Kerberos outside the firewall

Russ Allbery eagle at eyrie.org
Mon Dec 1 18:17:10 EST 2014


"Nordgren, Bryce L -FS" <bnordgren at fs.fed.us> writes:

> I was actually proposing the opposite flow: use SAML or OAuth IdPs to
> authenticate users to Kerberos (WebAS). :) If the user can successfully
> authenticate to the AS using one of the SASL non-web SAML or OAuth
> workflows, they should get a local TGT (provided the KDC is configured
> for this).

I think this is working against the strengths of both systems.

Kerberos is really good at authenticating users -- there are tons of
programs and local tools for managing this, it's integrated with device
login, and so forth.  But it's bad at conveying attributes and
authorization.  SAML is great at conveying attributes about a user but
completely punts on authentication, requiring that you provide some local
auth mechanism (which often defaults to something crappy like passwords).

So using Kerberos for authorization and SAML for authentication is really
unintuitive to me, and I think is maximizing your pain levels.  :)
Whereas using Kerberos for authentication and then exposing that
information via SAML is well-trod ground.

-- 
Russ Allbery (eagle at eyrie.org)              <http://www.eyrie.org/~eagle/>


More information about the Kerberos mailing list