Verify that Kernel Mode Authentication is Disabled

To verify that kernel mode authentication is disabled on both servers:

  1. Open the IIS manager.
  2. Select the IIS web site to verify.
  3. In Features View, under IIS, double-click the Authentication icon.
  4. Select Windows Authentication and ensure that it is enabled.
  5. Click Advanced Settings.
  6. Verify that both EAP and Kernel Mode Authentication are disabled.

Ensure that clients can connect to Kerberos ports on the Active Directory role

To use Kerberos authentication, clients will have to request ticket-granting tickets (TGT) and service tickets (ST) from the Key Distribution Center (KDC) over UDP or TCP port 88. By default, when you install the Active Directory Role in Windows Server 2008 and later, the role will configure the following incoming rules to allow this communication by default:

Kerberos Key Distribution Center – PCR (TCP-In)

Kerberos Key Distribution Center – PCR (UDP-In)

Kerberos Key Distribution Center (TCP-In)

Kerberos Key Distribution Center (UDP-In)

In your environment ensure these rules are enabled and that clients can connect to the KDC (domain controller) over port 88.

Test browser authentication

After configuring the Active Directory, DNS, and SharePoint Server you can now test whether Kerberos authentication is configured correctly by browsing to your web applications. When testing in the browser, ensure the following conditions are met:

Once the previous conditions have been met, the easiest way to determine if Kerberos authentication is being used is by logging into a test workstation and navigating to the web site in question. If the user isn't prompted for credentials and the site is rendered correctly, you can assume Integrated Windows authentication is working. The next step is to determine if the negotiate protocol was used to negotiate Kerberos authentication as the authentication provider for the request. This can be done by checking the server security logs in the following way:

Servers Security Logs

If Kerberos authentication is working correctly you will see Logon events in the security event logs on the front-end webs with event ID = 4624.

In the general information for these events you should see the security ID being logged onto the computer, as well as the Logon Process used, which should be Kerberos.

Kerberos should now be fully authenticated and included in your environment.

Configuration Issues

If, after you add Kerberos to your environment, CENTRAL and Workflow do not work correctly, contact Winshuttle Support at info@winshuttle.com.

Previous Topic

Next Topic