
Okta's Agentless Desktop SSO lets Windows-domain users authenticate to cloud applications automatically — no agents, no extra passwords, no friction. Here's how it works, how to set it up, and how to fix it when it doesn't.
ADSSO leverages Okta's cloud-based identity platform to validate Kerberos tickets, eliminating the need for on-premises agents. When users sign into your organization's Windows network, they receive a Kerberos Ticket Granting Ticket (TGT) from the domain controller. When they then access an Okta resource, Okta initiates a Kerberos authentication challenge — the user's browser presents the ticket automatically, and Okta validates it against your Active Directory.
The result: users are authenticated into Okta and all their assigned applications without ever seeing a second login prompt. This process significantly enhances productivity and security while eliminating the need to remember additional passwords.
Before implementing Okta Agentless Desktop SSO, your environment must support:
Agentless DSSO requires an on-premises Active Directory environment. If your organization does not have AD, this feature will not work. Consider Okta FastPass as an alternative for passwordless authentication from trusted networks or devices.
Your network must support Kerberos authentication. Most Windows domain environments already have this in place. Verify that your domain controllers are reachable from the machines that will use ADSSO.
Windows machines must be joined to the domain. macOS devices must also be domain members — Agentless DSSO will not function on non-domain macOS machines.
Browsers on both Windows and macOS must be configured to support Kerberos authentication for your Okta org's kerberos subdomain.
No Active Directory? Consider enabling Okta FastPass for passwordless authentication from a trusted network or device. While not identical to Agentless DSSO, it delivers a similar frictionless sign-in experience without requiring AD infrastructure.
The Agentless Desktop SSO authentication flow involves four elements working together:
A dedicated Active Directory service account with a configured Service Principal Name (SPN) establishes secure communication between Okta and your AD environment.
The KDC on your domain controller issues Kerberos tickets when users log in. When Okta challenges for authentication, the user's browser presents the ticket to the KDC for validation.
Okta provides a dedicated kerberos subdomain (e.g., myorg.kerberos.okta.com) that the browser connects to for ticket exchange. This must be in the browser's Intranet Zone and in the Okta network zone configuration.
An updated Identity Provider routing rule directs authentication requests from the designated network zones through the Agentless DSSO path rather than the standard Okta login page.
Follow these steps in order. Skipping or partially completing any step is the most common source of ADSSO failures.
Create a dedicated service account in Active Directory. Then open the command prompt and run the setspn command below — substituting your Okta org subdomain and service account name:
Domain administrator privileges are required to set the SPN. After this, add https://<myorg>.kerberos.<oktaorg>.com to the Intranet Site list in Internet Settings on every device that will use Agentless DSSO.
Both Windows and macOS browsers must be configured to support Kerberos authentication. On Windows, Internet Explorer and Edge pick this up automatically from Intranet Zone settings. Chrome and Firefox require explicit Kerberos policy configuration via Group Policy or MDM. On macOS, configure the browser to trust the Kerberos realm associated with your Windows domain.
Navigate to the Okta Admin Console and go to Security > Delegated Authentication. Select your desired DSSO mode: Off, Test, or On. Iron Cove strongly recommends using Test mode first to validate configuration before rolling out to all users. Choose the Active Directory instance where you configured the SPN and supply the service account credentials.
Add the network zones associated with the machines implementing Agentless DSSO. If Identity Provider (IdP) Discovery is enabled, these options are managed through IdP routing rules instead of the standard zones interface.
After enabling Agentless DSSO, update the legacy Desktop SSO Identity Provider routing rule to point to the agentless configuration. Manage this from Admin Console > Identity Providers > Routing Rules. This final step completes the configuration and activates agentless authentication for users in the defined network zones.
Iron Cove recommendation: Always enable Agentless DSSO in Test mode before switching to On. Test mode lets you validate authentication for a subset of users without affecting the rest of the organization. A misconfigured routing rule in production can lock users out of Okta entirely.
ADSSO issues almost always trace back to one of five root causes. Work through these in order before opening a support ticket.
Need hands-on help?Iron Cove's technical support team has diagnosed and resolved hundreds of Okta ADSSO configurations. We'll get your Kerberos flow working.
Iron Cove Solutions is the #1 Okta consulting partner. Whether you're setting up Agentless Desktop SSO for the first time or troubleshooting an existing deployment, our engineers have done it before — and we'll get it right.
© 2026 | Iron Cove Solutions| Privacy | Simplifying Cloud-Based Intention