<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298035#M251165</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any ideas Axel or anyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jan 2017 13:15:23 GMT</pubDate>
    <dc:creator>betawayoflife</dc:creator>
    <dc:date>2017-01-11T13:15:23Z</dc:date>
    <item>
      <title>Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298028#M251158</link>
      <description>Hi guys,i've a problem authenticating kerberos with multiple domains.I'm using Alfresco 4.2f on Windows Server 2012 R2 and i've a forest trust (function level 2008 r2) between two domains.My kerberos cross domain setup is like in the word document from here:[MNT-10368] support for cross-domain kerbe</description>
      <pubDate>Thu, 22 Dec 2016 11:55:48 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298028#M251158</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2016-12-22T11:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298029#M251159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide more details, e.g. the principal set to authenticate on the Share tier (which is typically different from the Repository tier, which you have provided). I know you said you have configured it "like in the word document" but that word document is lacking some details I would have expected and all too often I have also seen slight errors / oversight tha turned out to be the cause of problems.&lt;/P&gt;&lt;P&gt;Also you can activate Java debug output for Kerberos authentication (system property &lt;CODE&gt;sun.security.krb5.debug&lt;/CODE&gt; set to true) and provide the details here so that people have more to go on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Dec 2016 17:41:01 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298029#M251159</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2016-12-25T17:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298030#M251160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Axel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i edit my first post and add more details.&lt;/P&gt;&lt;P&gt;I've already activatet the krb5.debug but i get no message / error in the alfrescout-stdout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only get following messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt; 2017-01-02 08:43:40,386 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] New Kerberos auth request from 1.2.3.4 (1.2.3.4:65030)&lt;BR /&gt; 2017-01-02 08:43:40,386 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] Issuing login challenge to browser.&lt;BR /&gt; 2017-01-02 08:43:40,464 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-3] Login page requested, chaining ...&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;In the webinterface i only get following error:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unable to login - unknown username/password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx,&lt;BR /&gt;Beta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 07:47:22 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298030#M251160</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T07:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298031#M251161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If krb5.debug is activated correctly the catalina.out / alfrescout-stdout log file should contain significant technical details about all Kerberos interactions. If that is not the case I would advise to check the krb5.debug activation. The property cannot be set via alfresco-global.properties and must be provided as a JVM parameter. When using the Windows Service for Tomcat this requires a reconfiguration of the service itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 10:12:22 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298031#M251161</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-01-02T10:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298032#M251162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx, i forget the "D" for the tomcat config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;The right entry for the tomcat config:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;-Dsun.security.krb5.debug=true‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Now i see following error in the log:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;2017-01-02 12:25:31,912 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-2] Login page requested, chaining ...&lt;BR /&gt; default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=145&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=145&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=100&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCRep: init() encoding tag is 126 req type is 11&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;KRBError:&lt;BR /&gt; sTime is Mon Jan 02 12:25:31 CET 2017 1483356331000&lt;BR /&gt; suSec is 895582&lt;BR /&gt; error code is 6&lt;BR /&gt; error Message is Client not found in Kerberos database&lt;BR /&gt; realm is DOMAIN1.LOC&lt;BR /&gt; sname is krbtgt/DOMAIN1.LOC&lt;BR /&gt; msgType is 30‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;The strange thing is that i try to login with a user from &lt;STRONG&gt;domain2.loc&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 11:29:45 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298032#M251162</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T11:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298033#M251163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But you have configured a specific &lt;CODE&gt;kerberos.authentication.realm &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;which is used as the default real / domain. Did you provide the domain as an explicit realm when trying to login, e.g. use a prinicipal name like user.name@domain2.loc?&lt;/SPAN&gt;&lt;BR /&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 12:54:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298033#M251163</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-01-02T12:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298034#M251164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, in the kerberos subsystem config.&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;kerberos.authentication.realm=DOMAIN1.LOC&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;If i remove this line alfresco won't come up because of a missing propertie.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I've tried with "DOMAIN2\username", "username@domain2" and "username@domain2.loc".&lt;/P&gt;&lt;P&gt;Same error for all of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;If i try to login with a user from domain1 the DEBUG log looks like this:&lt;/SPAN&gt;&lt;BR /&gt;(it works and the log is much longer)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;2017-01-02 13:53:10,844 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-apr-8080-exec-5] Login page requested, chaining ...&lt;BR /&gt; default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=141&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=141&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=185&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 11&lt;BR /&gt; PA-ETYPE-INFO etype = 23, salt = &lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 19&lt;BR /&gt; PA-ETYPE-INFO2 etype = 23, salt = null, s2kparams = null&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 2&lt;BR /&gt; PA-ENC-TIMESTAMP&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 16&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 15&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCRep: init() encoding tag is 126 req type is 11&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;KRBError:&lt;BR /&gt; sTime is Mon Jan 02 13:53:10 CET 2017 1483361590000&lt;BR /&gt; suSec is 363334&lt;BR /&gt; error code is 25&lt;BR /&gt; error Message is Additional pre-authentication required&lt;BR /&gt; realm is DOMAIN1.LOC&lt;BR /&gt; sname is krbtgt/DOMAIN1.LOC&lt;BR /&gt; eData provided.&lt;BR /&gt; msgType is 30&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 11&lt;BR /&gt; PA-ETYPE-INFO etype = 23, salt = &lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 19&lt;BR /&gt; PA-ETYPE-INFO2 etype = 23, salt = null, s2kparams = null&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 2&lt;BR /&gt; PA-ENC-TIMESTAMP&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 16&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;Pre-Authentication Data:&lt;BR /&gt; PA-DATA type = 15&lt;BR /&gt;&lt;BR /&gt;KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ&lt;BR /&gt;default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;default etypes for default_tkt_enctypes: 23.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsReq creating message&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=dc01.domain1.loc UDP:88, timeout=30000, number of retries =3, #bytes=219&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=dc01.domain1.loc UDP:88, timeout=30000,Attempt =1, #bytes=219&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=1393&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove dc01.domain1.loc:88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbAsRep cons in KrbAsReq.getReply informix&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2017 13:07:02 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298034#M251164</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-02T13:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos cross domain auth fails with KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298035#M251165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any ideas Axel or anyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2017 13:15:23 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/kerberos-cross-domain-auth-fails-with-krb5kdc-err-c-principal/m-p/298035#M251165</guid>
      <dc:creator>betawayoflife</dc:creator>
      <dc:date>2017-01-11T13:15:23Z</dc:date>
    </item>
  </channel>
</rss>

