Centos 8 + Windows domain authentication
Posted on August 19, 2020 • 2 minutes • 214 words • Suggest Changes
How complex is joining a windows domain to authenticate on a Centos 8 server? very freaking hard. Welcome in 2020, everything is on fire and we are still locked up.
This is a collection of debug attempts to get my Proxmox container, test Centos 8 server authenticate against a domain. For ssh access.
kinit issues
normal use :
root@server:/home/svenn# kinit svennd@AD.DOMAIN.XYZ
Password for svennd@AD.DOMAIN.XYZ:
(no output)
root@server:/home/svenn# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: svennd@AD.DOMAIN.XYZ
Valid starting Expires Service principal
03/24/2022 13:59:46 03/24/2022 23:59:46 krbtgt/AD.DOMAIN.XYZ@AD.DOMAIN.XYZ
renew until 03/25/2022 13:59:44
Invalid UID in persistent keyring
kinit: Invalid UID in persistent keyring name while getting default ccache
Solution : comment
# default_ccache_name = KEYRING:persistent:%{uid}
in /etc/krb5.conf
by brunowego
note : this solution from RedHat, is just a syntax error. (not a real solution)
KDC reply did not match expectations while getting initial credentials
This happened during test of kinit -v
kinit -V svennd@ad.domain.com Using default cache: /tmp/krb5cc_0 Using principal: svennd@ad.domain.com Password for svennd@ad.domain.com kinit: KDC reply did not match expectations while getting initial credentials
The issue was here I had to use AD.DOMAIN.COM
Password incorrect while getting initial credentials
wrong password during kinit -v user@domain.com
klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: svennd@DOMAIN Valid starting Expires Service principal 08/19/2020 16:50:08 08/20/2020 02:50:08 krbtgt/DOMAIN@DOMAIN renew until 08/25/2020 16:50:08