Hi Marco,

Curios, does distilled java JAAS Kerberos call throw the same error?

        URL conf = 
JaasLoginTest.class.getClassLoader().getResource("jaas.conf");
        System.setProperty("java.security.auth.login.config", conf.toString());

        try {
            LoginContext lc = new LoginContext("myContext", callbackHandler);
            lc.login();
            Subject subject = lc.getSubject();
            Set<Principal> principals = subject.getPrincipals();
            Set<Object> credentials = subject.getPrivateCredentials();
            System.out.println("OK: " + principals);
            System.out.println("OK: " + credentials);
        } catch (LoginException e) {
            e.printStackTrace();
        }
    }

Jaas.conf:

myContext {
    com.sun.security.auth.module.Krb5LoginModule required
    debug=true
    refreshKrb5Config=true
    useKeyTab=true
    storeKey=true
    keyTab="my.keytab"
    principal="my/services.example.com";
};

Regards,
Andrei.

> -----Original Message-----
> From: Marco Di Sabatino Di Diodoro [mailto:[email protected]]
> Sent: Dienstag, 25. März 2014 10:04
> To: [email protected]
> Subject: Re: CXF and kerberos authentication
> 
> Hi Sergey,
> 
> Il giorno 19/mar/2014, alle ore 10:57, Sergey Beryozkin
> <[email protected]> ha scritto:
> 
> > Hi Marco
> > On 19/03/14 08:44, Marco Di Sabatino Di Diodoro wrote:
> >> Hi Sergey
> >>
> >> thanks for your support.
> >> We asked the FreeIPA community to see if there are some incorrect
> configurations[1].
> >>
> >> I'll let you know when we have news.
> >>
> > Sounds good, thanks.
> >
> > What concerns me is the fact that using CURL to send Kerberos tokens to
> FreeIPA works, while using WebClient and Kerberos interceptor does not.
> > I suspect that something in the CXF code might need to be tweaked or may be
> it needs to be reconfigured a bit.
> > The logs you sent last time show that CXF manages to obtain a token but it 
> > is
> really a server which does not accept it. So I think CXF does correctly 
> interacts
> with the Kerberos system, but what appears to be the case is that there is 
> some
> difference in the way CXF and CURL send tokens.
> >
> > Can you please run CURL with -v option and see if you can spot something
> obvious, compared to the way CXF sends it ?
> 
> these days, we are investigating why the call does not work with the java 
> client.
> Our goal is to call a jsonrpc api protected from Kerberos. So we trying to 
> call
> apache httpd with mod_auth_kerb. This is our cxf example [1].
> 
> After cxf call, I noticed that httpd log has
> 
> [Mon Mar 24 19:03:29.402055 2014] [auth_kerb:debug] [pid 10029]
> src/mod_auth_kerb.c(1724): [client 192.168.0.105:39499] Client didn't delegate
> us their credential, referer: https://olmo.tirasa.net/ipa [Mon Mar 24
> 19:03:29.402084 2014] [auth_kerb:debug] [pid 10029]
> src/mod_auth_kerb.c(1743): [client 192.168.0.105:39499] GSS-API token of
> length 186 bytes will be sent back, referer: https://olmo.tirasa.net/ipa [Mon
> Mar 24 19:03:29.402510 2014] [:info] [pid 10029] nss_hook_Auth [Mon Mar 24
> 19:03:29.402577 2014] [authz_core:debug] [pid 10029] mod_authz_core.c(802):
> [client 192.168.0.105:39499] AH01626: authorization result of Require valid-
> user : granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24
> 19:03:29.402676 2014] [authz_core:debug] [pid 10029] mod_authz_core.c(802):
> [client 192.168.0.105:39499] AH01626: authorization result of <RequireAny>:
> granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:03:29.403068
> 2014] [authz_core:debug] [pid 10029] mod_authz_core.c(802): [client
> 192.168.0.105:39499] AH01626: authorization result of Require all granted:
> granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:03:29.403172
> 2014] [authz_core:debug] [pid 10029] mod_authz_core.c(802): [client
> 192.168.0.105:39499] AH01626: authorization result of <RequireAny>: granted,
> referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:03:29.403908 2014]
> [:error] [pid 10025] ipa: ERROR: 500 Internal Server Error:
> jsonserver_kerb.__call__: KRB5CCNAME not defined in HTTP request
> environment [Mon Mar 24 19:03:29.404844 2014] [headers:debug] [pid 10029]
> mod_headers.c(845): AH01502: headers: ap_headers_output_filter()
> 
> Whereas if I done the same call with curl on the httpd log there's
> 
> [Mon Mar 24 19:14:43.329966 2014] [auth_kerb:debug] [pid 10032]
> src/mod_auth_kerb.c(1724): [client 192.168.0.105:39504] Client delegated us
> their credential, referer: https://olmo.tirasa.net/ipa [Mon Mar 24
> 19:14:43.329977 2014] [auth_kerb:debug] [pid 10032]
> src/mod_auth_kerb.c(1743): [client 192.168.0.105:39504] GSS-API token of
> length 156 bytes will be sent back, referer: https://olmo.tirasa.net/ipa [Mon
> Mar 24 19:14:43.338700 2014] [:info] [pid 10032] nss_hook_Auth [Mon Mar 24
> 19:14:43.338721 2014] [authz_core:debug] [pid 10032] mod_authz_core.c(802):
> [client 192.168.0.105:39504] AH01626: authorization result of Require valid-
> user : granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24
> 19:14:43.338726 2014] [authz_core:debug] [pid 10032] mod_authz_core.c(802):
> [client 192.168.0.105:39504] AH01626: authorization result of <RequireAny>:
> granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:14:43.338878
> 2014] [authz_core:debug] [pid 10032] mod_authz_core.c(802): [client
> 192.168.0.105:39504] AH01626: authorization result of Require all granted:
> granted, referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:14:43.338886
> 2014] [authz_core:debug] [pid 10032] mod_authz_core.c(802): [client
> 192.168.0.105:39504] AH01626: authorization result of <RequireAny>: granted,
> referer: https://olmo.tirasa.net/ipa [Mon Mar 24 19:14:44.371738 2014]
> [:error] [pid 10024] ipa: INFO: [email protected]: user_find(u'', all=u'true'):
> SUCCESS [Mon Mar 24 19:14:44.372957 2014] [headers:debug] [pid 10032]
> mod_headers.c(845): AH01502: headers: ap_headers_output_filter() [Mon Mar
> 24 19:14:44.375508 2014] [:info] [pid 10032] Connection to child 4 closed
> (server olmo.tirasa.net:443, client 192.168.0.105)
> 
> Curl with -v option log:
> 
> curl -v -H referer:https://olmo.tirasa.net/ipa -H 
> "Content-Type:application/json"
> -H "Accept:applicaton/json" --negotiate -u : --delegation always --cacert
> /etc/ipa/ca.crt -d  
> '{"method":"user_find","params":[[""],{"all":"true"}],"id":0}' -
> X POST https://olmo.tirasa.net/ipa/json
> 
> * Adding handle: conn: 0xc24ec0
> * Adding handle: send: 0
> * Adding handle: recv: 0
> * Curl_addHandleToPipeline: length: 1
> * - Conn 0 (0xc24ec0) send_pipe: 1, recv_pipe: 0
> * About to connect() to olmo.tirasa.net port 443 (#0)
> *   Trying 192.168.0.106...
> * Connected to olmo.tirasa.net (192.168.0.106) port 443 (#0)
> * Initializing NSS with certpath: sql:/etc/pki/nssdb
> *   CAfile: /etc/ipa/ca.crt
>   CApath: none
> * SSL connection using TLS_RSA_WITH_AES_128_CBC_SHA
> * Server certificate:
> *     subject: CN=olmo.tirasa.net,O=TIRASA.NET
> *     start date: mar 13 13:48:58 2014 GMT
> *     expire date: mar 13 13:48:58 2016 GMT
> *     common name: olmo.tirasa.net
> *     issuer: CN=Certificate Authority,O=TIRASA.NET
> > POST /ipa/json HTTP/1.1
> > User-Agent: curl/7.32.0
> > Host: olmo.tirasa.net
> > referer:https://olmo.tirasa.net/ipa
> > Content-Type:application/json
> > Accept:applicaton/json
> > Content-Length: 60
> >
> * upload completely sent off: 60 out of 60 bytes < HTTP/1.1 401 Unauthorized <
> Date: Tue, 25 Mar 2014 08:17:15 GMT
> * Server Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3
> Basic ECC mod_wsgi/3.4 Python/2.7.5 is not blacklisted < Server: Apache/2.4.7
> (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC
> mod_wsgi/3.4 Python/2.7.5 < WWW-Authenticate: Negotiate < Last-Modified:
> Tue, 28 Jan 2014 08:12:54 GMT < Accept-Ranges: bytes < Content-Length: 1383
> < Content-Type: text/html; charset=UTF-8 <
> * Ignoring the response-body
> * Connection #0 to host olmo.tirasa.net left intact
> * Issue another request to this URL: 'https://olmo.tirasa.net/ipa/json'
> * Found bundle for host olmo.tirasa.net: 0xc258a0
> * Re-using existing connection! (#0) with host olmo.tirasa.net
> * Connected to olmo.tirasa.net (192.168.0.106) port 443 (#0)
> * Adding handle: conn: 0xc24ec0
> * Adding handle: send: 0
> * Adding handle: recv: 0
> * Curl_addHandleToPipeline: length: 1
> * - Conn 0 (0xc24ec0) send_pipe: 1, recv_pipe: 0
> * Server auth using GSS-Negotiate with user ''
> > POST /ipa/json HTTP/1.1
> > Authorization: Negotiate
> >
> YIIE8QYJKoZIhvcSAQICAQBuggTgMIIE3KADAgEFoQMCAQ6iBwMFACAAAACjggF
> VYYIBUT
> >
> CCAU2gAwIBBaEMGwpUSVJBU0EuTkVUoiIwIKADAgEBoRkwFxsESFRUUBsPb2xtb
> y50aXJh
> >
> c2EubmV0o4IBEjCCAQ6gAwIBEqEDAgECooIBAASB/fM6eW0p4pD8wvFfwNLF5R
> 5wq5jjmY
> >
> 4nSCij5Ijom2SFhtxB7GYHIHGmU7/obmkKG2zqW/a7Uw85fLh+lkZJ+z1WjBwNsw
> AOBIQ7
> >
> +9NaHcOJXGttuyToiqCuUdfm6RndbrZ1e7heIsS9CajEACmOiY5T7hJa2Ld8chN6x
> HLhbJ
> >
> lqTmcFcRRwHNDA/ehxgGe5xXQg7NZd4LSWbRjsDdS/NlmxY3EPVHZhLn0MCG/s
> G+b2favQ
> >
> bn9tTfEOU3S5zK47eUNC39e25sN6WkGImGL2d90G0vgnpGFW/DXcqEWH8+wXa
> VL4fzTR93
> >
> wkzk56hLhtYvxmjDxOer/6/kXR4z2kggNsMIIDaKADAgESooIDXwSCA1vo49R1NgV
> JXKb4
> >
> nhEZAMggkNY+S2SmMgb3m/cc7Hkq6kb+Jz8ClM51SjV5eUYI70dYbp/e8FoZwq5i
> rwfG+s
> >
> 4KKRkhCZX5y8t6cOewU2cp++7J8M8G6GHOw7sm+TOdAQfwsVPWqgHhw69Ih7
> W48inYazDk
> >
> yJfr4k9+Vu3IZxjyJBlaF6idV5w8cFK0LuSVrUDtk74MJ+mM08jE0wWONqHcoWD/x
> YklSh
> >
> avDb0bOvEm7TfvBKYuwsrsGl4ubgphvWcd+DnT/dFjtx583GbiqgSDSbHUEC93C9
> DIcxnU
> >
> wqbsMWKDohtsG1dTZp/JfX3yQdoa/lfyn32fIPyP7ucwZWN/hy3JUgizI6WdVR+2z3
> lqSC
> >
> G3WIzVAQLYek+SZbQ4gmhOl6SydF7sYlqAjSNoBHSTxB610+pIak/uR2qrqa2VPWl
> sX8aA
> >
> KaYrlPSVyckxtTb1G/OFahIZJPA0m/CIYJjFF0E/TnhmkwdPaIHQ5miOVwxDMUL1d
> BQXO9
> >
> w1gwCcvbLrt3N43Ogo6DlOGj3Ticst9gZMBXeDPwrnOufB5FZBWtksc9fonyZRyq7
> 0c7GO
> >
> rShwVjqlpG4toZcLRba0kCpggjxmV45o+AedpV9I9fYP8tDV619e1EtDGGKnsSfiRzI
> NqF
> >
> YA8jlKpSTjVPZNqTPh140bsmqDRQtvSRNfb7ftlLfF+lI7UmCeJB31d6CUQkqr4MV7
> PO7z
> >
> AMjji8DSzPgzpjnYAi2Re+kzbJmllEzUQarFMKM9VEmpCO0Q3SKcM64Rw5qRajF
> waduQ2o
> >
> PCe1Mrws++jtxHDvXtm77Rc0NM30uJcriauCj5XYbfMPHnbqHFa+iFB3OtedbU+H
> Atth2S
> >
> 0IC/47LgoV0GnVLZWU18P0LTtQwiyJ6p/pRpUiMJB8LwjV8eKsZOSnJDFCXN3ulOu
> C/xEV
> >
> 4/eumQPg9Eq/eYdQH8xoGCUVKiriEfJD9eilYe+fZWJOfwSgHGiddVZqBoAsALjr/s
> nkF8
> >
> O0oCP2d0YxrBb/xpbLexXEhLw84FtKtthZGsIfEB5JLpeWj/7FDNj3AHWSYq2qg2ajB
> 87p
> >
> 6VTw+eSEspdmPCbn/mzo/IrVr0Iv3RD3tIodcqKWY/sr/VU2YjBKGj/zVbYxOgRf8D
> ohuq
> > OZ4Qglo4dmUi
> > User-Agent: curl/7.32.0
> > Host: olmo.tirasa.net
> > referer:https://olmo.tirasa.net/ipa
> > Content-Type:application/json
> > Accept:applicaton/json
> > Content-Length: 60
> >
> * upload completely sent off: 60 out of 60 bytes < HTTP/1.1 200 Success < 
> Date:
> Tue, 25 Mar 2014 08:17:15 GMT
> * Server Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3
> Basic ECC mod_wsgi/3.4 Python/2.7.5 is not blacklisted < Server: Apache/2.4.7
> (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC
> mod_wsgi/3.4 Python/2.7.5 < WWW-Authenticate: Negotiate
> YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKicQRvc4G
> oDMzW+ZiPr3J9m2XX/cQl2kVjQBeSNfBy89lI/xnvdDcEArVUOTNJeaKKaGR4W/T
> v0op0ZUsVw8M7UHu+tmndta9kYG4WAORN6RHGPL4ww8br/oFtCUAcretWQzkf
> eOMMHrYjQfvFl3GkjUJs
> < Vary: Accept-Encoding
> < Transfer-Encoding: chunked
> < Content-Type: application/json; charset=utf-8 < {
>     "error": null,
>     "id": 0,
>     "principal": "[email protected]",
>     "result": {
>         "count": 1,
>         "messages": [
>             {
>                 "code": 13001,
>                 "message": "API Version number was not sent, forward 
> compatibility
> not guaranteed. Assuming server's API version, 2.65",
>                 "name": "VersionMissing",
>                 "type": "warning"
>             }
>         ],
>         "result": [
>             {
>                 "cn": [
>                     "Administrator"
>                 ],
>                 "dn": "uid=admin,cn=users,cn=accounts,dc=tirasa,dc=net",
>                 "gecos": [
>                     "Administrator"
>                 ],
>                 "gidnumber": [
>                     "163600000"
>                 ],
>                 "has_keytab": true,
>                 "has_password": true,
>                 "homedirectory": [
>                     "/home/admin"
>                 ],
>                 "ipauniqueid": [
>                     "a524777e-aab5-11e3-bd11-080027e7a744"
>                 ],
>                 "krbextradata": [
>                     {
>                         "__base64__":
> "AALItyFTcm9vdC9hZG1pbkBUSVJBU0EuTkVUAA=="
>                     }
>                 ],
>                 "krblastpwdchange": [
>                     "20140313135104Z"
>                 ],
>                 "krblastsuccessfulauth": [
>                     "20140325081717Z"
>                 ],
>                 "krbpasswordexpiration": [
>                     "20140611135104Z"
>                 ],
>                 "krbprincipalname": [
>                     "[email protected]"
>                 ],
>                 "loginshell": [
>                     "/bin/bash"
>                 ],
>                 "memberof_group": [
>                     "admins",
>                     "trust admins"
>                 ],
>                 "nsaccountlock": false,
>                 "objectclass": [
>                     "top",
>                     "person",
>                     "posixaccount",
>                     "krbprincipalaux",
>                     "krbticketpolicyaux",
>                     "inetuser",
>                     "ipaobject",
>                     "ipasshuser",
>                     "ipaSshGroupOfPubKeys"
>                 ],
>                 "sn": [
>                     "Administrator"
>                 ],
>                 "uid": [
>                     "admin"
>                 ],
>                 "uidnumber": [
>                     "163600000"
>                 ]
>             }
>         ],
>         "summary": "1 user matched",
>         "truncated": false
>     },
>     "version": "3.3.4"
> * Connection #0 to host olmo.tirasa.net left intact
> 
> What do you think? Any suggestions?
> M
> 
> [1]
> https://github.com/massx1/KerberosExample/blob/master/src/main/java/net/t
> irasa/kerberosexample/CXFClient.java
> 
> >
> > Thanks, Sergey
> >
> >
> >
> >> Thanks
> >> M
> >>
> >> [1]
> >> https://www.redhat.com/archives/freeipa-devel/2014-
> March/msg00296.htm
> >> l
> >>
> >> Il giorno 17/mar/2014, alle ore 19:10, Sergey Beryozkin
> <[email protected]> ha scritto:
> >>
> >>> Hi
> >>> How do you configure it with curl ?
> >>> In your opinion, what is the difference between the way you set it up in 
> >>> curl
> and in CXF ?
> >>>
> >>> Cheers, Sergey
> >>>
> >>>
> >>>
> >>> On 17/03/14 15:53, Marco Di Sabatino Di Diodoro wrote:
> >>>> Hi,
> >>>>
> >>>>
> >>>> Il giorno 15/mar/2014, alle ore 13:38, Andrei Shakirin
> >>>> <[email protected] <mailto:[email protected]>> ha scritto:
> >>>>
> >>>>> Hi Marco,
> >>>>>
> >>>>> I would suggest to try simple Kerberos login using JAAS directly
> >>>>> (with debug=true), perhaps it helps to spot the problem:
> >>>>>
> >>>>> Test code:
> >>>>>       URL conf =
> >>>>> JaasLoginTest.class.getClassLoader().getResource("jaas.conf");
> >>>>>       System.setProperty("java.security.auth.login.config",
> >>>>> conf.toString());
> >>>>>
> >>>>>       // Only needed when not using the ticket cache
> >>>>>       CallbackHandler callbackHandler = new CallbackHandler() {
> >>>>>
> >>>>>           @Override
> >>>>>           public void handle(Callback[] callbacks) throws
> >>>>> IOException, UnsupportedCallbackException {
> >>>>>               for (Callback callback : callbacks) {
> >>>>>                   if (callback instanceof NameCallback) {
> >>>>>                       ((NameCallback)callback).setName("alice");
> >>>>>                   }
> >>>>>                   if (callback instanceof PasswordCallback) {
> >>>>>
> ((PasswordCallback)callback).setPassword("clarinet".toCharArray());
> >>>>>                   }
> >>>>>               }
> >>>>>
> >>>>>           }
> >>>>>       };
> >>>>>
> >>>>>       try {
> >>>>>           LoginContext lc = new LoginContext("myContext",
> >>>>> callbackHandler);
> >>>>>           lc.login();
> >>>>>           Subject subject = lc.getSubject();
> >>>>>           Set<Principal> principals = subject.getPrincipals();
> >>>>>           Set<Object> credentials = subject.getPrivateCredentials();
> >>>>>           System.out.println("OK: " + principals);
> >>>>>           System.out.println("OK: " + credentials);
> >>>>>       } catch (LoginException e) {
> >>>>>           e.printStackTrace();
> >>>>>       }
> >>>>>   }
> >>>>>
> >>>>> Jaas.conf:
> >>>>>
> >>>>> myContext {
> >>>>>   com.sun.security.auth.module.Krb5LoginModule required
> >>>>>   debug=true
> >>>>>   refreshKrb5Config=true
> >>>>>   useKeyTab=true
> >>>>>   storeKey=true
> >>>>>   keyTab="my.keytab"
> >>>>>   principal="my/services.example.com
> >>>>> <http://services.example.com>"; };
> >>>>>
> >>>>> If the code works, you will be able to detect what is different
> >>>>> with
> >>>>> AbstractSpnegoAuthSupplier.getToken() code used from
> >>>>> KerberosAuthOutInterceptor.java.
> >>>>
> >>>> this are krb5kdc.log when needs to connect with cxf to FreeIpa Server:
> >>>>
> >>>> mar 17 16:03:10 olmo.tirasa.net <http://olmo.tirasa.net>
> >>>> krb5kdc[1423](info): AS_REQ (4 etypes {18 17 16 23}) 192.168.0.176:
> >>>> ISSUE: authtime 1395068590, etypes {rep=18 tkt=18 ses=18},
> >>>> [email protected] <mailto:[email protected]> for
> >>>> krbtgt/[email protected]
> <mailto:krbtgt/[email protected]>
> >>>> mar 17 16:03:10 olmo.tirasa.net <http://olmo.tirasa.net>
> >>>> krb5kdc[1423](info): TGS_REQ (6 etypes {18 17 16 23 1 3}) 192.168.0.176:
> >>>> ISSUE: authtime 1395068590, etypes {rep=18 tkt=18 ses=18},
> >>>> [email protected] <mailto:[email protected]> for
> >>>> ldap/[email protected]
> >>>> <mailto:ldap/[email protected]>
> >>>>
> >>>> If we run with curl:
> >>>>
> >>>> mar 17 16:14:06 olmo.tirasa.net <http://olmo.tirasa.net>
> >>>> krb5kdc[1423](info): TGS_REQ (1 etypes {18}) 192.168.0.106: ISSUE:
> >>>> authtime 1395069156, etypes {rep=18 tkt=18 ses=18},
> >>>> [email protected] <mailto:[email protected]> for
> >>>> krbtgt/[email protected]
> <mailto:krbtgt/[email protected]>
> >>>> mar 17 16:14:06 olmo.tirasa.net <http://olmo.tirasa.net>
> >>>> krb5kdc[1423](info): TGS_REQ (6 etypes {18 17 16 23 25 26})
> >>>> 192.168.0.106: ISSUE: authtime 1395069156, etypes {rep=18 tkt=18
> >>>> ses=18}, [email protected] <mailto:[email protected]> for
> >>>> ldap/[email protected]
> >>>> <mailto:ldap/[email protected]>
> >>>>
> >>>> I have attached the log file of the test connector. As you can see
> >>>> from the log, at the beginning we make a login and after a request
> >>>> to the service, but returns a 401.
> >>>>
> >>>> Thanks
> >>>> M
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>>
> >>>>> Regards,
> >>>>> Andrei.
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Marco Di Sabatino Di Diodoro
> >>>>>> [mailto:[email protected]]
> >>>>>> Sent: Freitag, 14. März 2014 17:54
> >>>>>> To: [email protected] <mailto:[email protected]>
> >>>>>> Subject: CXF and kerberos authentication
> >>>>>>
> >>>>>> Hi,
> >>>>>>
> >>>>>> I'm an PMC member of Apache Syncope[1].
> >>>>>> We are building a new connector bundle for Connid[2] that needs
> >>>>>> to connect with FreeIpa server.
> >>>>>>
> >>>>>> The connector bundle use JSON-RPC to communicate with the server
> >>>>>> that is protected by Kerberos.
> >>>>>> We followed this guide
> >>>>>> (http://cxf.apache.org/docs/jaxrs-kerberos.html) but the
> >>>>>> connector not negotiate with Kerberos
> >>>>>>
> >>>>>> WebClient wc =
> >>>>>> WebClient.create("https://olmo.example.com/ipa/json";);
> >>>>>> WebClient.getConfig(wc).getHttpConduit().setTlsClientParameters(c
> >>>>>> lientParam
> >>>>>> eters());
> >>>>>> AuthorizationPolicy policy = new AuthorizationPolicy();
> >>>>>> policy.setAuthorizationType("Negotiate");
> >>>>>> policy.setAuthorization(KEYTAB_CONF);
> >>>>>> KerberosAuthOutInterceptor kbInterceptor = new
> >>>>>> KerberosAuthOutInterceptor(); kbInterceptor.setPolicy(policy);
> >>>>>> kbInterceptor.setRealm("EXAMPLE.COM <http://EXAMPLE.COM>");
> >>>>>> kbInterceptor.setServicePrincipalName("ldap/olmo.example.com
> >>>>>> <http://olmo.example.com>");
> >>>>>> kbInterceptor.setCredDelegation(true);
> >>>>>> WebClient.getConfig(wc).getOutInterceptors().add(kbInterceptor);
> >>>>>>
> >>>>>> I try a lot of other configuration without success, have you any
> >>>>>> suggestion?
> >>>>>>
> >>>>>> If we run with curl it works.
> >>>>>>
> >>>>>> Regards
> >>>>>> M
> >>>>>>
> >>>>>> [1] http://syncope.apache.org/
> >>>>>> [2] http://tirasa.github.io/ConnId/
> >>>>>>
> >>>>>> --
> >>>>>> Dott. Marco Di Sabatino Di Diodoro Tel. +39 3939065570
> >>>>>>
> >>>>>> Tirasa S.r.l.
> >>>>>> Viale D'Annunzio 267 - 65127 Pescara Tel +39 0859116307 / FAX +39
> >>>>>> 0859111173 http://www.tirasa.net
> >>>>>>
> >>>>>> Apache Syncope PMC Member
> >>>>>> http://people.apache.org/~mdisabatino/
> >>>>>
> >>>>
> >>>> --
> >>>> Dott. Marco Di Sabatino Di Diodoro
> >>>> Tel. +39 3939065570
> >>>>
> >>>> Tirasa S.r.l.
> >>>> Viale D'Annunzio 267 - 65127 Pescara Tel +39 0859116307 / FAX +39
> >>>> 0859111173 http://www.tirasa.net <http://www.tirasa.net/>
> >>>>
> >>>> Apache Syncope PMC Member
> >>>> http://people.apache.org/~mdisabatino/
> >>>>
> >>>
> >>
> >
> 
> --
> Dott. Marco Di Sabatino Di Diodoro
> Tel. +39 3939065570
> 
> Tirasa S.r.l.
> Viale D'Annunzio 267 - 65127 Pescara
> Tel +39 0859116307 / FAX +39 0859111173
> http://www.tirasa.net
> 
> Apache Syncope PMC Member
> http://people.apache.org/~mdisabatino/

Reply via email to