Replies: 1 comment
-
When i try to ssh from a linux (rhel) server I am able to use different TGT for a different user principal
The above fails, as expected. Then i create a ticket for the xida account and I can access with GSSAPI.
So at least it seems that ssh client in linux respects the local TGT that was created while in windows the ssh client defaults to the How can something similar be done in windows? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I am testing different authentication method to our linux servers.
I noticed that we could use kerberos TGT which is pretty neat.
Our company is also transitioning to a secondary AD elevated account for administrative purposes.
On my company workstation (
Windows 11 Enterprise - 23H2 - 22631.5909
withOpenSSH_for_Windows_9.5p1, LibreSSL 3.8.2
) with my personal AD account I am able to ssh into our linux server with a TGT I am assuming is from the workstation itself when I first sign in . Is this true?Now when I attempt to generate a TGT with my secondary AD (
XIDA
) account I am not able to ssh into the server that easily.Now doing a simple ssh using the secondary account
When i look at the debug logs
KRB5_TRACE=/tmp/ssh-krb5trace /sbin/sshd -d
i see it is trying to use the regularXID
principal. Not the XIDA principal.I also tried setting the
KRB5CCNAME
environment variable but got the same result above:The ONLY way i was able to auth with GSSAPIAuth using the secondary account was using
runas
Why is that?
How can i have my local ssh client use the principal from the TGT i generated?
What could i be missing?
Any input is much appreciated!
Best,
Dave
Beta Was this translation helpful? Give feedback.
All reactions