This post explains how to protect applications with SSO using Kerberos and Active Directory. It covers the authentication flow, deployment of SSO on OpenShift, and configuration of Red Hat's SSO to authenticate users stored in Active Directory with Kerberos.

10m read timeFrom developers.redhat.com
Post cover image
Table of contents
ArchitectureCreate a user in Active DirectoryConfigure encryption types allowed for KerberosGenerate a keytabDeploy SSO on OpenShiftConfigure Red Hat's SSODeploy the web applicationSet up workstationTroubleshooting

Sort: