[29227] in Kerberos

home help back first fref pref prev next nref lref last post

Interoperability between Linux KDC - Windows client

daemon@ATHENA.MIT.EDU (Priya Govindarajan)
Mon Feb 11 21:50:55 2008

To: kerberos@mit.edu
MIME-Version: 1.0
Message-ID: <OF2AF8F176.C500E305-ON872573ED.000E8433-882573ED.000E9E01@us.ibm.com>
From: Priya Govindarajan <govindap@us.ibm.com>
Date: Mon, 11 Feb 2008 18:40:22 -0800
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi,

I have some questions on interoperbility while kerberizing an application 
to provide Single Sign On support. Currently implementation uses GssAPI 
for linux kdc/server in linux/client in Linux and SSPI for Windows AD/ 
server on windows/client on windows.

I am trying the following interoperability case where Linux KDC , Server 
on Linux and client on Windows.  MIT leash is installed on windows machine 
and I am able to get the TGT from the Linux KDC. The logon authentication 
does not seem to happen through Linux kdc. Followed the steps here - 
http://technet.microsoft.com/en-us/library/bb742433.aspx

The application fails when windows client tries to initiliaze context 
(through SSPI calls) with no credentials found message. I am noticing that 
LSA cache does not have the credential but the MIT cache does.

I see ms2mit in Leash to convert LSA cache to MIT cache. Is there a way to 
authenticate windows client using Linux KDC and populate LSA cache for 
windows InitializeSecurityContext SSPI calls to pass. Or should i be 
calling gss_init_sec_context(which would read KRB5CCNAME location) instead 
of windows SSPI calls.

Thanks,
Priya
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post