1. Should the Computer Account name in AD have domain name in the end? For example «.your_domain»?
The issue is that AD doesn't allow to create computer account names with "." (dots)
2. Can we use other different Computer Account name for pre-Windows 2000 format?
The issue is that AD makes pre-Windows 2000 format shorter. For example, we have 2 ProxySG with names "XX-YYY-ZZX-XX-01a" and "XX-YYY-ZZX-XX-01b". And AD makes its pre-Windows 2000 format as "XX-YYY-ZZX-XX-0" and "XX-YYY-ZZX-XX-0" which are equals
SG/ASG/ISG-Proxy
For question 1, please see the documented response in the Tech. Doc. with the URL below.
Enable Kerberos in an IWA BCAAA Deployment
Note 1:
For the BCAAA service to participate in an IWA Kerberos authentication exchange, it must share a secret with the Kerberos server (called a KDC) and have registered an appropriate Service Principal Name (SPN).
Specifically, in step 6 of the shared doc., we have the below.
Register the Kerberos Service Principal Name (SPN) for the ProxySG appliance appliance:
Where <FQDN_of_ProxySG> is the FQDN of the ProxySG appliance appliance as specified in the browser's explicit proxy configuration (explicit deployments) or in the Virtual URL setting in the IWA realm configuration (transparent deployments) and <AD_Account_Name> is the name of the BCAAA domain service account.
For example
setspn -A HTTP/bcaaaUser1.acme.com AcmeDomain\BCAAAuser
Note 2:
Do not assign the same SPN to multiple Active Directory accounts or the browser will fall back to NTLM without providing any warning or explanation. To list all SPNs that are currently registered on an account, use the setspn -L <AD Account Name> command. If you find a duplicate, use the setspn -D <SPN> command to remove the duplicate SPN.
For question 2, please find our response below.
In your scenario, when configuring Kerberos authentication in a Blue Coat Authentication and Authorization Agent (BCAAA) deployment for ProxySG, the issue arises due to the truncation of the computer names by Active Directory (AD) in the pre-Windows 2000 format (NetBIOS name). This truncation leads to identical names for both ProxySG appliances, which can cause conflicts and errors in Kerberos authentication.
Potential Solutions:
Implementation Steps:
So, to avoid conflicts caused by the truncation of computer names to the same pre-Windows 2000 format, you should create unique and shorter computer account names in AD for each ProxySG appliance. This will ensure that each appliance has a distinct identity in AD, allowing Kerberos authentication to function correctly.