08-13-2012 10:59 AM
"Client not found in Kerberos Database"und weiß mir nicht mehr zu helfen.
kinit -V -T /etc/alfrescohttp.keytab -p "HTTP.collab.firma.com@FIRMA.COM"kann ich mich allerdings fehlerfrei authentifizieren. Ein Mitschnitt mit Netmon zeigt mir in diesem Fall
KerberosV5: AS Request Cname: cifs/collab.firma.com Realm: FIRMA.COMBeim normalen Startup des Servers erhalte ich folgendes
KerberosV5: AS Request Cname: root Realm: FIRMA.COM
Alfresco {
com.sun.security.auth.module.Krb5LoginModule sufficient;
};
AlfrescoCIFS {
com.sun.security.auth.module.Krb5LoginModule required
storeKey=true
useKeyTab=true
keyTab="/etc/alfrescocifs.keytab"
principal="cifs/collab.firma.com@FIRMA.COM";
};
AlfrescoHTTP {
com.sun.security.auth.module.Krb5LoginModule required
storeKey=true
useKeyTab=true
keyTab="/etc/alfrescohttp.keytab"
principal="HTTP/collab.firma.com@FIRMA.COM";
};
com.sun.net.ssl.client {
com.sun.security.auth.module.Krb5LoginModule sufficient;
};
other {
com.sun.security.auth.module.Krb5LoginModule sufficient;
};
[logging]
default = FILE:/var/log/krb5.log
[libdefaults]
default_realm = FIRMA.COM
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
[realms]
FIRMA.COM = {
kdc = dc1.firma.com
admin_server = dc1.firma.com
default_domain = FIRMA.COM
}
[domain_realm]
.firma.com = FIRMA.COM
firma.com = FIRMA.COM
08-13-2012 12:35 PM
-Dsun.security.krb5.debug=true
gestartet? Wie sieht die Logausgabe hierzu aus?kinit -V -T /etc/alfrescohttp.keytab -p "HTTP.collab.firma.com@FIRMA.COM"
Ich hätte erwartet, hier nicht KerberosV5: AS Request Cname: cifs/collab.firma.com Realm: FIRMA.COM
sondern KerberosV5: AS Request Cname: http/collab.firma.com Realm: FIRMA.COM
erwartet. Sind die keytab Dateien korrekt generiert worden?08-14-2012 02:48 AM
kerberos.authentication.realm=FIRMA.COM
kerberos.authentication.user.configEntryName=Alfresco
kerberos.authentication.defaultAdministratorUserNames=Administrator
kerberos.authentication.cifs.configEntryName=alfrescocifs
kerberos.authentication.cifs.password=Pass123
kerberos.authentication.authenticateCIFS=true
kerberos.authentication.http.configEntryName=alfrescohttp
kerberos.authentication.http.password=Pass123
kerberos.authentication.sso.enabled=true
kerberos.authentication.browser.ticketLogons=true
08-14-2012 03:05 AM
kinit -V -t /crap -p "HTTP/collab.firma.com"
Using default cache: /tmp/krb5cc_0
Using principal: HTTP/collab.firma.com@FIRMA.COM
Password for HTTP/collab.firma.com@FIRMA.COM:
Authenticated to Kerberos v5
Tags
Find what you came for
We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.