For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

dp_119903's avatar
dp_119903
Icon for Cirrostratus rankCirrostratus
Sep 15, 2015

Non local kerberos realm

I have kerberos for server-side (SSO) working just fine.

 

My kerberos sso config looks like this: username source: session.sso.token.last.username username realm source: session.logon.last.domain

 

kerberos realm: domain1.domain.COM

 

I have two domains. Domain1.domain.com and domain2.domain.com. There is a 2 way trust between the AD servers in each domain. My service account is in domain1.domain.com. When users come in and have a username in domain1.domain.com it works just fine, but when they come in from domain2 it won't work. It tells me

 

S4U ======> - NO cached S4U2Proxy ticket for user: USERNAME@DOMAIN2.DOMAIN.COM server: http/SITE.DOMAIN1.DOMAIN.COM@DOMAIN1.DOMAIN.com - trying to fetch S4U ======> - NO cached S4U2Self ticket for user: USERNAME@DOMAIN2.DOMAIN.COM - trying to fetch Kerberos: can't get S4U2Self ticket for user USERNAME@DOMAIN2.DOMAIN.COM - Realm not local to KDC

 

I know that there is something simple I'm missing. I've read a bunch of questions/replies on this topic but am still a little lost. Any hints/nudges in the right direction would be appreciated.

 

Thanks!

 

11 Replies

  • So it seems to me, at least, that forest level trust may in fact be a requirement.

     

    Selective trust does work, but as you've seen in the article requires some heavy lifting in the AD. The basic requirement is a forest trust or a full two-way transitive external trust.