SvennD
Centos 8 + Windows domain authentication
August 19, 2020

Centos 8 + Windows domain authentication

Posted on August 19, 2020  •  2 minutes  • 214 words  •  Suggest Changes

How complex is joining a windows domain to authenticate on a Centos 8 server? very freaking hard. Welcome in 2020, everything is on fire and we are still locked up.

This is a collection of debug attempts to get my Proxmox container, test Centos 8 server authenticate against a domain. For ssh access.

kinit issues

normal use :

root@server:/home/svenn# kinit svennd@AD.DOMAIN.XYZ
Password for svennd@AD.DOMAIN.XYZ: 
(no output)

root@server:/home/svenn# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: svennd@AD.DOMAIN.XYZ

Valid starting       Expires              Service principal
03/24/2022 13:59:46  03/24/2022 23:59:46  krbtgt/AD.DOMAIN.XYZ@AD.DOMAIN.XYZ
        renew until 03/25/2022 13:59:44

Invalid UID in persistent keyring

kinit: Invalid UID in persistent keyring name while getting default ccache

Solution : comment

# default_ccache_name = KEYRING:persistent:%{uid}

in /etc/krb5.conf by brunowego

note : this solution from RedHat, is just a syntax error. (not a real solution)

KDC reply did not match expectations while getting initial credentials

This happened during test of kinit -v

kinit -V svennd@ad.domain.com
Using default cache: /tmp/krb5cc_0
Using principal: svennd@ad.domain.com
Password for  svennd@ad.domain.com
kinit: KDC reply did not match expectations while getting initial credentials

The issue was here I had to use AD.DOMAIN.COM

source

Password incorrect while getting initial credentials

wrong password during kinit -v user@domain.com

klist

Ticket cache: FILE:/tmp/krb5cc_0  
Default principal: svennd@DOMAIN

Valid starting Expires Service principal  
08/19/2020 16:50:08 08/20/2020 02:50:08 krbtgt/DOMAIN@DOMAIN  
renew until 08/25/2020 16:50:08

 

Support

If you enjoyed this website, consider buying me a Dr. Pepper

Buy me a Dr PepperBuy me a Dr Pepper