Hi Shane
I was asking my self very similar questions last year, also in combination with
WebServices. I spent considerable time debugging the Java 8 Runtime Kerberos
security classes, and sniffing Kerberos API calls on the wire with Wireshark!
I also experimented with Kerby as an alternative
Hi Shane,
>> Incidentally, is there docs about configuring the client as I always get
>> (against a real KDC)
Two ways to configure the client, the first way is what you use, the another
way is the same as the MIT Kerberos, using the krb5.conf, putting the
krb5.conf under "confDir", then crea