Hi Greg,

OK, that’s what I was afraid of.  It’ll make things a bit tricker, but I think 
we’ve identified a way to manage that.  Thanks for the information!


Stephan Kemper
ViaSat, Inc.

On 12/19/16, 8:54 PM, "Greg Hudson" <ghud...@mit.edu> wrote:

    On 12/19/2016 03:50 PM, Kemper, Stephan wrote:
    > The problem is with our admin principals.  I can’t seem to get our KDC to 
hand me the service ticket that I want.  Each time I run a `kinit -S 
kadmin/ad...@b.viasat.com -c ccache skemper/ad...@viasat.com` I get back a 
service of kadmin/ad...@viasat.com, the root realm.
    
    kinit performs an AS request.  AS requests cannot be cross-realm, and
    the kinit -S flag can only specifies the name part of the service
    principal, not the realm.
    
    Because kadmin tickets must be obtained via AS request, there isn't
    currently any way to do cross-realm administration; each realm must have
    its own administrative principals.
    


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to