<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Capturing the Agentless DSSO Flow with Wireshark for Okta Support
Okta Classic Engine
Directories
Okta Identity Engine
Overview

This article explains how to use Wireshark to capture the Kerberos packet sent during the Agentless DSSO authentication flow for Okta Customer Support.

Applies To
  • Directories
  • Agentless Desktop Single Sign-On (Agentless DSSO)
  • Kerberos
  • Wireshark
Solution
  1. Download and install Wireshark on the machine used in Agentless DSSO Authentication (https://www.wireshark.org/).
  2. Once installed, launch Wireshark and select the adapter responsible for handling traffic between the host and the Domain Controller.
  3. Stop the Wireshark capture by selecting the red square icon.
App
  1. Select Edit > Preferences > Protocols > KRB5, check both boxes under the Kerberos header, ensure the TCP and UDP ports are set to the correct Kerberos port for the domain, and then select Okay.
Kerberos
  1. Open a Command Prompt as a standard user and run the following command:
    • klist purge

       

  2. Start the Wireshark capture by selecting the blue fin icon. Select Continue without Saving to clear the previous results.
Wireshark
  1. Open a web browser and navigate to the Okta URL to begin the Agentless DSSO flow. Once it finishes, stop the Wireshark capture.
  2. Type "Kerberos" in the filter to verify the results.
Kerberos
  1. If there are no entries found, confirm the correct adapter is selected.
Fiddler
  1. A token beginning in YII is a Kerberos token, and a token beginning in TlR is an NTLM token.
    1. NTLM vs KERBEROS
  2. Select File > Save As and save the file in .pcapng format.
 
 
Loading
Capturing the Agentless DSSO Flow with Wireshark for Okta Support