Kerberos overview
This overview describes the components, flow, and version requirements for integrating Kerberos-based Windows applications and Access Gateway. For more information about Windows Kerberos architectures, see Kerberos application reference architecture.
Architecture
                                                         
                                                    
Flow
- The user signs in.
- Okta sends the user's identity to Access Gateway.
- Access Gateway accesses the predefined Key Distribution Center (KDC) with credentials.
- KDC returns a Kerberos ticket.
- Access Gateway redirects to a backing application.
- The application returns a completed request.
- Access Gateway performs rewrites and returns the request to the user.
Components and requirements
| Component | Description and requirements | 
|---|---|
| Access Gateway | All versions of Access Gateway support Kerberos. | 
| Microsoft IIS IWA or OWA IWA | Supported versions: 
 | 
| Dynamic Name Services | Configure Access Gateway to use Windows DNS. See Add Access Gateway to Windows DNS. | 
| Windows Access Gateway service account | The account in the Windows domain that the Kerberos service uses. See Create a Windows Access Gateway service account. | 
| Keytab | A keytab is used when configuring an Access Gateway Kerberos service. See Create keytab. | 
| Okta Access Gateway Kerberos | Configure the Kerberos service instance. See Add Kerberos service. | 
| External URL | The external URL shown in the Access Gateway Public Domain field. | 
