icon-zia.svg
Secure Internet and SaaS Access (ZIA)

Deploying Kerberos Authentication

This article provides step-by-step instructions for deploying Kerberos authentication for your organization. To learn more about using Kerberos for your organization, see About Kerberos Authentication.

Requirements

Before deploying Kerberos authentication, see:

Deploying Kerberos Authentication

To deploy Kerberos authentication:

  • To verify that your Kerberos realm name is a registered domain on the Zscaler service:

    1. Go to Administration > Company Profile.
    2. In the Organization tab, verify that the realm name matches one of the domains in the Domains field.
    Close
  • Provision users on the Zscaler service. You can provision users with one of the following options:

    The sAMAccountName@Windows- Domain is sent as the Kerberos identifier. You might need to change the user login attribute in your synchronization settings to map to the sAMAccountName.

    Close
  • Configure your outbound firewall to allow the necessary connections. To view the Zscaler Central Authority and ZIA Public Service Edge IP addresses, log in to the ZIA Admin Portal and go to Help > Cloud Configuration Requirements.

    Source: Client Workstation
    DestinationDestination
    Destination PortDestination Port
    DescriptionDescription
    Central Authority IP AddressesZIA Public Service Edge IP Address Ranges

    TCP 88 or UDP 88

    The choice of TCP or UDP is determined by the client. Some clients fall back to the other protocol if either TCP or UDP port 88 is blocked, but this is not guaranteed.

    TCP 8800 (The default Kerberos authentication port on ZIA Public Service Edges.)
    Enables the client to authenticate against the Zscaler Domain KDC.

    Enables the client to send traffic to the global Kerberos authentication port on the ZIA Public Service Edge. Not required if Kerberos is enabled on a location.

    Enabling Kerberos on a location automatically enforces Kerberos authentication, so you can send traffic to the default proxy ports, such as port 80.

    Close
  • Configure Kerberos as an authentication mechanism to generate the domain trust password that is used to establish the trust relationship between the Zscaler domain and your organization's domain. This password is required when you configure the trust relationship.

    1. Go to Administration > Authentication Settings.
    2. Select Enable Kerberos to use Kerberos authentication. You can use Kerberos authentication in addition to other authentication methods. The Domain Trust Password field appears.
    3. Under Domain Trust Password, click Generate New Password.

    The Alert window appears.

    1. In the Alert window, click OK. The password appears obfuscated.
    2. Click Reveal Password.
    3. Copy the password. You need it when you establish the cross-realm trust between your organization's domain and the Zscaler domain.
    4. Click Conceal Password.
    5. Save and activate the change.
    Close
  • Optionally enable Kerberos for a location. Only do this task if you want the service to enforce Kerberos authentication on all web traffic explicitly forwarded from the location and its associated dedicated ports. Skip this task, if you want to use Kerberos for specific users and another authentication mechanism for all other users in the location.

    To enable Kerberos authentication for all users in a location:

    1. Go to Administration > Locations.
    2. Click the Edit icon for the location.
    3. Enable Enforce Authentication.
    4. Enable Enable Kerberos Authentication.
    5. Click Save and activate the change.
    Close
  • Configure the trust relationship on the organization's server. See the configuration guide for your server:

    Close
  • To use Kerberos as an authentication mechanism, your organization's users must configure their browsers to use PAC files to forward their traffic to the Zscaler service, even if their location has established an IPSec or VPN tunnel to forward traffic to the service.

    To use the default Zscaler PAC file for Kerberos, see Using the Default Zscaler Kerberos PAC File.

    Close

Troubleshooting

To troubleshoot your Kerberos configuration, see Troubleshooting Kerberos and ZIA Public Service Edge Error Codes for Kerberos.

Related Articles
About Kerberos AuthenticationKerberos Authentication Deployment GuidelinesDeploying Kerberos AuthenticationKerberos Trust Relationship Configuration Guide for Windows Server & GPO PushKerberos Trust Relationship Configuration Guide for Linux ServerUsing the Default Zscaler Kerberos PAC FileTroubleshooting Kerberos AuthenticationZIA Error Codes for Kerberos Authentication