Add the computers of the users to the Active Directory domain.
For instructions, see your Active Directory documentation.
Log in to the Active Directory domain, rather than the machine.
(Conditional) If you are using Internet Explorer, configure the Web browser to trust the Identity Server:
Click
> > > > > .In the
text box, enter the Base URL for the Identity Server, then click .In the configuration example, this is http://amser.provo.novell.com.
Click
.Click
> > .In the Security section, select
, then click .Restart the browser.
(Conditional) If you are using Firefox, configure the Web browser to trust the Identity Server:
In the URL field, specify about:config.
In the
field, specify .Double click network.negotiate-auth.trusted-uris.
This preference lists the sites that are permitted to engage in SPNEGO Authentication with the browser. Specify a comma-delimited list of trusted domains or URLs.
For this example configuration, you would add http://amser.provo.novell.com to the list.
If the deployed SPNEGO solution is using the advanced Kerberos feature of Credential Delegation, double-click network.negotiate-auth.delegation-uris. This preference lists the sites for which the browser can delegate user authorization to the server. Specify a comma-delimited list of trusted domains or URLs.
For this example configuration, you would add http://amser.provo.novell.com to the list.
Click
, then restart your Firefox browser.In the URL field, enter the base URL of the Identity Server with port and application. For this example configuration:
http://amser.provo.novell.com:8080/nidp
The Identity Server should authenticate the user without prompting the user for authentication information. If a problem occurs, check for the following configuration errors:
Verify the default user store and contract. See Step 13.
View the Identity Server logging file and verify the configuration. See Verifying the Kerberos Configuration.
If you make any modifications to the configuration, either in the Administration Console or to the bcsLogin file, restart Tomcat on the Identity Server.
(Conditional) If you have users who are outside the firewall, they cannot use Kerberos. SPNEGO defaults first to NTLM, then to HTTPS basic authentication. Access Manager does not support NTLM, so the NTLM prompt for username and password fails. The user is then prompted for a username and password for HTTPS basic authentication, which succeeds if the credentials are valid.
To avoid these prompts, you can have your users enable the .x. To access this option, click > > > , then scroll down to .
option in Internet Explorer 7