Skip to content

Create User for Kerberos and LDAP auth

In order to be able to authenticate domain users using Kerberos protocol and perform LDAP group lookups Web Safety needs a designated user account. The following screenshots show how to create such a user and set his properties.

Note

Some tutorials describing integration of Squid with Active Directory rely on creating special computer account in AD for the same goal. Being a complex thing in itself, it also ties the proxy machine to Active Directory and prevents us from making and restoring VM snapshots because the restored snapshot loses the AD join state and needs to be rejoined manually.

To create such a user mapping, open your Domain Users and Computers management console on dc1.example.lan and create a new user squid@example.lan with password Passw0rd that never expires (you can use any password you like of course).

Create New User

New User Name

New User Password

Open that user Properties/Account tab and set the "Do not require Kerberos preauthentication" checkbox. Also make sure to set the "This account supports Kerberos AES 256 bit encryption" checkbox as shown on the following screenshot.

No Pre Auth

We will now use this user on next step of this tutorial.