Network Setup Examples

Network Setup Example 1: Kerberos KDC

For this example:

  • The BeyondTrust Appliance B Series may or may not be located behind a corporate firewall.
  • Representatives may or may not be on the same network as the BeyondTrust Appliance B Series.
  • Representatives belong as members to a Kerberos realm.
  • Representatives can communicate with their KDC (typically over port 88 UDP).

Network Setup Example 1: Kerberos KDC



  1. On the Kerberos KDC, register an SPN for your B Series Appliance hostname and then export the keytab for this SPN from your KDC.
  1. Log into your B Series Appliance's /login interface.

Kerberos Keytab

  1. Go to Users & Security > Kerberos Keytab.
  2. Under Import Keytab, click Choose File, and then select the exported keytab to upload. You should now see this SPN under the list of Configured Principals.


Add Security Provider

  1. Go to Users & Security > Security Providers. Click Add. From the dropdown, select Kerberos.


  1. Create a unique name to help identify this provider.
  2. Be sure to check the Enabled box.
  3. Choose if you want to synchronize display names.
  4. Optionally, select to remove the REALM portion from the User Principal Name when constructing the BeyondTrust username.
  1. For User Handling Mode, select Allow all users.
  2. For SPN Handling Mode, leave the box unchecked in order to allow all SPNs.
  1. You may also select a default group policy for users who authenticate against this Kerberos server.
  2. Click Save to save this security provider configuration.