In order to enable SSO authentication for your 4gl applications, you have to properly configure your browser.
Below you can find the necessary information on configuring different browsers.
You can refer here and here for certain details.
Mozilla Firefox supports the SPNEGO authentication protocol but must be configured to work correctly for Kerberos authentication.
By default, Firefox rejects all SPNEGO challenges from any web server. You have to configure the white list of sites permitted to exchange SPNEGO protocol messages with the browser.
Step 1. Open Mozilla Firefox.
network.negotiate-auth.trusted-uris
network.automatic-ntlm-auth.trusted-uris
You can use wild-carded domains as well:
More information about enabling SSO authentication in Firefox is here.
With , you generally need to set command-line parameters in order to white list servers with Chrome will negotiate.
On , Google Chrome shares the configuration with Internet Explorer, after the proper configuration of IE you do not need to additionally configure Chrome.
On and , you have to specify the command-line parameter --auth-negotiate-delegate-whitelist only if Kerberos is involved (otherwise, there is no need to set this parameter):
--auth-server-whitelist="*.qx.ua"
--auth-negotiate-delegate-whitelist="*.qx.ua"
Internet Explorer supports the SSO authentication with the Kerberos protocol but need additional configuration of the network or domain environment. Besides, this browser uses security zones for distinguishing which hosts belong to Internet, local intranet, trusted sites, or restricted sites.
To enable SSO authentication for your 4gl applications with Internet Explorer, please follow these steps:
Step 1. Open Internet Explorer.
Step 5. Now you have enable the SSO authentication for the qx.ua domain in Internet Explorer.
More information about enabling SSO authentication in Internet Explorer is here.
On , Safari supports the SPNEGO protocol (both Kerberos and NTLM) by default, so there is no need for any further configurations.
On , Safari supports the SPNEGO protocol with Kerberos as an authentication mechanism for computers where Mac OS is joined to Active Directory (refer here for details). If Mac OS is not joined to AD, then SPNEGO will always use NTLM as the authentication mechanism.