SEM supports Active Directory (AD) single sign-on (SSO). When enabled, SEM does not request a user name and password if the user is already logged in to AD. Instead, AD authenticates the user in the background, and automatically logs the user in to SEM with the appropriate user access rights. User access on the SEM Console is based on AD group membership.
To set up single sign-on:
There are two options to enable Kerberos AES encryption:
For the whole Active Directory:
For a single user in the Active Directory:
Set up Active Directory authentication in SEM and verify that users can log in to SEM with their AD credentials. When you are finished, generate a keytab file using Ktpass.
A Kerberos keytab file is required to configure SEM for AD SSO. SEM uses this file to authenticate users with AD and to enforce user account security. The keytab file is exported from AD and imported into SEM. The file contains a table of AD user accounts, along with the encrypted hash of each user's password. ktpass is the Windows Server command-line tool that generates the keytab file, as well as the shared secret key that SEM uses to securely authenticate users with AD.
See ktpass located on the Microsoft Documentation website for information about the ktpass command and arguments.
Before you run the ktpass command, gather the following information:
Fully-qualified domain name (FQDN) of the SEM VM - The FQDN is the complete domain name of the SEM virtual machine on the Internet. It includes the host name (the label assigned to a device on the network), and the name of the domain that hosts the device. For example, if the device name is swi-sem and the company domain is yourcompany.local, the FQDN is swi-sem.yourcompany.local.
Realm - This is the Active Directory Domain Services (AD DS) domain name. The realm name is used to route authentication requests to the AD server that holds user credentials. The realm name is case sensitive and normally appears in upper-case letters. To simplify your Kerberos client configuration, make the realm name identical to your DNS domain name by only using upper-case letters. For example, if YourCompany belongs to the DNS domain name yourcompany.com, the Kerberos realm should be YOURCOMPANY.COM.
Service principal name (SPN) - The SPN provides an alias (or pointer) to your domain account. The SPN consists of the FQDN, followed by the @ symbol, followed by the realm.
For example, the SPN for a device named swi-sem located at http://www.yourcompany.com would be http/swi-sem.yourcompany.local@YOURCOMPANY.COM where swi-sem.yourcompany.local is the FQDN, and YOURCOMPANY.COM is the realm.
Do the following to obtain the SEM host name and IP address:
Open the SEM CMC command line.
See Log in to the SEM CMC command line interface for instructions.
At the prompt, enter appliance to access the Appliance menu.
Create an A record entry for SEM on the DNS server using the host name and IP address. Verify that DNS Manager populated the domain field with the correct domain membership.
Select the Keytab OU and create a new user account (or Service Principle Name [SPN]).
Write down the SPN. You will need it in a later step.
Use the Kerberos keytab file using the ktpass command:
Run the following ktpass command:
ktpass -princ HTTP/<fqdn>@<REALM> -pass <SPN_account_password> -mapuser <domain_name><user_name> -pType KRB5_NT_PRINCIPAL -crypto ALL -out c:sem.keytabIf you receive an error when you run the command, replace the -mapuser argument with -mapuser <user_name>.
The ktpass command takes the following arguments:
To allow SEM access to Active Directory, import the keytab file into SEM.
SEM simplifies and improves Single Sign-On (SSO) configuration, moving these to the Authentication section of Settings.
SEM uses HTTP/2 protocols and rejects HTTP/1 requests. However, if you use Single Sign-On, HTTP/1 has to be enabled as SSO uses Kerberos/NTLM authentication which does not support HTTP/2. If SSO is subsequently disabled, HTTP/1 is also disabled.
Existing SSO Configurations are listed. These can be temporarily deactivated using the green toggle switches.
To add a new SSO login:
See Generate a keytab file using Ktpass for further information.
Your keytab file is uploaded to SEM. If you are logged in as a local user, SEM logs you out of the Admin user interface.
This SSO is now configured on SEM.
To edit or delete a SSO, click the vertical ellipsis icon after the SSO name and click Edit or Delete.
By default, most browsers do not restrict the transmission of login credentials for intranet sites. However, your company may have policies that have this restriction on intranet sites.
The Internet Properties window is displayed.
Add your FQDN or URL as a website in the Local Intranet zone.
For example:
https://swi-sem.yourcompany.local
Be sure to add the FQDN to the list of trusted sites.
To test your settings, close all browser windows (clear cache, if needed), and then open the SEM FQDN to confirm it is working.
Enter the fully-qualified domain name (FQDN) or URL that you use for SEM.
For example: mysemappliance.example.com
The web browser is now configured for SSO.
Complete these steps to configure which credentials users can use to log in to SEM. You can allow users to log in with either local SEM credentials or SSO (LDAP) credentials, or you can restrict users to only SSO (LDAP) credentials.
Updates take place immediately. Log in using the appropriate credentials to verify that the settings are correct.
This option is deprecated in versions 6.8 and later.
Use these alternate steps if you do not want to use the SEM admin user interface to upload the keytab file. (You do not have to repeat this process if you already uploaded the keytab file to SEM.)
Log in to the CMC command-line interface.
See Log in to the SEM CMC command line interface for instructions.
At the cmc> prompt, enter import.
Follow the prompts on your screen to complete the import.
The file is uploaded in the appliance file system.
Enter your user name and password.
Arrow down to SSO configuration, and then press Enter.
Arrow down to Add New Configuration, and then press Enter.
The content on this screen may vary with your SEM implementation.
Enter your SSO configuration settings.
Enter the Service Principle Name (SPN). See Generate a keytab file using Ktpass for details.
For example: http/swi-sem.yourcompany.local@YOURCOMPANY.COM
Enter the path to your keytab file using the following syntax:
/var/transfer/storage/<your_keytab_file_name>.keytab
Arrow down to Save, and then press Enter.
The upload is completed.
SSO is now configured on your appliance.
Updates take place immediately. Log in using the appropriate credentials to verify that the settings are correct.
Link nội dung: https://superkids.edu.vn/sem-xet-a26731.html