Out of support This documentation supports the 8.1 version of BMC Atrium Single Sign-On, which is in "End of Version Support." However, the documentation is available for your convenience. You will not be able to leave comments.Click here to view the documentation for a supported version of Remedy Single Sign-On.

krb5.ini file issues


You may face the following issues related to krb5.ini file. The krb5 file contains Kerberos configuration information, including the locations of KDCs and admin servers for the Kerberos realms of interest, defaults for the current realm and for Kerberos applications, and mappings of hostnames onto Kerberos realms. You can locate the krb5.ini file in the Windows system directory at the following location: <windows-installation-directory>\Windows\krb5.ini.

Recommendation

You should delete the krb5.ini file unless you need to configure the following settings explicitly.

The following topics are provided:

Encryption types

You can set any tag in the configuration files which requires a list of encryption types to some combination of the following strings.

Note

Encryption types marked as weak are available for compatibility but not recommended for use.

String

Encryption type

des-cbc-crc

DES cbc mode with CRC-32 (weak)

des-cbc-md4

DES cbc mode with RSA-MD4 (weak)

des-cbc-md5

DES cbc mode with RSA-MD5 (weak)

des-cbc-raw

DES cbc mode raw (weak)

des3-cbc-raw

Triple DES cbc mode raw (weak)

des3-cbc-sha1 des3-hmac-sha1 des3-cbc-sha1-kd

Triple DES cbc mode with HMAC/sha1

des-hmac-sha1

DES with HMAC/sha1 (weak)

aes256-cts-hmac-sha1-96 aes256-cts AES-256

CTS mode with 96-bit SHA-1 HMAC

aes128-cts-hmac-sha1-96 aes128-cts AES-128

CTS mode with 96-bit SHA-1 HMAC

arcfour-hmac rc4-hmac arcfour-hmac-md5

RC4 with HMAC/MD5

arcfour-hmac-exp rc4-hmac-exp arcfour-hmac-md5-exp

Exportable RC4 with HMAC/MD5 (weak)

camellia256-cts-cmac camellia256-cts

Camellia-256 CTS mode with CMAC

camellia128-cts-cmac camellia128-cts

Camellia-128 CTS mode with CMAC

des

The DES family: des-cbc-crc, des-cbc-md5, and des-cbc-md4 (weak)

des3

The triple DES family: des3-cbc-sha1

aes

The AES family: aes256-cts-hmac-sha1-96 and aes128-cts-hmac-sha1-96

rc4

The RC4 family: arcfour-hmac

camellia

The Camellia family: camellia256-cts-cmac and camellia128-cts-cmac

You can use the DEFAULT string to refer to the default set of types for the variable in question. You can remove the types or families from the current list by prefixing them with a hyphen(-). You can use the plus (+) sign to indicate that the types or families are used and it has the same meaning as listing just the type or family. For example, DEFAULT -des would be the default set of encryption types with DES types removed, and des3 DEFAULT would be the default set of encryption types with triple DES types moved to the front.

While aes128-cts and aes256-cts are supported for all Kerberos operations, they are not supported by very old versions of our GSSAPI implementation (krb5-1.3.1 and earlier). Services running versions of krb5 without AES support must not be given AES keys in the KDC database.

Salt types

Kerberos keys for users are usually derived from passwords. To ensure that the user who picks the same password do not have the same key, Kerberos 5 incorporates more information into the key using a salt. The supported salt types are as follows:

String

Salt type

normal

default for Kerberos Version 5

v4

the only type used by Kerberos Version 4 (no salt)

norealm

same as the default, without using realm information

onlyrealm

uses only realm information as the salt

afs3

AFS version 3, only used for compatibility with Kerberos 4 in AFS

special

generate a random salt

Wrong realms specified

Please, ensure that in your krb5.ini file names of realms are spelled correctly and correspond to the existent realms in your environment. Until you have the correct names, your Kerberos applications might try to connect to the wrong realm and you may have to debug the issues.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*