Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

By default, every client will receive a Kerberos authentication challenge (SPNEGO) if Kerberos is enabled in KSSO. If a given client does not support Kerberos or is not part of the domain, this can result in a bad user experience. The way clients handle a Kerberos challenges is both application and platform dependent. The most common issue is to have Windows desktop browsers that are not part of the AD domain, for example, an employee working from home or external consultants. When a Windows browser is unable to obtain a Kerberos ticket for any reason, it shows an NTLM fallback popup like the following:

...

Client IP restrictions

The screenshow screenshot below shows how IP restrictions Restrictions can be configured. The default is for that every client will receive a Kerberos challenge. In the screenshot, all clients except any IP starting with 172.* will receive a challenge.It’s possible to use a blocked list or a unblocked list strategy, depending on what is most convenient for your environment. Both lists allow either prefix notation or regular expression syntax, which is enabled by starting with ^.

NB: For Kantega Single Sign-on to evaluate IP restrictions correctly when behind a reverse proxy, the IP address must be communicated to the Atlassian application. See the yellow notification box in the below screenshot, which tells you the IP currently “seen” by the application.

...

User Agent restrictions

You may also restrict Kerberos from happening for a given User-Agent. This is relevant if you have some client clients calling your Atlassian product that does not understand the Kerberos challenge Kantega Single Sign-on givesprovides.

There is an already built-in list of known User Agents that is not Kerberos compatible. The functionality below lets you add your own User-Agent restrictions to this list.

...