Configure Kerberos Constrained Delegation (Optional)

Note:  These instructions apply only to Windows installations under IIS.

If you are using Active Directory as your identity provider, you must configure Kerberos delegation from the Keyfactor Command server to the CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA.(s) when either of the following applies:

  • You want CA interactions performed through the Keyfactor Command Management Portal (such as revocation or CA-level certificate approval) to run under the signed-in user’s identity, rather than the Keyfactor Command service account or an explicit user defined in the CA configuration.

  • You want users to enroll for certificates in the Management Portal after signing in with Kerberos authentication rather than Basic authentication.

  • You want certificate enrollment to occur under the signed-in user’s identity rather than under the Keyfactor Command service account or an explicit user defined in the CA configuration.

Configuring Kerberos delegation in Active Directory allows the user’s Kerberos credentials to be delegated from the Keyfactor Command server to the CA(s) to allow the Keyfactor Command server to act on behalf of the user.

The types of interactions affected by delegation in the Keyfactor Command Management Portal include:

There are two different approaches to configuring constrained delegation:

  • With the traditional version of constrained delegation, you configure the service account under which the Keyfactor Command Management Portal application pool runs and the machine account of the Keyfactor Command server to be allowed to delegate to each of your CAs.
  • With resource-based constrained delegation introduced in Windows server 2012, you configure each of your CAs to be allowed to receive delegation from the service account under which the Keyfactor Command Management Portal application pool runs and the machine account of the Keyfactor Command server. This option requires at least one domain controller that's server 2012 or newer, though there can be 2008 or 2008 R2 domain controllers in the mix.

With both approaches to constrained delegation, you need to set the service principal name (SPN) for the Keyfactor Command server (see Configure the Service Principal Name for the Keyfactor Command Server).

Note:  If you're using a Keyfactor CA gateway and the gateway service is running as an Active Directory service account, delegation to that gateway is configured differently than is described below. Refer to the gateway documentation for more information.