SSO with PASS
Posted: Mon Mar 21, 2022 8:33 pm
Hi,
We have successfully implemented SSO multiple times at a number of sites with TM1 Web. Currently, we are upgrading 2 unrelated environments to the latest PA version that also includes latest PA Spreadsheet Services. Software is installed on Windows 2019 OS as a fresh install.
These are the steps that we followed, triple-checked, and tried with multiple servers:
https://www.ibm.com/support/pages/how-c ... spnego-sso
In all cases, SSO is working initially, but then some users are getting sporadic login failures. This is what we see in the WebSphere tm1_messages log after enabling trace.
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: >>>KRBError:
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: sTime is Mon Mar 21 11:29:39 EDT 2022 1647876579000
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: suSec is 768937
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: error code is 31
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: error Message is Integrity check on decrypted field failed
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: msgType is 30
This error corresponds to the 0x1F KRB_AP_ERR_BAD_INTEGRITY code of the 4769 event in the domain controller. We tried recreating keytab/krb5.conf files with different encryption types including all, but it didn't resolve the issue.
Was anyone able to successfully configure PASS SSO ideally with software installed on Windows 2019 OS?
Has anyone experienced a similar issue? Any ideas of how to resolve it would be appreciated.
Thank you,
Alex
We have successfully implemented SSO multiple times at a number of sites with TM1 Web. Currently, we are upgrading 2 unrelated environments to the latest PA version that also includes latest PA Spreadsheet Services. Software is installed on Windows 2019 OS as a fresh install.
These are the steps that we followed, triple-checked, and tried with multiple servers:
https://www.ibm.com/support/pages/how-c ... spnego-sso
In all cases, SSO is working initially, but then some users are getting sporadic login failures. This is what we see in the WebSphere tm1_messages log after enabling trace.
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: >>>KRBError:
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: sTime is Mon Mar 21 11:29:39 EDT 2022 1647876579000
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: suSec is 768937
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: error code is 31
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: error Message is Integrity check on decrypted field failed
[KRB_DBG_KDC] KRBError:Default Executor-thread-5: msgType is 30
This error corresponds to the 0x1F KRB_AP_ERR_BAD_INTEGRITY code of the 4769 event in the domain controller. We tried recreating keytab/krb5.conf files with different encryption types including all, but it didn't resolve the issue.
Was anyone able to successfully configure PASS SSO ideally with software installed on Windows 2019 OS?
Has anyone experienced a similar issue? Any ideas of how to resolve it would be appreciated.
Thank you,
Alex