Domain policy setup
Requirements
Browsers like Chrome, Edge and Internet Explorer require the user to be logged into the computer with a domain account. These browsers will only send Kerberos tickets to sites that are in the Local Intranet Security Zone.
Edge and Google Chrome will also allow Kerberos to sites in the Local Intranet Zone.
Manual configuration and inspection
For testing purposes, you might be able to configure Zone settings locally in Internet Explorer.
Go to Tools / Internet Options / Security / Local Intranet / Sites / Advanced
However, in most organizations, the zone assignment is done centrally through the use of Group Policy Objects.
For Internet Explorer, ensure "Display company intranet sites in compatibility view" is disabled. Jira/Confluence will not work properly in compatibility mode. See the following for further details: Display problems when browsing Jira server with Internet Explorer in Compatibility or Enterprise modes | Jira | Atlassian Documentation
Group Policy configuration
In this example, we create a new policy to hold the settings.
Create the new Group Policy and edit it after creation
Setting appropriate values
Right-click and select Edit your Policy (see screenshot below):
In Group Policy Management Editor that comes up, navigate to:
Computer Configuration / Policies / Administrative Templates / Windows Components / Internet Explorer / Internet Control Panel / Security Page / Site to Zone Assignment List.
And press the "Show" button on the left to edit the list.
Place the site host from the URL (e.g., issues.example.com) in zone 1, Intranet Zone.
The address can be specified with a wildcard (*.example.com), or with a FQDN (issues.example.com)
Chrome has been known to interpret wildcard and FQDN differently in some cases. If Kerberos does not work with Chrome, try adding FQDN of the server URL to zone 1
Verifying the settings in Group Policy Management
Choose the newly created policy and Settings to the right. Verify that the Site to Zone Assignment List is correct.
If the settings are applied to Computer Configuration, the policy must be placed on an OU with computers or placed so that the policy is inherited.
If the settings are applied to User Configuration, the policy must be placed on an OU with users or placed so that the policy is inherited.
Verifying the settings on the client
On the client machine open a PowerShell or Command Prompt window and run the command gpupdate
to refresh the new domain group policy:
Navigate in Windows to Control Panel - Internet Options - Security - Local Intranet - Sites - Advanced
Verify that the settings from Group Policy are applied. "Automatically detect intranet network" should be left unchecked as we have seen unstable conditions for Kerberos if this is checked.
Verifying whether the site has been added to the Local Intranet Zone can also be checked in Internet Explorer by accessing https://issues.example.com and checking the Zone value.