Skip to content

Commit 8f6e648

Browse files
Update OnPremSSO.md
1 parent e2873ed commit 8f6e648

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

website/docs/Entra Private Access/OnPremSSO.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ It includes making Domain Controllers available through Private Access and confi
99
[Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-kerberos-sso)
1010

1111

12-
### Tips for avoiding SSO issues
12+
## Tips for avoiding SSO issues
1313

1414
### Is NTLM not working when signing in with Windows Hello for Bussiness?
1515
Check this known issue: [NTLM auth requires fully functional Kerberos when signing in with Windows Hello for Business](../Troubleshooting/KnownIssues.md#ntlm-auth-requires-fully-functional-kerberos-when-signing-in-with-windows-hello-for-business)
1616

17-
#### Kerberos Negative cache
17+
### Kerberos Negative cache
1818
When you ask the system to get you a ticket to host/foo.bar.com and it fails to get a ticket for various reasons, it puts the SPN in what's called a negative cache. Every time you ask for a ticket to an SPN the first thing the system does is check this negative cache and asks, "have I tried this recently and if so, did it fail?" If it failed, then it knows don't bother trying and short circuit the same error. This cache is valid for a certain period of time and is controlled by the "SpnCacheTimeout" value. There is a separate cache controlled by FarKdcTimeout that does exactly the same thing, except for when it can't contact a given KDC.
1919

2020
Whenever a network changes to an "UP" state it triggers the Kerberos stack to refresh itself, including tickets, etc. We try and get a new TGT.

0 commit comments

Comments
 (0)