Configuring Entra ID Cloud Kerberos for macOS

In this article, I walk you through how to configure Entra ID Cloud Kerberos policies for macOS.

Configuring Entra ID Cloud Kerberos for macOS
Photo by Matt Artz / Unsplash

I've been playing around with Azure File Shares recently. Mostly for work purposes, but also for play... In my own tenant, I predominantly use SharePoint and OneDrive for all our storage needs, but as I've been toying around with Azure Files in my work tenant, I thought to myself "how easily would this slot into my personal tenant?".

The answer? Very easily.

But how does Cloud Kerberos come into this, and macOS? Well... macOS, obviously, isn't a Windows system. So, when it comes to authenticating against Entra ID, there's several hoops we jump through to get this working.

One of those, is Platform SSO. (A requirement for Cloud Kerberos btw).

Platform SSO is the piece of the puzzle that allows single sign on to all our Microsoft resources, from all Microsoft and built-in system apps in macOS. You sign in once, you sign in everywhere!

Once Platform SSO is configured, you can easily configure Cloud Kerberos.

Cloud Kerberos, in my example at least, allowed me to seamlessly authenticate against an Azure Files Share in macOS without having to authenticate with secret keys, or static usernames and passwords. It authenticates with my logged in user, the same user I used to authenticate against Platform SSO.

No prompts, no authentication messages, just straight access to my File Share.

So, without further ado, let me show you how to get it configured... with Microsoft Intune!

Configuring the Policy in Microsoft Intune

  1. You're going to start by heading to the Microsoft Intune Admin Center. And heading to the Devices > macOS > Configuration section.
  1. Create a new "Settings Catalog" policy.
    1. Give it a meaningful name like "Entra ID Cloud Kerberos Tickets", or whatever floats your boat!
  2. Add the following settings from Authentication > Extensible Single Sign On Kerberos.
    1. Extension Identifier
    2. Hosts
    3. Realm
    4. Team Identifier
    5. Type
    6. Extension Data
      1. Allow Automatic Login
      2. Allow Platform SSO OAuth Fallback
      3. Perform Kerberos Only
      4. Preferred KDCs
      5. Sync Local Password
      6. Use Platform SSOTGT
  3. Configure the settings as follows:
    1. Allow Automatic Login - True
    2. Allow Platform SSO Oauth Fallback - Enabled
    3. Perform Kerberos Only - True
    4. Preferred KDCs
      1. kkdcp://login.microsoftonline.com/YOUR TENANT ID/kerberos
    5. Sync Local Password - False
    6. Use Platform SSOTGT - Enabled
    7. Extension Identifier - com.apple.AppSSOKerberos.KerberosExtension
    8. Hosts
      1. Your primary domain
      2. *.Your primary domain
      3. windows.net
      4. *.windows.net
      5. kerberos.microsoftonline.com
      6. microsoftonline.com
      7. *.microsoftonline.com
    9. Realm - KERBEROS.MICROSOFTONLINE.COM
    10. Team Identifier - apple
    11. Type - Credential

Your policy should look a little something like this!

  1. Assign this policy to your users (not devices).

Once this has been applied to your users, and the policy has hit their devices, I've found a reboot is often necessary to get the Kerberos tickets queried and refreshed. But once that's done, you should find you can now access resources that require Kerberos tickets!

You'll know the policy has applied because a "key" will appear in the Menu Bar, and when you click on it, it'll tell you you're signed in!

And that's it! You've configured Entra ID Cloud Kerberos for macOS!

Until next time πŸ‘‹πŸ»