Tags » Kerberos

Name Suffix Routing into the rescue publishing Non-Claims-Aware application using Kerberos Constrained Delegation

Last week I faced a challenge publishing non-claims-aware application (SharePoint 2013) using Kerberos Constrained Delegation (KCD) by Web Application Proxy (WAP).

The customer environment consists of a multi-forest active directory where user accounts and server objects each stored in a separate forest. 519 more words


PowerPivot for SharePoint: Lessons Learned and Useful Links

When designing a new SharePoint farm there are some decisions that are easy to make and for which there are useful examples such as the number of SharePoint servers that will be required and the distribution of the SharePoint Service applications. 405 more words


Overview of Indirect Active Directory Integration Using Identity Management (IdM)

The main alternative to direct integration of Linux/UNIX systems into Active Directory (AD) environments is the indirect approach – where Linux systems are first connected to a central server and this server is then somehow connected to AD. 633 more words

Red Hat Enterprise Linux

First Rule in Securing Postgres: Don’t Be Dumb

Source: Robert Haas, Chief Architect, Database Server, at EnterpriseDB.

A very popular standalone NoSQL database solution came under criticism about their security posture this week. It’s not the kind of publicity a database company, or any company for that matter, relishes.

649 more words

Creating a keytab file for kerberos authentication on Linux

This guide was created on CentOS 6
You will need the krb5-workstation package installed

yum install krb5-workstation

Create a keytab file for kerberos authentication for the user testuser1: 117 more words

System Admin

TECH::vSphere 6.0 - NFS thoughts

DISCLAIMER: I work for NetApp. However, I don’t speak for NetApp. These are my own views. :)

I’m a tad late to the party here, as there have already been numerous blogs about what’s new in vSphere 6.0, etc. 845 more words