This post explains how to protect applications with SSO using Kerberos and Active Directory. It covers the authentication flow, deployment of SSO on OpenShift, and configuration of Red Hat's SSO to authenticate users stored in Active Directory with Kerberos.
Table of contents
ArchitectureCreate a user in Active DirectoryConfigure encryption types allowed for KerberosGenerate a keytabDeploy SSO on OpenShiftConfigure Red Hat's SSODeploy the web applicationSet up workstationTroubleshootingSort: