Kerberos Authentication with K2 Servers

Kerberos authentication is a type of Integrated Windows Authentication that allows delegation of user credentials across multiple servers, allowing a server to pass the credentials of the user to another server or service. In contrast, NTLM, another type of Integrated Windows Authentication, can only pass user credentials to a single server, which is typically between client and server. If those credentials are required by a second server, the NTLM "double-hop" problem is introduced. In a single server environment where all K2 blackpearl components are installed on one server, NTLM can be used. However, Kerberos authentication is required in a distributed environment where K2 blackpearl components or supporting technologies are installed on different servers on the network. An alternative to Kerberos is K2 Pass-Through Authentication (K2PTA), but this may not be suitable in all scenarios. See the K2PTA topics for more information.

You only need Kerberos when there is the potential for two or more hops, like having a your web server separate from your K2 server, for example as seen in the Distributed Environments supported topology topic. You do not need Kerberos in a scenario like in the Single Application server, Separate SQL Server supported topology topic.

The following notes are based on customer support issues that may pertain to your environment. For more information read Kerberos Authentication Overview for Windows Server 2012 (https://technet.microsoft.com/en-us/library/hh831553.aspx).

  1. In Workspace, when configuring a SharePoint service instance to use impersonation, you may need to setup Constrained Delegation for the K2 Service account to delegate credentials to SharePoint. When using Full Delegation it fails with a 401 error when K2 calls SharePoint. Note that this does not apply to SharePoint 2013 or later.
  2. When searching for SmartObjects to create a BDC Application, the Central Administration AppPool account needs to delegate credentials to K2 and must be configured to use Kerberos authentication. This is typically not a problem if the portal site has been configured to use Kerberos and the Central Administration site uses the same AppPool account as the portal site. Configure the Central Admin AppPool account to use Constrained Delegation with Protocol Transition.
  3. It is sometimes necessary to configure the SSRS AppPool account to use Constrained Delegation when delegating credentials to the K2 host server to get reporting data. Using Full Delegation it fails with a 401.

The information in this section is based on the following assumptions:

  1. The administrator or person responsible for configuring Kerberos is familiar with the K2 blackpearl installation documentation.
  2. K2 blackpearl Host Server and other components have been successfully installed.
  3. K2 blackpearl Configuration Analysis tool has been run and completed successfully.
  4. K2 blackpearl Host Server can be started up successfully.
  5. SQL Server and SQL Reporting Services are running properly.
  6. SharePoint Server is running properly (if applicable in the environment).

Kerberos configuration can occur either before or after the installation of K2 blackpearl. The configuration of K2 blackpearl, which occurs directly after installation, allows for the automatic setting of the K2 blackpearl Server SPNs.

RUNTIME RIGHTS REQUIRED BY THE K2 ACCOUNTS