Skip to content

Kerberos authentication

Kerberos authentication lets you log in into CERN websites with a single click when you are already logged in in your system. It is enabled by default in all the centrally managed Windows machines at CERN, and it can also be configured in other devices.

System configuration


Please check the Linux @ CERN documentation on how to configure and use Kerberos in Linux.


Kerberos works out of the box in Windows computers managed by NICE Services. To set up Kerberos in an OEM Windows setup, you can get help from Windows Support.

Web browser settings

Mozilla Firefox

Firefox does not automatically perform Kerberos authentication against any sites. You must manually add sites to a trusted sites list.

To enable Kerberos authentication in Firefox:

  • Open Firefox and enter about:config in the address bar. Dismiss any warnings that appear.
  • In the Filter field, enter negotiate.
  • Double-click the network.negotiate-auth.trusted-uris preference. This preference lists the trusted sites for Kerberos authentication.
  • In the dialog box, enter
  • Click the OK button.
  • The domain that you just entered in the network.negotiate-auth.trusted-uris should now appear in Value column. The setting takes effect immediately; you do not have to restart Firefox.

Google Chrome

  • On Windows, the newest versions of Chrome work out of the box when the system is correctly configured (check Windows above).
  • On Linux, Chrome or Chromium must be started with the --auth-server-whitelist parameter:
    • google-chrome --auth-server-whitelist=","
    • chromium --auth-server-whitelist=","
    • you may also create a group-policy for chrome by creating the file /etc/opt/chrome/policies/managed/cern_kerberos_allow.json with the content { "AuthServerAllowlist": "," }
    • this parameter was called AuthServerWhitelist in older releases (before chrome-101)
    • the two hostnames (for new+old WebSSO) should be sufficient to authenticate.

Microsoft Edge

Kerberos works out of the box in Edge when the system is correctly configured (check Windows above).