You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The kerberos realm currently only supports the SPNEGO Oid as the credential type for the gss mechanism, but there is also another well known Oid value that we should request the credentials for, which is the Kerberos V5 Oid: 1.2.840.113554.1.2.2. We can pass both Oid values as an array when creating the credentials.
The text was updated successfully, but these errors were encountered:
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.
Closeselastic#34763
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.
Closeselastic#34763
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.
Closes#34763
The kerberos realm currently only supports the SPNEGO Oid as the credential type for the gss mechanism, but there is also another well known Oid value that we should request the credentials for, which is the Kerberos V5 Oid:
1.2.840.113554.1.2.2
. We can pass both Oid values as an array when creating the credentials.The text was updated successfully, but these errors were encountered: