Organizations using IT Management Suite (ITMS) may observe authentication inconsistencies when using Kerberos (Negotiate) authentication in IIS. In some environments, network security devices such as Palo Alto firewalls may attribute traffic to a service or system account instead of the logged-in user when they cannot correctly interpret a Kerberos-authenticated exchange. This can lead administrators to switch IIS authentication to NTLM only to restore identity visibility, even though that does not address the underlying Kerberos visibility behavior.
Authentication failed, request level authentication is not supportedHTTP 0x80042D21IT Management Suite 8.6 RU3, 8.7.x, and later
IIS with Windows Authentication enabled
Domain-joined environments where Kerberos is expected
Environments using traffic inspection or identity-aware firewalls
ITMS uses Windows Integrated Authentication for agent and browser communication with IIS-hosted components. On IIS, the Windows Authentication module supports both Kerberos and NTLM through the providers list, with Negotiate typically attempting Kerberos first and falling back to NTLM when Kerberos cannot complete. Microsoft documents this provider model and the authPersistNonNTLM behavior in IIS.
A failed Kerberos attempt followed by a successful NTLM authentication does not by itself indicate an ITMS defect or issue. In many cases, the actual issue is that a firewall or intermediary device cannot properly interpret Kerberos tickets and therefore reports traffic under a service, machine, or other non-user identity.
The usual main reasons for concerns regarding Kerberos authentication has been:
The Symantec Management Agent (SMA or Altiris Agent) or browser client initiates the HTTP(S) request, but protocol selection between Kerberos and NTLM is handled by Windows SSPI and IIS Windows Authentication, not by custom ITMS logic. IIS supports both Kerberos and NTLM through the Windows Authentication providers configuration.
Kerberos uses service tickets tied to SPNs. Because the ticket exchange is not the same as an NTLM challenge/response flow, intermediary devices may not be able to identify the end user from the traffic and may instead attribute the traffic to a service, machine, or unknown identity. This is a visibility/interpretation issue, not necessarily an ITMS authentication problem.
When Negotiate is first in the provider list, Kerberos is attempted first. If Kerberos fails, NTLM can be used as fallback if NTLM remains enabled.
KB January Cumulative Security updates prevent endpoints from registering to task server also notes that putting NTLM on top of Negotiate may be required in some environments, especially with non-domain clients or CEM scenarios.
Kerberos requires valid SPNs that match the identity IIS uses to decrypt the Kerberos ticket. If IIS is using the machine account, the SPNs belong on the computer object. If IIS is using a custom application pool identity and useAppPoolCredentials=True, the SPNs must be registered to that account. Microsoft explicitly documents useAppPoolCredentials for these scenarios. ITMS does not automatically create all required HTTP SPNs in Active Directory as a general product behavior; they must be validated in AD and configured to match the IIS identity model in use.
authPersistNonNTLMMicrosoft documents authPersistNonNTLM as controlling whether IIS reauthenticates every non-NTLM request on the same connection. Setting it to true allows IIS to cache the Kerberos token for the TCP session. In ITMS Task Server scenarios for example, this setting can be important and may contribute to failures when left at false, but it should not be described as the only requirement for Kerberos to function.
Note: The information contained in this article is provided as a reference. Configuring Windows Authentication (Negotiate/Kerberos) is a complex infrastructure process that should be reviewed under Microsoft guidance and best practices. ITMS utilizes standard industry recommendations for these protocols.
| Scenario | Expected | Action Required |
|---|---|---|
| Firewall shows a service/system account, but ITMS functions correctly | Yes | Usually no |
| Kerberos attempt fails, then NTLM succeeds | Yes | Optional tuning |
| Agents cannot register with Task Server | No | Investigate |
| Repeated authentication errors appear in logs | No | Investigate |
| Kerberos is required because NTLM is disabled | No | Full Kerberos validation required |
Negotiate → Kerberos attempt → (if Kerberos cannot complete) → NTLM fallback
Microsoft recommends enabling Windows Authentication on the relevant IIS site, application, or virtual directory and disabling anonymous access where Windows Authentication is required.
Steps:
| Provider | Recommended Order |
|---|---|
| Negotiate | First |
| NTLM | Second |
Note: In some non-domain, internet-facing, or CEM-related scenarios, NTLM may need to remain enabled or even be prioritized as a workaround. Broadcom notes this possibility in KB January Cumulative Security updates prevent endpoints from registering to task server.
| Identity Type | Kerberos Consideration |
|---|---|
| Machine account / default behavior | SPNs on computer object |
| Custom domain account | SPNs on that account, with useAppPoolCredentials=True |
Microsoft’s IIS Kerberos guidance for custom identities aligns with this requirement.
Run the following on a domain-joined system with appropriate rights:
setspn -L <ServerNameOrServiceAccount>HTTP/servernameHTTP/servername.example.comIdentify the Identity:
Go to Application Pools, right-click DefaultAppPool (or the one running Altiris),
and select Advanced Settings.
Note the Identity (e.g., DOMAIN\AltirisService).
Set SPNs: Open an elevated Command Prompt and register the HTTP SPNs for the FQDN and NetBIOS name of the SMP Server:
setspn -s HTTP/SMP-ServerName DOMAIN\AltirisService
setspn -s HTTP/SMP-ServerName.domain.com DOMAIN\AltirisServiceDuplicate SPNs can break Kerberos resolution.
setspn -XuseAppPoolCredentials Only When NeededIf IIS uses a custom domain account for the application pool:
system.webServer/security/authentication/windowsAuthenticationuseAppPoolCredentials = TrueMicrosoft specifically recommends this when the SPN is tied to the app pool identity rather than the computer account.
authPersistNonNTLMsystem.webServer/security/authentication/windowsAuthenticationauthPersistNonNTLM = TrueMicrosoft documents that true causes IIS to authenticate the non-NTLM client once per TCP session instead of reauthenticating every request. This can help with Kerberos-based ITMS communication scenarios, including Task Server registration issues described in KB Error from logs: Authentication failed, request level authentication is not supported, check that IIS setting 'authPersistNonNTLM' is set to 'True' on the server.
On the client, after reproducing the connection:
klistCheck:
If a firewall cannot interpret Kerberos traffic correctly, it may be necessary to:
Firewalls can block traffic even if the required ports are open.
This part should be described as a network-device interpretation issue, not as proof that ITMS authenticated with the wrong account.
The following Microsoft-aligned points should be included because they help frame the IIS side correctly:
useAppPoolCredentials=True only when the app pool runs under a custom account and SPNs are registered to that account.authPersistNonNTLM=True when repeated Kerberos reauthentication affects the application flow.klist, SPNs with setspn, and authentication outcomes through IIS/application logs and network traces.If the issue involves Task Server registration:
authPersistNonNTLM.KB January Cumulative Security updates prevent endpoints from registering to task server specifically ties January 2022 changes and SPN/IIS adjustments to endpoint registration issues.
Common server-side locations include:
C:\ProgramData\Symantec\SMP\LogsC:\inetpub\logs\LogFilesFor agent-side troubleshooting, use the Symantec Management Agent log folder:
C:\ProgramData\Symantec\Symantec Agent\Logs\axxx.log| Log / Evidence | Interpretation |
|---|---|
Authentication failed | Authentication negotiation failed |
request level authentication is not supported | IIS/authentication persistence/config mismatch may exist |
| IIS 401 responses | Authentication did not complete successfully |
| Kerberos fails, NTLM succeeds | Expected fallback when both providers are enabled |
| Firewall shows service/system identity | Often device interpretation, not proof of wrong ITMS credentials |
If the environment cannot support Kerberos correctly or the network security tooling requires NTLM for identity visibility, IIS can be configured to prioritize or use NTLM.
| Advantage | Disadvantage |
|---|---|
| Improves identity visibility in some tools | Reduces security posture |
| Simplifies some non-domain scenarios | Disables or bypasses Kerberos benefits |
This should be positioned as a workaround or compatibility choice, not as the preferred long-term configuration when Kerberos is required.
| Misconception | Correct Interpretation |
|---|---|
| ITMS selects Kerberos or NTLM | Windows SSPI and IIS do |
| Seeing a service account means ITMS authenticated incorrectly | Often false; it may be a visibility issue |
| ITMS automatically creates the needed SPNs | SPNs must be validated and managed in AD |
| NTLM is always required for ITMS | No; it depends on the environment |
| Kerberos failure followed by NTLM success always means a defect | No; it is expected fallback behavior |
authPersistNonNTLM=True can be important for some ITMS Kerberos scenarios, but it is not the sole Kerberos requirement.