Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kerberos realm should support kerberos oid #34763

Closed
jaymode opened this issue Oct 23, 2018 · 1 comment
Closed

Kerberos realm should support kerberos oid #34763

jaymode opened this issue Oct 23, 2018 · 1 comment
Assignees
Labels
:Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)

Comments

@jaymode
Copy link
Member

jaymode commented Oct 23, 2018

The kerberos realm currently only supports the SPNEGO Oid as the credential type for the gss mechanism, but there is also another well known Oid value that we should request the credentials for, which is the Kerberos V5 Oid: 1.2.840.113554.1.2.2. We can pass both Oid values as an array when creating the credentials.

@jaymode jaymode added the :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) label Oct 23, 2018
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security

bizybot pushed a commit to bizybot/elasticsearch that referenced this issue Nov 21, 2018
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.

Closes elastic#34763
bizybot added a commit to bizybot/elasticsearch that referenced this issue Nov 28, 2018
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.

Closes elastic#34763
bizybot added a commit that referenced this issue Nov 28, 2018
Clients can use the Kerberos V5 security mechanism and when it
used this to establish security context it failed to do so as
Elasticsearch server only accepted Spengo mechanism.
This commit adds support to accept Kerberos V5 credentials
over spnego.

Closes #34763
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
:Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)
Projects
None yet
Development

No branches or pull requests

3 participants