Salesforce

KB-2526: Cannot create consistently forwardable Kerberos tickets using Centrify OpenSSH

« Go Back

Information

 
TitleKB-2526: Cannot create consistently forwardable Kerberos tickets using Centrify OpenSSH
URL NameKB-2526-Cannot-create-consistently-forwardable-Kerberos-tickets-using-Centrify-OpenSSH
Knowledge Article TypeProblem / Resolution
Article TypeKnowledge
ArticleType 
ProductAuthentication Service
Component 
Version 
Tags
Internal Comments
Article Edits
Bug #33703
Solution ID2526
Knowledge Base Article Details
Applies to: All versions of Centrify DirectControl on *specific platforms
 
Question:
Consider the following scenario:
 
a) 2 Centrify servers are trusted for delegation as seen in Active Directory Users and Computers. (See: KB-2333: How to configure Centrify Putty to access a machine in a trusted domain with Kerberos Authentication)
b) Both servers are running Centrify's OpenSSH. The sshd_config was not changed.
c) On the client side, Centrify Putty is used with Kerberos settings in place.
d) A new TGT is received from the Windows client machine (klist shows it is current)
e) Forward and reverse lookup of both Centrify servers are fine from Windows.
f) In /etc/centrifydc/centrifydc.conf, krb5.forwardable.user.tickets is set to true
g) In /etc/centrifydc/centrifydc.conf, krb5.unique.cache.files is set to false
 
After the first hop with SSO, the command /usr/share/centrifydc/kerberos/bin/klist -f reports no credentials cache found. 
As a result, the second hop fails. 
 
Is there any reason for this?
 
Answer:
This is a known issue in our code and not SSHD itself. There is no workaround. 
 
This will be fixed in Centrify DirectControl 5.1.
 
Nore:
Excludes Centos 6.3, Debian 6, Fedora 17, Oracle Lunux EL 6u2
Created ByArticle Admin
Solution CreatorRaghu Srinivasan
DraftNot Checked
LithiumId
Lithium_Board_Id
Lithium_View_Href
Tags 
Category 
ArticleImage
Known IssuesNot Checked

Powered by