Follow the steps below to be absolutely sure of the account responsible for running the site that will support kerberos authentication. If SharePoint has already been configured verify your application pool account is, in fact, running the IIS application pool that supports the website where Kerberos is enabled
Open the web application that will support Kerberos and make a note of the application pool that supports this web application (note that you may have more than one web application for the same data for such cases as http and https so take care to determine the exact web application)
Make a note of the account that is the identity of this application pool, later this account must be trusted for “Delegation”.
* If the application pool is “Network Service” then Kerberos cannot be configured, the application pool account configured through Central Administration must be a domain account.
Right mouse key on Computer Management and click properties
Make a note of the machine’s actual name (you will not be using the alias)
Open the Application Pool account in Active Directory Users and Computers (ADUC) and note that there is no tab “Delegation”
Repeat the step above for the computer, the Delegation tab will typically not be visible until the SETSPN tool is run (that will come later). In the screenshot below, the Delegation tab is visible because the server is an all in one with a domain controller.
First things first, Kerberos can be enabled for an existing SharePoint web application if it was not specified during the initial installation wizard. Follow the steps below to enable kerberos authentication for a SharePoint web application.
Open central administration, note that the port may be different (I typically use 8080 for central administration) *** NOTE, IF YOU CAN NOT OPEN CENTRAL ADMINISTRATION, DO NOT HAVE RIGHTS, OR DO NOT KNOW HOW THEN STOP, YOU SHOULD NOT BE DOING THIS ***
Click on Manage Web Applications
In the dialog that opens, click on the zone (which is typically default although you may choose intranet)
In the Edit Authentication dialog that opens, scroll down to IIS Authentication Settings and choose “Negotiate (Kerberos)”. A JavaScript alert will appear warning you of the manual steps you will have to complete, these manual steps are detailed later in this article)
Click save and close the remaining dialogs.
The enable kerberos authentication a domain administrator will need to run the following commands via command line on each SharePoint Server. These commands use the SETSPN tool which is delivered by default in all Windows Server 2008 machines, if the tool is missing it is readily available for download from Microsoft.com.
Open a command prompt as administrator
First run the SETSPN command for the application pool account.
Correct the names in bold below to match the names in your environment. Also note that the “http“does not have a “://”.
setspn –A http/servername corp\spapppool
Run a similar command for each server (the results below are atypical since the machine used is already a domain controller, however, the command is still correct
setspn –A http/spapp10 spapp10
Once the SETSPN command has been run, the delegation tab will appear in Active Directory Users and Computers (ADUC) for the application pool account.
On the delegation tab of the SharePoint Application Pool’s properties window “Trust this user for delegation to any service (Kerberos only)”
Once the SETSPN command has been run, the delegation tab will appear in Active Directory Users and Computers (ADUC) for the servers registered using the SETSPN tool
On the Delegation tab check the box “Trust this computer for delegation to any service (Kerberos only)”
The setspn tool does support the –L or list switch that allows administrators to display the SPNs for a particular computer or user account.
setspn –L corp\spapppool
setspn –L spapp10
There are tools available for testing Kerberos but it’s quite easy to determine if it is running properly.
When it’s enabled but not working the following symptoms may be present
When Kerberos is first configured for the application pool account a message will appear in the Windows Security Logs stating that a ticket was requested.![]()
Open SharePoint in a browser using the URL where Kerberos is now configured and then refresh the security log. If Kerberos is running properly messages similar to the one below will appear in the logs on a regular basis.
For particular users logged in, events will appear similar to the one below
In addition, many messages similar to the one below will appear in the event log.
Configuring SharePoint 2010 with Kerberos Authentication, 9.2 out of 10 based on 19 ratings
This is the best article I ever seen about Kerberos Authentication. Great Job,
[...] Step by step instruction how how to configure SharePoint 2010 with Kerberos Authentication Source: Configuring SharePoint 2010 with Kerberos Authentication [...]
I followed this steps exactly and Kerberos is not working. Any suggestions on what I can check to get it working? I get prompted for username/password after I change the Authentication type to Negotiate, if I set it back to NTLM everything works again.
Great Blog Article !!!! Thanks
I had an issue where the login kept popping up.
Try adding the URL’s to your Local Intranet settings in Internet Explorer.
Internet Explorer
Tools -> Internet Otions -> Security -> Local Intranet -> Sites -> Advanced -> “Add The URL of your SharePoint there!”
That cracked it for me!
Thanks,
Lyon
Good article. Don’t you also need to setup SPN for SQL server and web applications FQDN it self?
this won’t work because the spn only belongs to the service account. No spn is needed for the server account
Thanks, I followed these steps an all is well. Really good instructions.
I followed this guide, and unfortunately it’s not working for me. I”m trying to setup Kerberos for the purpose of being able to connect to a file share through Sharepoint, without authenticating twice (double-hop). I’m looking in event viewer, and I’m not seeing *anything* related to Kerberos. I’m not sure what’s going on.
Have been struggling with getting Kerberos working in my lab and your (very clear) set of instructions pointed out 2 quite significant omissions I’d made. All working now, so thanks!
I have setup the kerberos and it works when i have a seperate database server. but when sharepoint and Sql server both are on the same machine , then i find in the security log the protocol used is “Negotiate” not the “kerberos” , any ideas how to get kerberos working for this kind of setup ,
