Categories
Support exacqVision Client exacqVision Server

Local security policy will cause client-side Kerberos failure

Description 

A local security policy set from the domain controller causes client-Kerberos failure on client machines.

Product 

Any ExacqVision NVR

Any client machines or third-party client machines

Steps to Reproduce 

  • Integrate NVR to your domain controller using LDAP
  • Use single sign on to authenticate on client machine

Expected Results 

single sign on succeeds and you are successfully logged in

Actual Results 

single sign on fails and you get client-side Kerberos failure

Solution

You will need to grab the support diagnostics from the client machine

You will need to look into the client logs

You will need to look for log stating SSPI error: SEC_E_KDC_UNKNOWN_ETYPE (The encryption type requested is not supported by the KDC).

The local security policy on the DC and client machine network security: configure encryption types allowed for kerberos needs to have RC4_HMAC_MD5 enabled along with Future encryption types , AES256_HMAC_SHA1, and AES128_HMAC_SHA1

Categories
Knowledge Support Support exacqVision Client Products

Troubleshooting Active Directory Error Messages

Error: “Client Side Kerberos Authentication Failed”

Cause: The setspn command was not run on all Active Directory Servers, or there is a duplicate SPN.

Solution: On the DC, run the setspn command as directed in the appropriate ExacqVision Active Directory setup guide, or run setspn -X to check for duplicates. If a duplicate is found, remove the SPN attribute from all but one of the accounts.


Error: “User not authenticated in LDAP”

Cause: Windows 2000 or earlier Active Directory Domain Functional Level.

Solution: Upgrade the Functional Level of your Domain to Windows 2003 or higher.
See How to raise Active Directory domain and forest functional levels for details.

Alternate Solution:

  • If you are using ExacqVision 4.8 or newer, you can edit the StreamPI.xml file. Change the value of EnableActiveDirectoryUserDisabling from 1 to 0.
  • If you are using an ExacqVision version earlier than 4.8, contact support@exacq.com to obtain an updated DLL.

Error: The connection to the server always shows “Disconnected” in the ExacqVision Client.

Cause: The Binding DN is incorrect.

Solution: Complete the following procedure:

  1. Download Softerra LDAP Browser. (Be sure to click the tab for Browser, NOT Administrator.)
  2. Install and Run LDAP Browser.
  3. Click File and then New Profile.
  4. Enter a name for your new profile and click Next.
  5. Enter the hostname of your AD server in the Host field (or click the Lookup Servers button if you don’t know the host).
  6. Click Next.
  7. Select Currently Logged On User.
  8. Click Finish.
  9. Highlight the new profile you just created in the left panel.
  10. In the Find What box at the top of the right panel, enter the username used to connect to Active Directory in the ExacqVision software.
  11. Press Enter.
  12. After the search completes, find the correct user account.
  13. Right-click the user account and select Properties.
  14. Copy the string in the top portion of the Properties Panel (it should start with CN=).
  15. Paste this string into the Binding DN section of your ExacqVision Client and click Apply.

Error: “Connected, SPN not found”

While there are other possible causes, it’s common for a ‘Binding DN’ to be an extended string that is easy to mistype. For instance the following Distinguished Name will work, but must be typed exactly:

CN=exacqSVC,OU=ServiceAccounts,OU=SecurityGroups,OU=Indiana,OU=US,DC=exacqts,DC=local

Any incorrect spacing or punctuation will not allow proper setting of the SPN and you will see the following Server log:

StreamPI Warning LDAP: Bind DN was not found. Unable to create SPN.

You can also try the Username instead. In this instance, the username (UPN) for that account is:

exacqSVC@exacqts.local

<br>

Categories
Knowledge Support Support exacqVision Client Categories Products

Windows Server & Client and OpenLDAP/Kerberos

The following process allows you to configure exacqVision permissions and privileges for accounts that exist on an OpenLDAP/Kerberos server:

1. On the OpenLDAP/Kerberos server, ensure that your installed schema includes the following object types:

inetOrgPerson (RFC 2798)
organization (RFC 2256)
krbPrincipalAux (provided by the Ubuntu krb5-kdc-ldap package)

And at least 1 of the following opject types:

groupOfNames (rfc 2256)
groupOfUniqueNames (rfc 2256) – supported with exacqVision 6.8+
organizationRole (rfc 2256) – supported with exacqVision 6.8+
posixGroup (rfc 2256) – supported with exacqVision 6.8+

2. On the OpenLDAP/Kerberos server, ensure that your user accounts exist as inetOrgPerson objects, and that each account is also marked with the krbPrincipalAux auxiliary object type. Ensure that each user account has the following attribute values:

cn — the user account’s display name (for example, “John Smith”).
krbPrincipalName — the user account’s Kerberos principal name (for example, “john.smith@REALM”).
entryUUID — the unique identifier for the user account, managed by the slapd daemon

3. On the OpenLDAP/Kerberos server, ensure that your user groups exist as organization objects and that each group has the following attribute values:

o — the group’s display name (for example, “Marketing”)
entryUUID — the unique identifier for the group, managed by the slapd daemon

And that each group uses the corresponding attribute to map users.

member (for groupOfNames)
uniqueMember (for groupOfUniqueNames)
roleOccupant (for organizationalRole)
memberUid (for posixGroup)

4. On the OpenLDAP/Kerberos server, ensure that your user accounts are associated with groups via an “o” attribute for each group. Each inetOrgPerson object can have as many associated “o” attribute values as desired. The attribute value should resemble “o=Engineers”, for example, instead of “o=Engineers,dc=exacq,dc=test,dc=com.”

5. Make sure the OpenLDAP/Kerberos server’s fully qualified host name can be resolved. To do this, open a command prompt, ping the fully qualified host name, and look for a reply.

6. Make sure you have access to the ksetup command by completing the following steps:

A. For Windows XP, install the Windows XP Service Pack 2 Support Tools, available from Microsoft; for Windows Vista, find and install the equivalent package. When installing Support Tools, select a “complete” install. After installation, log out of Windows and then log in again.

NOTE: Other recent Windows versions, such as Windows 7 and Windows Server 2003, already include the ksetup command.


B. Open a command prompt and verify that you can execute the ksetup command.

C. Execute ksetup commands to add your Windows machine to the OpenLDAP/Kerberos domain, as shown in the following examples (all are case-sensitive):

ksetup /addkdc EXACQ.TEST.COM kdc.exacq.test.com
ksetup /addkpasswd EXACQ.TEST.COM kdc.exacq.test.com
ksetup /setrealm EXACQ.TEST.COM
ksetup /setcomputerpassword YOURCOMPUTERPASSWORD

NOTE: Be sure to note your chosen computer password for steps later in this process.

7. Restart the server. When the login screen appears after the system restarts, notice that the drop-down list contains the OpenLDAP/Kerberos domain. Select the domain and log in.

8. Open a command prompt and use ipconfig to ensure that the hostname and primary DNS suffix are correct.

9. Note the fully qualified host name (hostname.primary-dns-suffix) and IP address of the exacqVision server computer that you will connect to, the OpenLDAP/Kerberos domain, and the fully qualified host name and IP address of the OpenLDAP/Kerberos server. For example:

evserver.exacq.test.com 192.168.1.16
exacq.test.com
kdc.exacq.test.com 192.168.1.70

10. If installing an exacqVision server, add a service principal name on the OpenLDAP/Kerberos server for the exacqVision server. To do this, open a terminal window on the OpenLDAP/Kerberos server and execute the following command (using your information where appropriate):


sudo kadmin.local
ank -e rc4-hmac:normal EDVR/evserver.exacq.test.com
quit

<br>

NOTE: All text after the forward slash should be lower case, and ‘EDVR’ must be upper case.

11. On the exacqVision server or client computer, download and install the exacqVision software from www.exacq.com. You must be logged in with Local Administrator privileges to do this. The software automatically starts after the installation is complete.

12. If installing an exacqVision server, license the exacqVision server as an Enterprise system. To do this, complete the following steps:

A. Install the exacqVision Client software on the server if it is not already installed.

B. Run the exacqVision Client and connect to the local server (127.0.0.1) using the default ‘admin’ account.

C. Open the System Setup page for the exacqVision server you want to license and select the System tab.

D. Enter the valid Enterprise license as generated by exacq Technologies and click Apply in the License section.


13. If installing an exacqVision server, configure the directory settings. To do this, complete the following steps:

A. In the exacqVision Client software, select the ActiveDirectory/LDAP tab on the System Setup page.

B. Select the Enable Directory Service checkbox.

C. Select OpenLDAP/Kerberos in the LDAP Schema drop-down list. D. Enter the OpenLDAP/Kerberos server’s IP address in the Hostname/IP Address field.

E. Select the SSL checkbox if you want LDAP operations to use secure SSL. If so, see the Configuring SSL on an exacqVision Server document.

F. Verify the OpenLDAP/Kerberos server’s connection port. Unless you have reconfigured your OpenLDAP/Kerberos server, the port should be 636 when using SSL, or 389 without SSL.

G. Enter the LDAP Base DN, the container of all directory user accounts or groups that you want to map in the exacqVision software. For example, if the domain were exacq.test.com, the LDAP Base DN might be:

CN=Users, DC=exacq, DC=test, DC=com

NOTE: Check with the system administrator for the correct LDAP Base DN for your situation.

H. Enter the LDAP Binding DN, the fully qualified distinguished name (DN) of a directory user who has access to view the records of the directory user accounts. It is recommended that you enter the Administrator user account as the LDAP Binding DN. For example, if the domain were exacq.test.com, the LDAP Binding DN of the Administrator account would be:

CN=Administrator, CN=Users, DC=exacq, DC=test, DC=com

I. Enter the password for the account entered in the previous step.

J. To prevent any non-directory users that have previously been created from connecting to the exacqVision server (optional), deselect Enable Local User Accounts.

K. Click Apply to connect. An indicator on the ActiveDirectory/LDAP tab displays the success or failure of the connection attempt.

<br>

Connecting to ExacqVision servers

You can connect to your Enterprise exacqVision servers from the Windows exacqVision Client software in any of the following ways:

A. You can use a local exacqVision username and password.

B. If you are already logged into Windows as a domain user, you can use your system login without entering a username or password. In this case, leave the username and password fields empty on the Add Systems page, select Use Single Sign-On, and click Apply.

C. You can use any domain user account. Enter the account name in user@REALM format as the username (for example, ‘test.user@EXACQ.TEST.COM’), and use the password associated with that account. The realm must be in upper case, as shown in the example. Do NOT select Use Single Sign-On with this login method.

NOTE: If you attempt to connect to an exacqVision server using your system login without first logging in to Windows through the domain, the connection will fail.

<br>

Adding exacqVision users from the OpenLDAP/Kerberos database

When the exacqVision server is appropriately configured and connected to your OpenLDAP/Kerberos server, the Users page and the Enterprise User Setup page each contain a Query LDAP button that allows you to search for users or user groups configured in OpenLDAP/Kerberos. You can manage their exacqVision server permissions and privileges using the exacqVision Client the same way you would for a local user. On the System Information page, the Username column lists any connected OpenLDAP/Kerberos users along with their OpenLDAP/Kerberos origin (whether each user was mapped as an individual or part of a user group) in parentheses.

<br>

Windows-Server-Client-and-OpenLDAP-Kerberos.pdf
Categories
Knowledge Support Support exacqVision Client Categories Products

MacOS & Mac OS X Client and Active Directory/OpenLDAP/Kerberos

Configuration

The following process allows you to configure ExacqVision permissions and privileges for accounts that exist on an Active Directory/OpenLDAP/Kerberos (directory) server.

NOTE: On a Windows platform, the domain controller must run on Windows Server 2003 operating system or later. If the Active Directory functional level is Windows 2000 or earlier, you must select Password Never Expires in the Active Directory Users and Computers snap-in for any user that will connect to an ExacqVision server.

  1. Note the fully qualified host name (hostname.primary-dns-suffix) and IP address of the ExacqVision server computer, the directory domain, and the fully qualified host name and IP address of the directory server. For example:
        evserver.exacq.test.com        192.168.1.16<br>
        EXACQ.TEST.COM<br>
        adserver2016.exacq.test.com    192.168.1.70<br>
  1. Make sure the fully qualified host names of the directory server and ExacqVision server can be resolved. To do this, open a terminal window, ping the fully qualified host names, and look for a reply. Make sure the IP addresses match the IP addresses of the servers as noted in the previous step.

    NOTE: If the fully qualified host names cannot be resolved for either server, configure your hosts file with the fully qualified host names, as in the following example:
        /etc/hosts<br>
        192.168.1.16        evserver.exacq.test.com<br>
        192.168.1.70        adserver2016.exacq.test.com<br>
  1. Configure Kerberos (KRB5) by completing the following steps:
  1. Execute Kerberos.app from /System/Library/CoreServers
  2. From the menu, select Edit and then Edit Realms.
  3. In the Edit Realms dialog, click the plus (+) button, and enter the Realm Name in upper case.
  4. Select the Servers tab, click the plus button (+), and enter the IP address or fully qualified domain name of the directory server. Leave KDC as the Type and 88 as the Port.
  5. Click Apply and OK to exit.
  6. Click New.
  7. Enter the username and password for the directory account. To avoid entering the password again after the ticket expires, select Remember This Password in My Keychain.
  8. Make sure the Realm entered earlier in this step is selected from the drop-down list.
  9. Click OK.
  10. If the connection is successful, select the new ticket and click Destroy.
  1. On the ExacqVision Client computer, download and install the ExacqVision software from Exacq.com.

Connecting to ExacqVision Servers

You can connect to your Enterprise ExacqVision servers from the MacOS ExacqVision Client software in any of the following ways:

  • You can use a local ExacqVision Username and Password
  • You can always use your system login without having to enter a Username or Password. In this case, leave the Username and Password empty on the Add Systems page, select ‘Use Single Sign-On’, and click Apply. A pop-up window will prompt you to enter your Kerberos password, which is the same as your domain password.

Adding ExacqVision users from the directory database

When the ExacqVision server is appropriately configured and connected to your directory server, the Users page and the Enterprise Users page each contain a ‘Query LDAP’ button that allows you to search for users or user groups configured in the directory. You can manage their ExacqVision server permissions and privileges using the ExacqVision Client the same way you would for a local user. On the System Information page, the Username column lists any connected directory users along with their directory origin (whether each user was mapped as an individual user or part of a user group) in parentheses.

<br>

Mac-OS-X-Client-and-Active-Directory-OpenLDAP.pdf