Skip to content

Commit c6a1a6e

Browse files
authored
Merge pull request #49487 from githubarpyka/patch-3
Change proposal for Resource Based Kerberos Delegation
2 parents ba8ebcb + 3ea5910 commit c6a1a6e

File tree

1 file changed

+17
-8
lines changed

1 file changed

+17
-8
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,17 +63,27 @@ The Active Directory configuration varies, depending on whether your Application
6363

6464
#### Connector and application server in different domains
6565
1. For a list of prerequisites for working with KCD across domains, see [Kerberos Constrained Delegation across domains](https://technet.microsoft.com/library/hh831477.aspx).
66-
2. Use the `principalsallowedtodelegateto` property on the Connector server to enable the Application Proxy to delegate for the Connector server. The application server is `sharepointserviceaccount` and the delegating server is `connectormachineaccount`. For Windows 2012 R2, use this code as an example:
66+
2. Use the `principalsallowedtodelegateto` property of the service account (computer or dedicated domain user account) of the web application to enable Kerberos authentication delegation from the Application Proxy (connector). The application server is running in the context of `webserviceaccount` and the delegating server is `connectorcomputeraccount`. Run the commands below on a Domain Controller (running Windows Server 2012 R2 or later) in the domain of `webserviceaccount`. Use flat names (non UPN) for both accounts.
6767

68-
```powershell
69-
$connector= Get-ADComputer -Identity connectormachineaccount -server dc.connectordomain.com
68+
If the `webserviceaccount` is a computer account, use these commands:
7069

71-
Set-ADComputer -Identity sharepointserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
70+
```powershell
71+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
7272
73-
Get-ADComputer sharepointserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
74-
```
73+
Set-ADComputer -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
7574
76-
`sharepointserviceaccount` can be the SPS machine account or a service account under which the SPS app pool is running.
75+
Get-ADComputer webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
76+
```
77+
78+
If the `webserviceaccount` is a user account, use these commands:
79+
80+
```powershell
81+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
82+
83+
Set-ADUser -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
84+
85+
Get-ADUser webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
86+
```
7787

7888
## Configure single sign-on
7989
1. Publish your application according to the instructions described in [Publish applications with Application Proxy](application-proxy-add-on-premises-application.md). Make sure to select **Azure Active Directory** as the **Preauthentication Method**.
@@ -146,4 +156,3 @@ But, in some cases, the request is successfully sent to the backend application
146156
147157
148158
For the latest news and updates, check out the [Application Proxy blog](https://blogs.technet.com/b/applicationproxyblog/)
149-

0 commit comments

Comments
 (0)