EducationSoftwareStrategy.com
StrategyCommunity

Knowledge Base

Product

Community

Knowledge Base

TopicsBrowse ArticlesDeveloper Zone

Product

Download SoftwareProduct DocumentationSecurity Hub

Education

Tutorial VideosSolution GalleryEducation courses

Community

GuidelinesGrandmastersEvents
x_social-icon_white.svglinkedin_social-icon_white.svg
Strategy logoCommunity

© Strategy Inc. All Rights Reserved.

LegalTerms of UsePrivacy Policy
  1. Home
  2. Topics

KB33289: Prerequisites for implementing Integrated Authentication with MicroStrategy Components: Configuring Users in the Domain Controller


Community Admin

• Strategy


Prerequisites for implementing Integrated Authentication with MicroStrategy Components: Configuring Users in the Domain Controller

In order to successfully configure the system to use integrated authentication there are four types of users that need to be created in the Active Directory.
 
User for the Strategy Intelligence Server service
User for the Strategy Web Server Service
User for the Data Warehouse Service
End users that will be using Strategy
 
User for the Strategy Intelligence Server service
 
For Instructions on how to create the user in Active Directory for the Strategy Intelligence Server Service please refer to the following Technical Note:
 
KB19110: How to configure Strategy Intelligence Server Universal 9.x Kerberos (Integrated) authentication on Unix/Linux operating systems.
 
 
 
User for the Strategy Web Server Service
 
 

  • In Microsoft Active Directory, create a user for the Strategy Web Server service and set the Service Principal Name and User Principal Name. The Service Principal Name and User Principal Name must be in the following format:
     
    
    HTTP/machinename
    
    HTTP/Fully.Qualified.Domain.Name 

 
Note: It is very important to have the machine name in lower case, when defining the Service Principal Name in the active directory, (and the Domain name in Upper case if adding the domain name).
 
 

  • In Microsoft Active Directory, you must map a user account to the Service Principal Name for your application server.

 
 
This can either be done using the command line command: setspn -A  or using the adsiedit.msc Microsoft GUI tool
 
For this technical note we created a user called Yellow Tomcat
 

ka04W00000148t6QAA_0EM440000002AqH.jpeg

 
Notice how the Service Principal name is set to HTTP/krb-web-1.vmnet-esx-mstr.net@VMNET-ESX-MSTR.NET
 
Also set the userPrincipal name property to the same value HTTP/krb-web-1.vmnet-esx-mstr.net@VMNET-ESX-MSTR.NET
 

ka04W00000148t6QAA_0EM440000002AqJ.jpeg

 
(For all purposes integrated authentication relies in the uniqueness of the service principal name to identify the available services in th active domain except for when executing KINIT whose call will return the value stored under the User Principal Name)
 
 

  • If the Linux machine does not appear already in the active domain controller, add the machine making sure it is trusted for delegation

 
 
 
 
 
Third Party Software Installation WARNING
 
The third-party product(s) discussed in this technical note is manufactured by vendors independent of Strategy. Strategy makes no warranty, express, implied or otherwise, regarding this product, including its performance or reliability.


Comment

0 comments

Details

Knowledge Article

Published:

June 1, 2017

Last Updated:

June 1, 2017