegated GSS credential to the application inside access token and application will be able to login with this credential
|
Keycloak will also transmit the delegated GSS credential to the application inside access token and application will be able to login with this credential
|
||||||
to the LDAP server and retrieve some data from it (Actually it just retrieve few simple data about authenticated user himself).
|
to the LDAP server and retrieve some data from it (Actually it just retrieve few simple data about authenticated user himself).
|
||||||
|
|
||||||
|
|
||||||
|
Troubleshooting
|
||||||
|
---------------
|
||||||
|
|
||||||
|
You followed the instructions, but things don't seem to be working. Follow these instructions to troubleshoot.
|
||||||
|
|
||||||
|
**1)** Make sure to use the default user in all Terminal / CMD sessions. Do not use 'sudo' or 'su'.
|
||||||
|
The reason is that when you open Firefox, it will open within the context of currently signed in user. And it will use that user's Kerberos ticket to perform authentication.
|
||||||
|
When you obtain Kerberos ticket using Terminal session, you have to be that same user, otherwise the ticket will not be visible to the browser.
|
||||||
|
|
||||||
|
Of course make sure to obtain the ticket:
|
||||||
|
|
||||||
|
```
|
||||||
|
kinit hnelson@KEYCLOAK.ORG
|
||||||
|
```
|
||||||
|
with password `secret`.
|
||||||
|
|
||||||
|
|
||||||
|
**2)** On Linux make sure that the first entry in your /etc/hosts file is:
|
||||||
|
```
|
||||||
|
127.0.0.1 localhost
|
||||||
|
```
|
||||||
|
|
||||||
|
Even if it already contains a similar entry like:
|
||||||
|
|
||||||
|
127.0.0.1 localhost.localdomain localhost
|
||||||
|
|
||||||
|
Make sure to insert the short one before the existing one.
|
||||||
|
|
||||||
|
**3)** Make sure you have properly adjusted the path to `http.keytab` file in `kerberosrealm.json`.
|
||||||
|
On Windows either use `/` as path delimiter or `\\` (two backslashes).
|
||||||
|
|
||||||
|
**4)** Make sure that you have configured Firefox attributes via about:config url, and set `network.negotiate-auth.trusted-uris` and `network.negotiate-auth.delegation-uris` to `localhost`,
|
||||||
|
and `network.negotiate-auth.allow-non-fqdn` to `true`.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Symptoms and solutions
|
||||||
|
----------------------
|
||||||
|
|
||||||
|
Here are some typical errors, and how to overcome them. It often helps to close and reopen browser, or restart servers in order for remedy to take effect.
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
|
||||||
|
There is an error when starting embedded LDAP server:
|
||||||
|
|
||||||
|
```
|
||||||
|
GSSException: Invalid name provided (Mechanism level: KrbException: Cannot locate default realm)
|
||||||
|
```
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure that krb5.conf file exists - location and file name is OS specific. See step no. 5 of the instructions.
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
|
||||||
|
Browser redirects to normal login screen. There are no errors in Wildfly log.
|
||||||
|
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure to perform `kinit`, and properly configure Firefox. See points no. 1, and no. 4 above.
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
|
||||||
|
Browser redirects to a normal login screen. There is a warning in Wildfly log:
|
||||||
|
|
||||||
|
```
|
||||||
|
11:31:48,267 WARN [org.keycloak.federation.kerberos.impl.SPNEGOAuthenticator] (default task-6) GSS Context accepted, but no context initiator recognized. Check your kerberos configuration and reverse DNS lookup configuration
|
||||||
|
```
|
||||||
|
|
||||||
|
There is also a warning similar to the following in Embedded LDAP log:
|
||||||
|
|
||||||
|
```
|
||||||
|
11:31:47,923 WARN [org.apache.directory.server.KERBEROS_LOG] No server entry found for kerberos principal name HTTP/localhost.localdomain@KEYCLOAK.ORG
|
||||||
|
11:31:47,925 WARN [org.apache.directory.server.KERBEROS_LOG] Server not found in Kerberos database (7)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure that 127.0.0.1 reverse resolution returns 'localhost'. See point no. 2 above.
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
|
||||||
|
Browser redirects to a normal login screen. There is a stacktrace in Wildfly log:
|
||||||
|
```
|
||||||
|
15:10:04,531 WARN [org.keycloak.federation.kerberos.impl.SPNEGOAuthenticator] (default task-3) SPNEGO login failed: java.security.PrivilegedActionException: GSSException: Failure unspecified at GSS-API level (Mechanism level: Invalid argument (400) - Cannot find key of appropriate type to decrypt AP REP - DES3 CBC mode with SHA1-KD)
|
||||||
|
at java.security.AccessController.doPrivileged(Native Method)
|
||||||
|
at javax.security.auth.Subject.doAs(Subject.java:422)
|
||||||
|
at org.keycloak.federation.kerberos.impl.SPNEGOAuthenticator.authenticate(SPNEGOAuthenticator.java:46)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure `http.keytab` is available at the location specified in `kerberosrealm.json`. See point no. 3 above.
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
|
||||||
|
Browser opens /kerberos-portal page, but reports an error retrieving user details from LDAP. There is a stacktrace in Wildfly log:
|
||||||
|
```
|
||||||
|
15:29:39,685 ERROR [stderr] (default task-6) javax.naming.AuthenticationException: GSSAPI [Root exception is javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Server not found in Kerberos database (7) - Server not found in Kerberos database)]]
|
||||||
|
15:29:39,687 ERROR [stderr] (default task-6) at com.sun.jndi.ldap.sasl.LdapSasl.saslBind(LdapSasl.java:169)
|
||||||
|
15:29:39,687 ERROR [stderr] (default task-6) at com.sun.jndi.ldap.LdapClient.authenticate(LdapClient.java:236)
|
||||||
|
15:29:39,689 ERROR [stderr] (default task-6) at com.sun.jndi.ldap.LdapCtx.connect(LdapCtx.java:2788)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure `http.keytab` is available in location specified in `kerberosrealm.json`. See point no. 3 above. Also delete embedded server's cache directory:
|
||||||
|
|
||||||
|
rm -rf /tmp/server-work-keycloakDS
|
||||||
|
|
||||||
|
|
||||||
|
### Symptom
|
||||||
|
```
|
||||||
|
17:32:19,825 ERROR [stderr] (default task-24) org.keycloak.util.KerberosSerializationUtils$KerberosSerializationException: Null credential given as input. Did you enable kerberos credential delegation for your web browser and mapping of gss credential to access token?, Java version: 1.8.0_60, runtime version: 1.8.0_60-b27, vendor: Oracle Corporation, os: 4.1.6-200.fc22.x86_64
|
||||||
|
17:32:19,826 ERROR [stderr] (default task-24) at org.keycloak.util.KerberosSerializationUtils.deserializeCredential(KerberosSerializationUtils.java:109)
|
||||||
|
17:32:19,827 ERROR [stderr] (default task-24) at org.keycloak.example.kerberos.GSSCredentialsClient.getUserFromLDAP(GSSCredentialsClient.java:42)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Solution
|
||||||
|
|
||||||
|
Make sure to properly configure Firefox. See point no. 4 above.
|
||||||
|
|
||||||
|
|
|
@ -86,7 +86,7 @@
|
||||||
"bindCredential" : "secret",
|
"bindCredential" : "secret",
|
||||||
"kerberosRealm" : "KEYCLOAK.ORG",
|
"kerberosRealm" : "KEYCLOAK.ORG",
|
||||||
"serverPrincipal" : "HTTP/localhost@KEYCLOAK.ORG",
|
"serverPrincipal" : "HTTP/localhost@KEYCLOAK.ORG",
|
||||||
"keyTab" : "/tmp/http.keytab"
|
"keyTab" : "http.keytab"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
|
|
@ -83,6 +83,10 @@
|
||||||
<key>ldap.ldif</key>
|
<key>ldap.ldif</key>
|
||||||
<value>kerberos-example-users.ldif</value>
|
<value>kerberos-example-users.ldif</value>
|
||||||
</systemProperty>
|
</systemProperty>
|
||||||
|
<systemProperty>
|
||||||
|
<key>workingDirectory</key>
|
||||||
|
<value>${project.basedir}/target</value>
|
||||||
|
</systemProperty>
|
||||||
</systemProperties>
|
</systemProperties>
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
|
@ -106,6 +106,11 @@ public class SPNEGOAuthenticator {
|
||||||
logAuthDetails(gssContext);
|
logAuthDetails(gssContext);
|
||||||
|
|
||||||
if (gssContext.isEstablished()) {
|
if (gssContext.isEstablished()) {
|
||||||
|
if (gssContext.getSrcName() == null) {
|
||||||
|
log.warn("GSS Context accepted, but no context initiator recognized. Check your kerberos configuration and reverse DNS lookup configuration");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
authenticatedKerberosPrincipal = gssContext.getSrcName().toString();
|
authenticatedKerberosPrincipal = gssContext.getSrcName().toString();
|
||||||
|
|
||||||
if (gssContext.getCredDelegState()) {
|
if (gssContext.getCredDelegState()) {
|
||||||
|
|
|
@ -35,7 +35,7 @@ public class KerberosKeytabCreator {
|
||||||
System.out.println("-------------------------");
|
System.out.println("-------------------------");
|
||||||
System.out.println("Arguments missing or invalid. Required arguments are: <principalName> <passPhrase> <outputKeytabFile>");
|
System.out.println("Arguments missing or invalid. Required arguments are: <principalName> <passPhrase> <outputKeytabFile>");
|
||||||
System.out.println("Example of usage:");
|
System.out.println("Example of usage:");
|
||||||
System.out.println("java -jar embedded-ldap/target/embedded-ldap.jar keytabCreator HTTP/localhost@KEYCLOAK.ORG httppassword /tmp/http.keytab");
|
System.out.println("java -jar embedded-ldap/target/embedded-ldap.jar keytabCreator HTTP/localhost@KEYCLOAK.ORG httppassword http.keytab");
|
||||||
} else {
|
} else {
|
||||||
final File keytabFile = new File(args[2]);
|
final File keytabFile = new File(args[2]);
|
||||||
createKeytab(args[0], args[1], keytabFile);
|
createKeytab(args[0], args[1], keytabFile);
|
||||||
|
|
Loading…
Reference in a new issue