In this sample configuration tutorial, we use 2 "clean" VMware virtual machines - one running CentOS 7 and another
running Windows 7. The VMs are interconnected via a VMware NAT virtual network.
Create a test Kerberos user "user1", the password must match the one of your test Windows user account on the
Windows 7 VM;
create a host principle for Windows 7 VM "host/vm-win7.vm-centos7", remember the password - you will need it when
setting up the Wndows Kerberos client;
create a service principle for Dante "rcmd/VM-CENTOS7";
extract a keytab file for Dante:
Finally, start the Dante server. Doing that using the "systemctl" command didn't work for us correctly for some
reason. So let's start Dante manually (-D tells Dante to run as daemon):
[root@localhost ~]# /usr/sbin/sockd -D
Set up the native Kerberos client and ProxyCap on Windows 7
Start the Windows 7 VM.
Edit %SystemRoot%\system32\drivers\etc\host, add the following entries (replace the IP addresses with your IP addresses):
Configure the Kerberos client (replace "Administrator" with the name of your test Windows user account if needed; replace "password"
with the password of the Kerberos principal "host/vm-win7.vm-centos7"):
Check the "Proxy requires authentication" and "Use GSSAPI authentication" checkboxes.
Note that the value of "Hostname" above is used by ProxyCap to format the Kerberos service principle
(in this sample "rcmd/VM-CENTOS7"). So don't specify the IP address. Here the name also must be in
uppercase letters else the Linux KDC won't recognize it.
Finally create a "redirect" routing rule in ProxyCap, specify the proxy server defined in the previous step.