Closed hollomyfoolish closed 3 months ago
I checked the document of InitializeSecurityContext (Kerberos), it mentioned that it need a fully qualified target service principal name for the parameter pszTargetName, in my test scenario 2, I got the ldap service principal name "ldap/CNPVGVB1CLD05.customer.com/customer.com" by command "setspn -L", and I tried below names
All failed with no lucky.
Got answer on stackoverflow
I am not sure if here is the right place to ask this question, I have already posted my question on stack overflow and learn.microsoft.com, but I don't get an answer so far. So I want to try here.
I am trying to call the Windows system API InitializeSecurityContext (Kerberos) in a cross domain forest environment, unfortunately get a failure result. Here is my environment setup:
Test Scenarios
I checked the kerberos package in Wireshark, I think there is something wrong about the kerberos requests, for my understanding the second TGS-REQ should be sent to the KDC of customer.com (10.58.117.105) not the KDC of cloud.com (10.58.117.63)
I am not sure if scenario 2 and scenario 3 is supported by this function InitializeSecurityContext, or is there any configuration I am missing or wrong? Do I do it wrong about InitializeSecurityContext? If I am wrong, what I should do for scenario 2 and scenario 3? Any comments and help is appreciated and thanks in advance.
Addition information:
I think my domain trust setup is correct, because I write a java demo program that use admin@cloud.com to access ldap/CNPVGVB1CLD05.customer.com/customer.com, it works fine, my Wireshark capture shows all the kerberos packages are following the kerberos cross-realm authentication flow