Reputation: 226
I am encountering an issue with Kerberos authentication in a multi-domain Microsoft SQL Server setup. Here are the details of my configuration:
xyz.com
domain.xyz.com
domain.abc.com
domain, which has a two-way trust relationship with xyz.com
.sqlserver-instance.differentdomain.com
.MSSQLSvc/sqlserver-instance.differentdomain.com
in the xyz.com
domain.Despite this configuration, when Host2 tries to connect to sqlserver-instance.differentdomain.com
, it uses NTLM instead of Kerberos.
Is there a solution that allows Host2 to use Kerberos authentication to connect to SQL Server while maintaining the endpoint sqlserver-instance.differentdomain.com? Additionally, I found a guide on configuring Kerberos with realms for Java applications (https://learn.microsoft.com/en-us/sql/connect/jdbc/using-kerberos-integrated-authentication-to-connect-to-sql-server?view=sql-server-ver16). Can a similar approach be applied for non-Java environments, or is there an alternative method for my situation?
Upvotes: 1
Views: 1941
Reputation: 16542
Try one of the following to map the domain to the correct realm (note: Kerberos realm, not AD domain; realms are almost always upper-case as seen in klist
):
Manual ksetup /addhosttorealmmap .differentdomain.com XYZ.COM
.
The corresponding Group Policy setting.
In Windows, typically it's not the client itself but the client's KDC responsible for mapping service domains to Kerberos realms. (The client requests a "local" ticket and potentially gets a referral to another realm.) So if possible, I would attempt to deploy this mapping to the domain controllers instead of client machines.
Upvotes: 0