You can configure Firefox to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
about:config
to display the list of current configuration options.
negotiate
to restrict the list of options.
network.negotiate-auth.trusted-uris
entry to display the Enter string value dialog box.
.example.com.
You can configure Chrome to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
[root@client]# mkdir -p /etc/opt/chrome/policies/managed/
/etc/opt/chrome/policies/managed/mydomain.json
file with write privileges limited to the system administrator or root, and include the following line:
{ "AuthServerWhitelist": "*.example.com." }
[root@server]# echo '{ "AuthServerWhitelist": "*.example.com." }' > /etc/opt/chrome/policies/managed/mydomain.json
Note: If using Chromium, use /etc/chromium/policies/managed/
instead of /etc/opt/chrome/policies/managed/
for the two SPNEGO Chrome configuration steps above.
Once you are able to log into the workstation with your kerberos key you are now able to use that ticket in Internet Explorer.
Login to the Windows machine using an account of your Kerberos realm (administrative domain)
In Internet Explorer, click Tools, and then click Internet Options.