A keytab is a file containing pairs of Kerberos principals and encrypted keys. A keytab file is created for applications that require single sign-on. Unified Access Gateway identity bridging uses a keytab file to authenticate to remote systems using Kerberos without entering a password.
When a user is authenticated into Unified Access Gateway from the identity provider, Unified Access Gateway requests a Kerberos ticket from the Kerberos Domain Controller to authenticate the user.
Unified Access Gateway uses the keytab file to impersonate the user to authenticate to the internal Active Directory domain. Unified Access Gateway must have a domain user service account on the Active Directory domain. Unified Access Gateway is not directly joined to the domain.
If the admin regenerates the keytab file for a service account, the keytab file must be uploaded again into Unified Access Gateway.
Access to the Kerberos keytab file to upload to Unified Access Gateway. The keytab file is a binary file. If possible, use SCP or another secure method to transfer the keytab between computers.
- In the admin UI Configure Manually section, click Select.
- In the Upload Keytab settings gearbox icon. section, select the
- (Optional) Enter the Kerberos principal name in the Principal Name text box.
Each principal is always fully qualified with the name of the realm. The realm should be in uppercase.
Make sure that the principal name entered here is the first principal found in the keytab file. If the same principal name is not in the keytab file that is uploaded, uploading the keytab file fails.
- In the Select Keytab file field, click Select and browse to the keytab file you saved. Click Open.
If you did not enter the principal name, the first principal found in the keytab is used. You can merge multiple keytabs into one file.
- Click Save.
What to do next
Configure the Web reverse proxy for Unified Access Gateway identity bridging.