Skip to main content
Question

Chrome and Kerberos Single Sign On

  • May 21, 2014
  • 41 replies
  • 314 views

Show first post

41 replies

dan-snelson
Forum|alt.badge.img+30
  • Honored Contributor
  • January 9, 2019

@bbot In a single test with macOS 10.14.2 (18C54) and Chrome 71.0.3578.98, it's working for me for a single domain.


Forum|alt.badge.img+12
  • Contributor
  • January 9, 2019

Thanks for the info @dan-snelson . I'm going to be reimage a new Mac with Mojave and try again without any of our company software on there..

Are you using a configuration profile or a one time script to configure the settings? We've been deploying it via config profile successfully up until 10.13.6.


dan-snelson
Forum|alt.badge.img+30
  • Honored Contributor
  • January 9, 2019

@bbot We're using a one-time script via Self Service.


Forum|alt.badge.img+12
  • Contributor
  • January 9, 2019

@dan-snelson what version of the IWA web app are you running?


dan-snelson
Forum|alt.badge.img+30
  • Honored Contributor
  • January 10, 2019

@bbot We don't use Okta IWA Web App for Desktop SSO.


Forum|alt.badge.img+13
  • Honored Contributor
  • January 18, 2019

This may be a silly question, but once the changes to the WhiteLists are made and Chrome restarted, so long as a machine has a valid Kerberos ticket then SSO should work and just pass through correct? I've been trying for some time now and continue to get the prompts within Chrome when trying to access expected resources. Machine is bound, Kerberos ticket, 10.14.2 and latest Chrome.


dan-snelson
Forum|alt.badge.img+30
  • Honored Contributor
  • January 18, 2019

@andrew.nicholas I believe @bbot is running a similar setup; we no longer bind, using just Enterprise Connect, and Chrome is working for us with a single domain.


Forum|alt.badge.img+13
  • Honored Contributor
  • January 18, 2019

@dan-snelson Thanks dan, we still bind for a myriad of reasons but the accounts are local with EC tie ins as well.


Forum|alt.badge.img+11
  • Valued Contributor
  • January 7, 2020

@andrew.nicholas we're in the same boat, unable to get it to work on 10.14, 10.15, have you had success with this?


Forum|alt.badge.img+4
  • Contributor
  • February 6, 2020

Agentless DSSO for my OKTA Tenant now works with these preferences


Forum|alt.badge.img+4
  • Contributor
  • February 28, 2020

This should work successfully when setting the config via a managed Plist, won't work from the terminal


Forum|alt.badge.img+15
  • Valued Contributor
  • April 27, 2021

I needed to add “AuthNegotiateDelegateByKdcPolicy” true
See: https://chromeenterprise.google/policies/#AuthNegotiateDelegateByKdcPolicy


ncworster
Forum|alt.badge.img+7
  • New Contributor
  • May 23, 2022

In case anyone else is looking at this thread in 2022, the current supported method (in my testing) is the configuration profile one, and the keys all use the term "allowlist" instead of "whitelist".  Good documentation here: https://chromeenterprise.google/policies/#HTTPAuthentication

Here's my working config profile:

<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">

<plist version="1.0">

<dict>

<key>AuthNegotiateDelegateAllowlist</key>

<string>*.company.com</string>

<key>AuthServerAllowlist</key>

<string>*.company.com</string>

<key>AuthNegotiateDelegateByKdcPolicy</key>

<true/>

</dict>

</plist>


Forum|alt.badge.img+4
  • New Contributor
  • January 11, 2023

Thank you ncworster! This was exactly the fix we needed for our company. we changed the keys to "allowlist" and now sso is working properly for Google Chrome.


Forum|alt.badge.img+4
  • Contributor
  • August 18, 2023

yes big thank you @ncworster and others in the thread from august 2023,  I have been fighting with kerberos auth for a few specific things in chrome for a while now, this solved the problem. Config profile -> Application & custom settings -> Upload > com.google.chrome preference domain> copy plist > scope.


Forum|alt.badge.img
  • New Contributor
  • June 6, 2025

Any help appreciated - this doesn't seem to be working for me on Sequoia.

Thanks