Configure Delegation When Running the Gateway Service as an Active Directory Service Account

If you've opted to run the gateway service as an Active Directory service account, there are some differences in the way delegation is configured. Before configuring delegation, you must first configure a service principal name for the service account you are using for the gateway service (see Configure Kerberos with an Active Directory Service Account).

If either of these scenarios is true in your environment, you will need to configure Kerberos delegation to the AnyCAGateway DCOM from the Keyfactor Command server hosting the Keyfactor Command Management Portal:

Configuring Kerberos delegation in Active Directory allows the user’s Kerberos credentials to be delegated from the Keyfactor Command server to the AnyCAGateway DCOM to allow the Keyfactor Command server to act on behalf of the user.

There are two different approaches to configuring constrained delegation:

  • With the traditional version of constrained delegation, you configure the service account under which the Keyfactor Command application pool runs and the machine account of the Keyfactor Command server to be allowed to delegate to each of your CAs, including the AnyCAGateway DCOM.
  • With the resource-based constrained delegation introduced in Windows Server 2012, you configure each of your CAs and the AnyCAGateway DCOM to be allowed to receive delegation from the service account under which the Keyfactor Command application pool runs and the machine account of the Keyfactor Command server. This option requires at least one domain controller that's server 2012 or better, though there can be 2008 or 2008 R2 domain controllers in the mix.