On 23/09/16 15:50, Greg Hudson wrote:
> On 09/23/2016 03:52 AM, Isaac Boukris wrote:
>> Maybe we need a new gss name type oid like GSS_NT_ENTERPRISE_NAME,
>> though I guess it's more complicated than it sounds :)
>
> I think that might be reasonable for this use case. I've seen requests
> to be ab
Hello Team,
I am contacting you on behalf of ExxonMobil IT Asset Management regarding your
software called MIT Kerberos for Windows version 4.1
--> In order to proceed with a request raised by one of our affiliates, please
provide your most recent End User License Agreement (EULA) and confir
Dear Support,
We are using Kerberos Authentication in the past on AIX with the below command
and it worked fine.
echo "password" | /opt/boksm/bin/kinit userid
We recently migrated from AIX to Linux, and when we gave the above commands,it
is asking for password in interactive mode.
userid 's Pas
anilkumar.palahanumanth...@wellsfargo.com writes:
> Dear Support,
>
> We are using Kerberos Authentication in the past on AIX with the below
> command and it worked fine.
> echo "password" | /opt/boksm/bin/kinit userid
>
> We recently migrated from AIX to Linux, and when we gave the above
> comma
Anil,
This is not really "support" more than a community discussion list (for
your information).
Do a 'which kinit' to verify your proper path to the kinit command on the
distro you are on...
This works, but realize the path /opt/boksm/bin/kinit is not valid (by
default) on linux...
for example
[Dropped krbdev from the CC list; please don't copy it on replies to
this thread.]
"Kumar, Ashish /CS" writes:
> Hello Team,
Please note this is a public Kerberos community support forum, not a
private team contact point. The MIT Kerberos Team does not generally
provide private customer suppor
Hi ,
Can I query Kerberos KDC database to know how many services have been
Kerberized in KDC? How many service tickets have been given to clients? How
many sessions are been built for clients?
I am using Kerberos on Hadoop Security. It makes much easier to do it using
a management system - Cloude
So the principal names will be visible in the kerberos KDC logging with a
format of service/host.fqdn.name@REALM
You can grep the significant principal name patterns you need (hdfs/*
yarn/* etc) out of that log and see your as_req and as_rep as
authentication events.
Oct 06 15:53:09 nightly58-1 k