You'll need to have your Active Directory administrator create a service account that holds the Kerberos Service Principles for your intranet server. The SPN or SPN's should look like <service>/<hostname>
and contain all the host names and/or DNS aliases users use to access your intranet website, so something like:
http/solarishost.int.example.com
http/solarishost
http/intranet.example.com
Your Active Directory administrator can extract the SPN's to a keytab
file which you need to copy to your Solaris host and configure in Apache. Note: the http/hostname SPN is also used for HTTPS.
On Solaris you'll need the MIT Kerberos 5 tools and libraries, download and install the Apache module and then configure it.
Typically you'll edit the global Kerberos configuration file /etc/krb5/krb5.conf
to set up the the defaults mod-auth-kerb will also use, important are generally only the names of the REALM, typically the Windows AD domain, your DNS domain and the KDC servers - normally the domain controllers your AD administrator tells you to use.
The Apache configuration looks something like this:
<Location /intranet>
AuthType Kerberos
AuthName "intranet"
KrbMethodNegotiate on
KrbAuthoritative on
KrbVerifyKDC on
KrbAuthRealm YOUR_ACTIVEDIRECTORY_DOMAIN
Krb5Keytab /etc/httpd/intranet.keytab
KrbSaveCredentials off
Require valid-user
</Location>
Some understanding of Kerberos and Microsoft AD helps, as it can be tricky to debug for uninitiated. Oh and with Kerberos make sure your clocks are synchronized.