When utilizing constrained delegation in combination with Smartcard authentication on client machines that are not in the same domain as the Kerberos environment, we need to setup Protocol Transition. This is for the transition between Smartcard and Kerberos for the ICA session. If this is not set, Single Sign-On (CPM) loses its authentication to the domain after the Kerberos ticket has expired within the ICA session.
Complete the following steps to set up Kerberos Constrained Delegation to use Single Sign-On (Password Manager) and Smartcard Authentication from clients not joined to the domain.
Open Active Directory Users and Computers console.
Locate the XenApp servers which use the Kerberos delegations. Select the server, right-click and select Properties.
In Properties, click the Delegation tab.
In the Delegation tab, select the Trust this computer for delegation to specified services only option. Select Use any authentication protocol option.
Note: This Use any authentication protocol option enables Protocol Transition and therefore is the most important setting.
Add the following services for the Domain Controller and the XenApp servers in the farm and click OK to save the settings.
Add each domain controller and select the services: CIFS, LDAP, ProtectedStorage
Add each XenApp server and select the service: HOST
Important! These settings must be set up correctly. If not set correctly, the authentication from non-domain joined machines or machines that are attached to a different domain will have problems. Also, if the option for Kerberos Only is selected, the data store synchronization may have LDAP errors and problems may occur accessing the data store after the Kerberos ticket expires. Without protocol transition it is not possible to maintain the authentication in the session when the user is using a machine that is not in the same domain where the XenApp farm is located.