12-17-2012 01:01 PM
2012-12-17 18:29:43,369 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-1] New Kerberos auth request from xxx.xxx.xxx.xxx (xxx.xxx.xxx.xxx:49251)
2012-12-17 18:29:43,369 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-1] Issuing login challenge to browser.
2012-12-17 18:29:43,424 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-1] Unsupported SPNEGO mechanism 1.3.6.1.4.1.311.2.2.10
2012-12-17 18:29:43,424 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-1] Clearing session.
2012-12-17 18:29:43,424 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-1] Issuing login challenge to browser.
2012-12-17 18:29:43,525 DEBUG [app.servlet.KerberosAuthenticationFilter] [http-bio-8080-exec-4] Login page requested, chaining …
authentication.chain=kerberos:kerberos
#krb5
kerberos.authentication.realm=XXX.XX
kerberos.authentication.sso.enabled=true
kerberos.authentication.authenticateCIFS=true
kerberos.authentication.user.configEntryName=Alfresco
kerberos.authentication.cifs.configEntryName=AlfrescoCIFS
kerberos.authentication.http.configEntryName=AlfrescoHTTP
kerberos.authentication.cifs.password=xxx
kerberos.authentication.http.password=xxx
kerberos.authentication.defaultAdministratorUserNames=xxx
Alfresco {
com.sun.security.auth.module.Krb5LoginModule sufficient;
};
AlfrescoCIFS {
com.sun.security.auth.module.Krb5LoginModule required
storeKey=true
useKeyTab=true
keyTab="/etc/alfresco.keytab"
principal="cifs/xxx.xxx.xx";
};
AlfrescoHTTP {
com.sun.security.auth.module.Krb5LoginModule required
storeKey=true
useKeyTab=true
keyTab="/etc/alfresco.keytab"
principal="HTTP/xxx.xxx.xx";
};
[realms]
XXX.XX = {
kdc = kerberos.xxx.xx
admin_server = kerberos.xxx.xx
}
[domain_realm]
.xxx.xx = XXX.XX
[login]
krb4_convert = true
krb4_get_tickets = false
01-21-2016 07:31 AM
Tags
Find what you came for
We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.