icon-unified.svg
Experience Center

Deploying Kerberos for Internet & SaaS Virtual Service Edges

Zscaler supports authentication using Kerberos, an industry-standard security protocol. To learn more about Kerberos benefits, features, and limitations, see About Kerberos Authentication. Before deploying Kerberos for Internet & SaaS Virtual Service Edge, see Kerberos Requirements, Kerberos Deployment Guidelines, and Deploying Kerberos.

To deploy Kerberos authentication for a Virtual Service Edge:

  1. Go to Administration > Identity > Internet & SaaS > Internet Authentication Settings.
  2. On the Default Settings page, under Kerberos Authentication, select Enable Kerberos. You must enable Kerberos in order for the Enable Kerberos option to appear within the Edit Location window.
  3. Click Save.
  4. Use the following hostname format for a forward proxy or Kerberos PAC file entry:
    • The hostname format depends on the deployment mode of the Virtual Service Edge:

      vzen-<Cluster IP Address>-<Company ID>.gateway.<Cloud Name>.net

      For example:

      vzen-10-66-63-22-370255.gateway.zscalertwo.net
      • For standalone deployment mode, use the proxy IP address of the Virtual Service Edge instance:
      vzen-<Proxy IP Address>-<Company ID>.gateway.<Cloud Name>.net

      For example:

      vzen-10-66-63-21-370255.gateway.zscalertwo.net 
      Close
    • Use the following hostname format for the Kerberos PAC file:

      return "PROXY vzen-10-66-63-22-370255.gateway.<Cloud Name>.net:80; DIRECT";}
      Close
  5. Go to Infrastructure > Internet & SaaS > Traffic Forwarding > Location Management.
  6. On the Locations page, click the Edit icon for the location you want to use Kerberos authentication.

    The Edit Location window appears.

  7. In the Edit Location window:

    1. Select Enforce Authentication.
    2. Select Enable Kerberos Authentication.

    To learn more, see Configuring Locations.

    If Kerberos is enabled only in Authentication Settings and not in the Virtual Service Edge location configuration, all forward proxy traffic landing on ports 80/9443/DPPC-Port using the hostname format vzen-<Cluster IP Address>-<Company ID>.gateway.<Cloud Name>.net will do normal authentication, except port 8800. If the Virtual Service Edge location has Kerberos enabled, then all ports will use Kerberos authentication.

    The Virtual Service Edge redirects traffic to gateway authentication for ports 8800 and 8443 if Kerberos is enabled for the location. You can avoid bypassing of Kerberos authentication for these ports by adding the following parameter to the vzen_custom.conf file:

    [SME]
    spnego_krb_noport_bypass=1
    [-end-of-SME-]

    The following caveats apply to this configuration:

    • If Kerberos is enabled for a location with the spnego_krb_noport_bypass=1 parameter set in the vzen_custom.conf file, then all the ports that the Virtual Service Edge is listening on, enforces Kerberos authentication.
    • The pauth_port (8080) enforces digest authentication irrespective of the spnego_krb_noport_bypass=1 parameter set in the vzen_custom.conf file or either Kerberos or digest authentication being enabled for the location.
    • The Kerberos port (8800) enforces Kerberos authentication irrespective of the spnego_krb_noport_bypass=1 parameter set in the vzen_custom.conf file or Kerberos authentication being enabled for the location.
  8. Click Save and activate the change.
Related Articles
About Internet & SaaS Virtual Service EdgesAbout Internet & SaaS Virtual Service Edge ClustersConfiguring Internet & SaaS Virtual Service Edge ClustersUsing an External Load Balancer for Internet & SaaS Virtual Service Edge ClustersConfiguring Internet & SaaS Virtual Service Edge for Microsoft AzureConfiguring Internet & SaaS Virtual Service Edge for Amazon Web ServicesConfiguring Internet & SaaS Virtual Service Edge for Amazon Web Services with GWLBConfiguring Internet & SaaS Virtual Service Edge for Microsoft Hyper-VConfiguring Internet & SaaS Virtual Service Edge for Google Cloud PlatformAdding Internet & SaaS Virtual Service Edge InstancesAdding Internet & SaaS Virtual Service Edge ClustersDownloading an Internet & SaaS Virtual Service Edge VMDownloading Internet & SaaS Virtual Service Edge CertificatesConfiguring Internet & SaaS Virtual Service Edge and NTP Server SynchronizationInternet & SaaS Virtual Service Edge Configuration Guide for Dual Arm ModeDeploying Kerberos for Internet & SaaS Virtual Service EdgesForwarding Traffic to Internet & SaaS Virtual Service Edges