I'm trying to implement SSO with kerberos using spring-security-kerberos extension.
I've created a keytab file and I get the following error when trying to access my webapp:
GSSException: Failure unspecified at GSS-API level (Mechanism level: Checksum failed)
I tried to test my keytab according to this post.
The keytab was created with the following command:
ktpass /out http-web.keytab /mapuser [email protected] /princ HTTP/[email protected] /pass myPass /ptype KRB5_NT_PRINCIPAL -crypto RC4-HMAC-NT /kvno 0
My krb5.conf is as follow
[libdefaults]
default_realm = MYDOMAIN.COM
permitted_enctypes = aes256-cts arcfour-hmac-md5 aes128-cts rc4-hmac des3-cbc-sha1 des-cbc-md5 des-cbc-crc
default_tgs_enctypes = aes256-cts arcfour-hmac-md5 aes128-cts rc4-hmac des3-cbc-sha1 des-cbc-md5 des-cbc-crc
default_tkt_enctypes = aes256-cts arcfour-hmac-md5 aes128-cts rc4-hmac des3-cbc-sha1 des-cbc-md5 des-cbc-crc
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
[realms]
MYDOMAIN.COM = {
kdc = controller1.mydomain.com:88
kdc = controler2.mydomain.com:88
kdc = controller3.mydomain.com:88
admin_server = controller3.mydomain.com
default_domain = MYDOMAIN.COM
}
[domain_realm]
.mydomain.com = MYDOMAIN.COM
mydomain.com = MYDOMAIN.COM
[login]
krb4_convert = true
krb4_get_tickets = false
I get the following error:
KDC has no support for encryption type (14)
I've tried enabling DES, AES-128 and AES-256 for the account of the SPN but it didn't solve the problem.
What am I missing here?
Thanks, Lior
The solution for me was to check these two options of the AD user via the Active Directory Users and Computers tool on the account tab: