Este conteúdo não está disponível no idioma selecionado.

Chapter 13. Configuring applications for a single sign-on


Single sign-on (SSO) simplifies authentication by allowing users to access multiple systems via a single login procedure. Configure applications like browsers and email clients to accept Kerberos tickets, SSL certificates, or tokens as valid credentials.

The configuration of different applications may vary. This chapter shows how to configure SSO authentication schema for the Mozilla Thunderbird email client and Mozilla Firefox web browser as the examples.

13.1. Prerequisites

Verify that the target system hosts the required versions of Mozilla Firefox and Mozilla Thunderbird before attempting configuration. Ensure these applications are installed and accessible to the user. Mozilla Firefox version 88 Mozilla Thunderbird version 78

13.2. Configuring Firefox to use Kerberos for single sign-on

Configure Firefox to negotiate Kerberos authentication with intranet sites. Adding specific domains to the trusted URI list in the configuration settings permits the browser to pass existing Kerberos credentials to the Key Distribution Center (KDC) automatically.

Note

Even after configuring Firefox to pass Kerberos credentials, you still need a valid Kerberos ticket. To generate a Kerberos ticket, use the kinit command and supply the user password for the user on the KDC.

[jsmith@host ~] $ kinit
Password for jsmith@EXAMPLE.COM:

Procedure

  1. In the address bar of Firefox, type about:config to display the list of current configuration options.
  2. In the Filter field, type negotiate to restrict the list of options.
  3. Double-click the network.negotiate-auth.trusted-uris entry.
  4. Enter the name of the domain against which to authenticate, including the preceding period (.). If you want to add multiple domains, enter them in a comma separated list.

    Manual Firefox Configuration

    kerberos firefox

13.3. Viewing certificates in Firefox

By inspecting the Certificate Manager, users can verify currently installed authorities and personal credentials. This audit ensures the browser possesses the necessary trust anchors for secure connections.

You can view stored certificates in Mozilla Firefox to verify authentication settings.

Procedure

  1. In Mozilla Firefox, open the Firefox menu and select Preferences.

    Firefox preferences
  2. In the left panel, select the Privacy & Security section.

    Privacy & security
  3. Scroll down to the Certificates section.
  4. Click View Certificates to open the Certificate Manager.

    firefox view certificates

13.4. Importing CA certificates in Firefox

Importing a Certificate Authority (CA) certificate establishes trust with external servers. Adding the CA file to the browser’s store enables secure, encrypted connections to websites and applications issued by that authority.

Prerequisites

  • You have a CA certificate on your device.

Procedure

  1. Open Certificate Manager.
  2. Select the Authorities tab and click Import.

    Figure 13.1. Importing the CA Certificate in Firefox

    firefox import certificates
  3. Select the downloaded CA certificate from your device.

13.5. Editing certificate trust settings in Firefox

Modify trust settings to define how the browser interacts with specific certificates. Adjusting these permissions determines if the browser validates the certificate for identifying websites or email users.

Prerequisites

  1. You have successfully imported a certificate.

Procedure

  1. Open Certificate Manager.
  2. Under the Authorities tab, select the appropriate certificate and click Edit Trust.
  3. Edit the certificate trust settings.

    Figure 13.2. Editing the Certificate Trust Settings in Firefox

    firefox editing certificate

13.6. Importing personal certificate for authentication in Firefox

Personal certificates identify the user to remote web services. Importing these files into the browser enables client-side authentication, allowing access to secure sites that require identity verification beyond simple passwords.

Prerequisites

  1. You have a personal certificate stored on your device.

Procedure

  1. Open Certificate Manager.
  2. Select the Your Certificates tab and click Import.

    Figure 13.3. Importing a Personal Certificate for Authentication in Firefox

    firefox import custom certificate
  3. Import the appropriate certificate from your computer.

13.7. Viewing certificates in Thunderbird

By accessing the Certificate Manager in Thunderbird, users can audit stored security credentials. Reviewing these files ensures the email client contains the correct authorities and personal keys for encrypted communication.

Procedure

  1. In Thunderbird, open the main menu and select Preferences.

    Figure 13.4. Selecting Preferences from menu

    Privacy & Security
  2. In the left panel, select the Privacy & Security section.

    Figure 13.5. Selecting security section

    Privacy & Security
  3. Scroll down to the Certificates section.
  4. Click Manage Certificates to open the Certificate Manager.

    Figure 13.6. Opening Certificate Manager

    Privacy & Security

13.8. Importing certificates in Thunderbird

Importing Certificate Authority (CA) files enables the email client to validate secure connections. Adding these authorities ensures Thunderbird trusts the SSL/TLS certificates presented by mail servers during data exchange.

Prerequisites

  • You have a CA certificate stored on your device.

Procedure

  1. Open Certificate Manager.
  2. Select the Authorities tab and click Import.

    Figure 13.7. Importing the CA certificate in Thunderbird

    thunderbird import cert
  3. Select the downloaded CA certificate.

13.9. Editing certificate trust settings in Thunderbird

Modifying trust attributes controls how Thunderbird validates certificates for specific operations. Adjust these settings to explicitly authorize authorities for identifying mail servers or signing email messages.

Prerequisites

  • You have successfully imported a certificate.

Procedure

  1. Open Certificate Manager.
  2. Under the Authorities tab, select the appropriate certificate and click Edit Trust.
  3. Edit the certificate trust settings.

    Figure 13.8. Editing the certificate trust settings in Thunderbird

    thunderbird edit cert

13.10. Importing personal certificate in Thunderbird

Personal certificates enable S/MIME functionality for signing and encrypting emails. Importing these keys into the personal store allows the client to prove the sender’s identity and decrypt incoming secure messages.

Prerequisites

  1. You have a personal certificate stored on your device.

Procedure

  1. Open Certificate Manager.
  2. Under the Your Certificates tab, click Import.

    Figure 13.9. Importing a personal certificate for authentication in Thunderbird

    thunderbird import custom cert
  3. Import the required certificate from your computer.
  4. Close the Certificate Manager.
  5. Open the main menu and select Account Settings.

    Figure 13.10. Selecting Account Settings from menu

    thunderbird account settings
  6. Select End-To-End Encryption in the left panel under your account email address.

    Selecting End-To-End Encryption section.

    thunderbird end to end
  7. Under S/MIME section, click the first Select button to choose your personal certificate to use for signing messages.
  8. Under S/MIME section, click the second Select button to choose your personal certificate for encrypting and decrypting messages.

    Choosing certificate for signing and encryption/decryption.

    thunderbird select personal cert
    Note

    If you forgot to import valid certificate, you can open Certificate Manager directly using the Manage S/MIME certificate option.

Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2026 Red Hat
Voltar ao topo