Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Microsoft SQL Server Connector

Microsoft SQL Server Connector

Configuring Kerberos authentication

Configuring Kerberos authentication

Before you use Kerberos authentication to connect to Microsoft SQL Server on Linux or Windows, the organization administrator needs to perform the prerequisite tasks.
  1. To configure the Java Authentication and Authorization Service configuration file (JAAS), perform the following tasks:
    1. Create a JAAS configuration file on the Secure Agent machine.
    2. Add the following entries to the JAAS configuration file:
      JDBC_DRIVER_01 { com.sun.security.auth.module.Krb5LoginModule required useTicketCache=true; };
      Ensure that you specify each key-value pair on a separate line.
  2. To configure the
    krb5.conf
    file, perform the following tasks:
    1. Create a
      krb5.conf
      file on the Secure Agent machine.
    2. Add the details of the Key Distribution Center (KDC) and admin server to the
      krb5.conf
      file in the following format:
      [libdefaults] default_realm = <Realm name> forwardable = true ticket_lifetime = 24h [realms] <REALM NAME> = { kdc = <Location where KDC is installed> admin_server = <Location where KDC is installed> } [domain_realm] <domain name or host name> = <Domain name or host name of Kerberos> <domain name or host name> = <Domain name or host name of Kerberos>
  3. Set the following environment variables on the Secure Agent machine.
    For more information about the required environment variables, see Setting environment variables.
  4. Restart the Secure Agent.
  5. To generate the credential cache file on the Secure Agent machine and use Kerberos authentication to connect to Microsoft SQL Server, perform the following tasks:
    1. On the Secure Agent machine, run the following command and specify the Microsoft SQL Server user name and realm name:
      Kinit <user name>@<realm_name>
    2. Optionally, when you connect to DB2 databases on Linux, you can run the following command to generate the credential cache file with the specified file name and directory on the Secure Agent machine:
      Kinit -c <Directory and file name where you want to create the credential cache> <user name>@<realm_name>
    3. When prompted, enter the password for the Kerberos principal user.

0 COMMENTS

We’d like to hear from you!