<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298028#M251158</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i've a problem authenticating kerberos with multiple domains.&lt;/P&gt;&lt;P&gt;I'm using Alfresco 4.2f on Windows Server 2012 R2 and i've a forest trust (function level 2008 r2) between two domains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My kerberos cross domain setup is like in the word document from here:&lt;BR /&gt;&lt;A class="link-titled" href="https://issues.alfresco.com/jira/browse/MNT-10368" title="https://issues.alfresco.com/jira/browse/MNT-10368" rel="nofollow noopener noreferrer"&gt;[MNT-10368] support for cross-domain kerberos authentication - Alfresco JIRA&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or this guide&amp;nbsp;&lt;A class="link-titled" href="http://docs.alfresco.com/5.0/tasks/auth-kerberos-cross-domain.html" title="http://docs.alfresco.com/5.0/tasks/auth-kerberos-cross-domain.html" rel="nofollow noopener noreferrer"&gt;Configuring cross-domain support for Kerberos | Alfresco Documentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is, i'm able to login fine with users from my main domain, but not with users from my second domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've traced the krb5 packages with wireshark and if i try to login from the second domain i get following package:&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;KRB5 Error: KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;In this package i can see that the user from the second domain tries to authenticate with the realm from the main domain.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The problem is exactly the same as here (without answer):&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/thread/176568"&gt;Kerberos with multiple domains on Share 4.0.d&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Here is my authentication part from alfresco-global.properties):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;ldap.authentication.defaultAdministratorUserNames=alfrescoadmin&lt;BR /&gt;kerberos.authentication.defaultAdministratorUserNames=alfrescoadmin&lt;BR /&gt;authentication.chain=kerberos1:kerberos,ldap-domain1:ldap-ad,ldap-domain2:ldap-ad‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Here is my krb5.ini:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;[libdefaults]&lt;BR /&gt;default_realm = DOMAIN1.LOC&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;ticket_lifetime = 2h&lt;BR /&gt;default_tkt_enctypes = rc4-hmac&lt;BR /&gt;default_tgs_enctypes = rc4-hmac&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;DOMAIN1.LOC = {&lt;BR /&gt; kdc = dc01.domain1.loc:88&lt;BR /&gt; admin_server = dc01.domain1.loc:749&lt;BR /&gt; default_domain = domain1.loc&lt;BR /&gt;}&lt;BR /&gt;DOMAIN2.LOC = {&lt;BR /&gt; kdc = dc01.domain2.loc:88&lt;BR /&gt; admin_server = dc01.domain2.loc:749&lt;BR /&gt; default_domain = domain2.loc&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;dc01.domain1.loc = DOMAIN1.LOC&lt;BR /&gt;.dc01.domain1.loc = DOMAIN1.LOC&lt;BR /&gt;dc01.domain2.loc = DOMAIN2.LOC&lt;BR /&gt;.dc01.domain2.loc = DOMAIN2.LOC‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Here is my kerberos subsystem config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;ntlm.authentication.sso.enabled=true&lt;BR /&gt;kerberos.authentication.realm=DOMAIN1.LOC&lt;BR /&gt;kerberos.authentication.sso.enabled=true&lt;BR /&gt;kerberos.authentication.user.configEntryName=Alfresco&lt;BR /&gt;kerberos.authentication.http.configEntryName=AlfrescoHTTP&lt;BR /&gt;kerberos.authentication.http.password=HighSecure&lt;BR /&gt;kerberos.authentication.authenticateCIFS=false&lt;BR /&gt;kerberos.authentication.browser.ticketLogons=true‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Here is my java.login.config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;Alfresco {&lt;BR /&gt; com.sun.security.auth.module.Krb5LoginModule sufficient;&lt;BR /&gt;};&lt;BR /&gt;AlfrescoHTTP {&lt;BR /&gt; com.sun.security.auth.module.Krb5LoginModule required&lt;BR /&gt; storeKey=true&lt;BR /&gt; useKeyTab=true&lt;BR /&gt; keyTab="C:/etc/alfrescohttp.keytab"&lt;BR /&gt; principal="HTTP/ecm01.domain1.loc";&lt;BR /&gt;};&lt;BR /&gt;com.sun.net.ssl.client {&lt;BR /&gt; com.sun.security.auth.module.Krb5LoginModule sufficient;&lt;BR /&gt;};&lt;BR /&gt;other {&lt;BR /&gt; com.sun.security.auth.module.Krb5LoginModule sufficient;&lt;BR /&gt;};‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Here is the changed part from java.security:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;login.config.url.1=file:${java.home}/lib/security/java.login.config&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;And finaly the LDAP part for both domains:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;ldap.authentication.active=false &lt;BR /&gt;ldap.synchronization.active=true &lt;BR /&gt;&lt;BR /&gt;#&lt;BR /&gt;# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions&lt;BR /&gt;#&lt;BR /&gt;ldap.authentication.allowGuestLogin=false&lt;BR /&gt;&lt;BR /&gt;# How to map the user id entered by the user to taht passed through to LDAP&lt;BR /&gt;# In Active Directory, this can either be the user principal name (UPN) or DN.&lt;BR /&gt;# UPNs are in the form &amp;lt;sAMAccountName&amp;gt;@domain and are held in the userPrincipalName attribute of a user&lt;BR /&gt;ldap.authentication.userNameFormat=%s&lt;BR /&gt;&lt;BR /&gt;# The LDAP context factory to use&lt;BR /&gt;ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory&lt;BR /&gt;&lt;BR /&gt;# The URL to connect to the LDAP server &lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://dc01.domain1.loc:389&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use&lt;BR /&gt;ldap.authentication.java.naming.security.authentication=simple&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user at bind time&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas&lt;BR /&gt;ldap.authentication.escapeCommasInBind=false&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user when setting the authenticated user&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is &lt;BR /&gt;# pulled in as part of an LDAP sync&lt;BR /&gt;# If this option is set to true it will break the default home folder provider as space names can not contain \&lt;BR /&gt;ldap.authentication.escapeCommasInUid=false&lt;BR /&gt;&lt;BR /&gt;# The default principal to bind with (only used for LDAP sync). This should be a UPN or DN&lt;BR /&gt;ldap.synchronization.java.naming.security.principal=DOMAIN1\\alfrescoldap&lt;BR /&gt;&lt;BR /&gt;# The password for the default principal (only used for LDAP sync)&lt;BR /&gt;ldap.synchronization.java.naming.security.credentials=HighSecure&lt;BR /&gt;&lt;BR /&gt;# If positive, this property indicates that RFC 2696 paged results should be&lt;BR /&gt;# used to split query results into batches of the specified size. This&lt;BR /&gt;# overcomes any size limits imposed by the LDAP server.&lt;BR /&gt;ldap.synchronization.queryBatchSize=1000&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the groups to import.&lt;BR /&gt;ldap.synchronization.groupQuery=(objectclass\=group)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the groups to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.groupDifferentialQuery=(objectclass\=group)&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the users to import.&lt;BR /&gt;ldap.synchronization.personQuery=(objectclass\=user)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the users to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.personDifferentialQuery=(objectclass\=user)&lt;BR /&gt;&lt;BR /&gt;# The group search base restricts the LDAP group query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.groupSearchBase=dc=domain1,dc=loc&lt;BR /&gt;&lt;BR /&gt;# The user search base restricts the LDAP user query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.userSearchBase=dc=domain1,dc=loc&lt;BR /&gt;&lt;BR /&gt;# The name of the operational attribute recording the last update time for a group or user.&lt;BR /&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;BR /&gt;&lt;BR /&gt;# The timestamp format. Unfortunately, this varies between directory servers.&lt;BR /&gt;ldap.synchronization.timestampFormat=yyyyMMddHHmmss'.0Z'&lt;BR /&gt;&lt;BR /&gt;# The attribute name on people objects found in LDAP to use as the uid in Alfresco&lt;BR /&gt;ldap.synchronization.userIdAttributeName=sAMAccountName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the first name property in Alfresco&lt;BR /&gt;ldap.synchronization.userFirstNameAttributeName=givenName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the last name property in Alfresco&lt;BR /&gt;ldap.synchronization.userLastNameAttributeName=sn&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the email property in Alfresco&lt;BR /&gt;ldap.synchronization.userEmailAttributeName=mail&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the organizational id&amp;nbsp; property in Alfresco&lt;BR /&gt;ldap.synchronization.userOrganizationalIdAttributeName=company&lt;BR /&gt;&lt;BR /&gt;# The default home folder provider to use for people created via LDAP import&lt;BR /&gt;ldap.synchronization.defaultHomeFolderProvider=userHomeFolderProvider&lt;BR /&gt;&lt;BR /&gt;# The attribute on LDAP group objects to map to the gid property in Alfrecso&lt;BR /&gt;ldap.synchronization.groupIdAttributeName=cn&lt;BR /&gt;&lt;BR /&gt;# The group type in LDAP&lt;BR /&gt;ldap.synchronization.groupType=group&lt;BR /&gt;&lt;BR /&gt;# The person type in LDAP&lt;BR /&gt;ldap.synchronization.personType=user&lt;BR /&gt;&lt;BR /&gt;# The attribute in LDAP on group objects that defines the DN for its members&lt;BR /&gt;ldap.synchronization.groupMemberAttributeName=member‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;ldap.authentication.active=false &lt;BR /&gt;ldap.synchronization.active=true &lt;BR /&gt;&lt;BR /&gt;#&lt;BR /&gt;# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions&lt;BR /&gt;#&lt;BR /&gt;ldap.authentication.allowGuestLogin=false&lt;BR /&gt;&lt;BR /&gt;# How to map the user id entered by the user to taht passed through to LDAP&lt;BR /&gt;# In Active Directory, this can either be the user principal name (UPN) or DN.&lt;BR /&gt;# UPNs are in the form &amp;lt;sAMAccountName&amp;gt;@domain and are held in the userPrincipalName attribute of a user&lt;BR /&gt;ldap.authentication.userNameFormat=%s&lt;BR /&gt;&lt;BR /&gt;# The LDAP context factory to use&lt;BR /&gt;ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory&lt;BR /&gt;&lt;BR /&gt;# The URL to connect to the LDAP server &lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://dc01.domain2.loc:389&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use&lt;BR /&gt;ldap.authentication.java.naming.security.authentication=simple&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user at bind time&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas&lt;BR /&gt;ldap.authentication.escapeCommasInBind=false&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user when setting the authenticated user&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is &lt;BR /&gt;# pulled in as part of an LDAP sync&lt;BR /&gt;# If this option is set to true it will break the default home folder provider as space names can not contain \&lt;BR /&gt;ldap.authentication.escapeCommasInUid=false&lt;BR /&gt;&lt;BR /&gt;# The default principal to bind with (only used for LDAP sync). This should be a UPN or DN&lt;BR /&gt;ldap.synchronization.java.naming.security.principal=DOMAIN2\\alfrescoldap2&lt;BR /&gt;&lt;BR /&gt;# The password for the default principal (only used for LDAP sync)&lt;BR /&gt;ldap.synchronization.java.naming.security.credentials=HighSecure&lt;BR /&gt;&lt;BR /&gt;# If positive, this property indicates that RFC 2696 paged results should be&lt;BR /&gt;# used to split query results into batches of the specified size. This&lt;BR /&gt;# overcomes any size limits imposed by the LDAP server.&lt;BR /&gt;ldap.synchronization.queryBatchSize=1000&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the groups to import.&lt;BR /&gt;ldap.synchronization.groupQuery=(objectclass\=group)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the groups to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.groupDifferentialQuery=(objectclass\=group)&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the users to import.&lt;BR /&gt;ldap.synchronization.personQuery=(objectclass\=user)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the users to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.personDifferentialQuery=(objectclass\=user)&lt;BR /&gt;&lt;BR /&gt;# The group search base restricts the LDAP group query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.groupSearchBase=dc=domain2,dc=loc&lt;BR /&gt;&lt;BR /&gt;# The user search base restricts the LDAP user query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.userSearchBase=dc=domain2,dc=loc&lt;BR /&gt;&lt;BR /&gt;# The name of the operational attribute recording the last update time for a group or user.&lt;BR /&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;BR /&gt;&lt;BR /&gt;# The timestamp format. Unfortunately, this varies between directory servers.&lt;BR /&gt;ldap.synchronization.timestampFormat=yyyyMMddHHmmss'.0Z'&lt;BR /&gt;&lt;BR /&gt;# The attribute name on people objects found in LDAP to use as the uid in Alfresco&lt;BR /&gt;ldap.synchronization.userIdAttributeName=sAMAccountName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the first name property in Alfresco&lt;BR /&gt;ldap.synchronization.userFirstNameAttributeName=givenName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the last name property in Alfresco&lt;BR /&gt;ldap.synchronization.userLastNameAttributeName=sn&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the email property in Alfresco&lt;BR /&gt;ldap.synchronization.userEmailAttributeName=mail&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the organizational id&amp;nbsp; property in Alfresco&lt;BR /&gt;ldap.synchronization.userOrganizationalIdAttributeName=company&lt;BR /&gt;&lt;BR /&gt;# The default home folder provider to use for people created via LDAP import&lt;BR /&gt;ldap.synchronization.defaultHomeFolderProvider=userHomeFolderProvider&lt;BR /&gt;&lt;BR /&gt;# The attribute on LDAP group objects to map to the gid property in Alfrecso&lt;BR /&gt;ldap.synchronization.groupIdAttributeName=cn&lt;BR /&gt;&lt;BR /&gt;# The group type in LDAP&lt;BR /&gt;ldap.synchronization.groupType=group&lt;BR /&gt;&lt;BR /&gt;# The person type in LDAP&lt;BR /&gt;ldap.synchronization.personType=user&lt;BR /&gt;&lt;BR /&gt;# The attribute in LDAP on group objects that defines the DN for its members&lt;BR /&gt;ldap.synchronization.groupMemberAttributeName=member‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully anyone can bring me in the right direction.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Beta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Dec 2016 11:55:48 GMT</pubDate>
    <dc:creator>betawayoflife</dc:creator>
    <dc:date>2016-12-22T11:55:48Z</dc:date>
    <item>
      <title>Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298028#M251158</link>
      <description>Hi guys,i've a problem authenticating kerberos with multiple domains.I'm using Alfresco 4.2f on Windows Server 2012 R2 and i've a forest trust (function level 2008 r2) between two domains.My kerberos cross domain setup is like in the word document from here:[MNT-10368] support for cross-domain kerbe</description>
      <pubDate>Thu, 22 Dec 2016 11:55:48 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298028#M251158</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2016-12-22T11:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298029#M251159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide more details, e.g. the principal set to authenticate on the Share tier (which is typically different from the Repository tier, which you have provided). I know you said you have configured it "like in the word document" but that word document is lacking some details I would have expected and all too often I have also seen slight errors / oversight tha turned out to be the cause of problems.&lt;/P&gt;&lt;P&gt;Also you can activate Java debug output for Kerberos authentication (system property &lt;CODE&gt;sun.security.krb5.debug&lt;/CODE&gt; set to true) and provide the details here so that people have more to go on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Dec 2016 17:41:01 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298029#M251159</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2016-12-25T17:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298030#M251160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Axel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i edit my first post and add more details.&lt;/P&gt;&lt;P&gt;I've already activatet the krb5.debug but i get no message / error in the alfrescout-stdout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only get following messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt; 2017-01-02 08:43:40,386 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] New Kerberos auth request from 1.2.3.4 (1.2.3.4:65030)&lt;BR /&gt; 2017-01-02 08:43:40,386 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] Issuing login challenge to browser.&lt;BR /&gt; 2017-01-02 08:43:40,464 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-3] Login page requested, chaining ...&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;In the webinterface i only get following error:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unable to login - unknown username/password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx,&lt;BR /&gt;Beta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 07:47:22 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298030#M251160</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T07:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298031#M251161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If krb5.debug is activated correctly the catalina.out / alfrescout-stdout log file should contain significant technical details about all Kerberos interactions. If that is not the case I would advise to check the krb5.debug activation. The property cannot be set via alfresco-global.properties and must be provided as a JVM parameter. When using the Windows Service for Tomcat this requires a reconfiguration of the service itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 10:12:22 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298031#M251161</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-01-02T10:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298032#M251162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx, i forget the "D" for the tomcat config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;The right entry for the tomcat config:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;-Dsun.security.krb5.debug=true‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Now i see following error in the log:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;2017-01-02 12:25:31,912 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] Login page requested, chaining ...&lt;BR /&gt; default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=145&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=145&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=100&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCRep: init() encoding tag is 126 req type is 11&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;KRBError:&lt;BR /&gt; sTime is Mon Jan 02 12:25:31 CET 2017 1483356331000&lt;BR /&gt; suSec is 895582&lt;BR /&gt; error code is 6&lt;BR /&gt; error Message is Client not found in Kerberos database&lt;BR /&gt; realm is DOMAIN1.LOC&lt;BR /&gt; sname is krbtgt/DOMAIN1.LOC&lt;BR /&gt; msgType is 30‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;The strange thing is that i try to login with a user from &lt;STRONG&gt;domain2.loc&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 11:29:45 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298032#M251162</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T11:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298033#M251163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But you have configured a specific &lt;CODE&gt;kerberos.authentication.realm &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;which is used as the default real / domain. Did you provide the domain as an explicit realm when trying to login, e.g. use a prinicipal name like user.name@domain2.loc?&lt;/SPAN&gt;&lt;BR /&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 12:54:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298033#M251163</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-01-02T12:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298034#M251164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, in the kerberos subsystem config.&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;kerberos.authentication.realm=DOMAIN1.LOC&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;If i remove this line alfresco won't come up because of a missing propertie.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I've tried with "DOMAIN2\username", "username@domain2" and "username@domain2.loc".&lt;/P&gt;&lt;P&gt;Same error for all of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;If i try to login with a user from domain1 the DEBUG log looks like this:&lt;/SPAN&gt;&lt;BR /&gt;(it works and the log is much longer)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;2017-01-02 13:53:10,844 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-5] Login page requested, chaining ...&lt;BR /&gt; default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=141&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=141&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=185&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 11&lt;BR /&gt; PA-ETYPE-INFO etype = 23, salt = &lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 19&lt;BR /&gt; PA-ETYPE-INFO2 etype = 23, salt = null, s2kparams = null&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 2&lt;BR /&gt; PA-ENC-TIMESTAMP&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 16&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 15&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCRep: init() encoding tag is 126 req type is 11&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;KRBError:&lt;BR /&gt; sTime is Mon Jan 02 13:53:10 CET 2017 1483361590000&lt;BR /&gt; suSec is 363334&lt;BR /&gt; error code is 25&lt;BR /&gt; error Message is Additional pre-authentication required&lt;BR /&gt; realm is DOMAIN1.LOC&lt;BR /&gt; sname is krbtgt/DOMAIN1.LOC&lt;BR /&gt; eData provided.&lt;BR /&gt; msgType is 30&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 11&lt;BR /&gt; PA-ETYPE-INFO etype = 23, salt = &lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 19&lt;BR /&gt; PA-ETYPE-INFO2 etype = 23, salt = null, s2kparams = null&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 2&lt;BR /&gt; PA-ENC-TIMESTAMP&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 16&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 15&lt;BR /&gt;&lt;BR /&gt;KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ&lt;BR /&gt;default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=219&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=219&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=1393&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsRep cons in KrbAsReq.getReply informix&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 13:07:02 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298034#M251164</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T13:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298035#M251165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any ideas Axel or anyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2017 13:15:23 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298035#M251165</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-11T13:15:23Z</dc:date>
    </item>
  </channel>
</rss>

