Forum Discussion
Non local kerberos realm
I have kerberos for server-side (SSO) working just fine.
My kerberos sso config looks like this: username source: session.sso.token.last.username username realm source: session.logon.last.domain
kerberos realm: domain1.domain.COM
I have two domains. Domain1.domain.com and domain2.domain.com. There is a 2 way trust between the AD servers in each domain. My service account is in domain1.domain.com. When users come in and have a username in domain1.domain.com it works just fine, but when they come in from domain2 it won't work. It tells me
S4U ======> - NO cached S4U2Proxy ticket for user: USERNAME@DOMAIN2.DOMAIN.COM server: http/SITE.DOMAIN1.DOMAIN.COM@DOMAIN1.DOMAIN.com - trying to fetch S4U ======> - NO cached S4U2Self ticket for user: USERNAME@DOMAIN2.DOMAIN.COM - trying to fetch Kerberos: can't get S4U2Self ticket for user USERNAME@DOMAIN2.DOMAIN.COM - Realm not local to KDC
I know that there is something simple I'm missing. I've read a bunch of questions/replies on this topic but am still a little lost. Any hints/nudges in the right direction would be appreciated.
Thanks!
11 Replies
- Kevin_Stewart
Employee
So it seems to me, at least, that forest level trust may in fact be a requirement.
Selective trust does work, but as you've seen in the article requires some heavy lifting in the AD. The basic requirement is a forest trust or a full two-way transitive external trust.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com