You can configure Firefox to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
Import Certificate Authority certificate
Make sure you select all three checkboxes.
about:config
negotiate
network.negotiate-auth.trusted-uris
.example.com
You can configure Chrome to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
[root@client]# mkdir -p /etc/opt/chrome/policies/managed/
/etc/opt/chrome/policies/managed/mydomain.json
{ "AuthServerWhitelist": "*.example.com" }
[root@server]# echo '{ "AuthServerWhitelist": "*.example.com" }' > /etc/opt/chrome/policies/managed/mydomain.json
Note: If using Chromium, use /etc/chromium/policies/managed/ instead of /etc/opt/chrome/policies/managed/ for the two SPNEGO Chrome configuration steps above.
/etc/chromium/policies/managed/
/etc/opt/chrome/policies/managed/
WARNING: Internet Explorer is no longer a supported browser.
Once you are able to log into the workstation with your kerberos key you are now able to use that ticket in Internet Explorer.
Log into the Windows machine using an account of your Kerberos realm (administrative domain)
In Internet Explorer, click Tools, and then click Internet Options.