<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAS  windows Kerberos in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964324#M29862</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Hello Rveerepalli,&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;so from your post I'm assuming you had completed the SSO implementation.&lt;/P&gt;&lt;P class=""&gt;I'm new to SAS Administration and have recently completed a SAS 9.4 M6 installation on our internal Demo Server(Windows).&lt;/P&gt;&lt;P class=""&gt;I've now been assigned the task of implementing Single Sign-On (SSO) using Integrated Windows Authentication (IWA) with Kerberos, following the guidance provided in the SAS documentation:&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Support for Integrated Windows Authentication&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://documentation.sas.com/doc/en/bicdc/9.4/bimtag/p1871e69gmwdr0n1o182krslc10p.htm" target="_new" rel="noopener"&gt;https://documentation.sas.com/doc/en/bicdc/9.4/bimtag/p1871e69gmwdr0n1o182krslc10p.htm&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;I've obtained the keytab file from our IT team. However, when testing the keytab using the &lt;CODE&gt;kinit&lt;/CODE&gt; command to generate a Kerberos ticket, I encountered issues.&lt;/P&gt;&lt;P class=""&gt;Here’s the command I ran:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Copy&lt;/SPAN&gt;&lt;SPAN class=""&gt;Edit&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;CODE class=""&gt;&lt;SPAN&gt;kinit -V -k -t D:/keytab/12apr/saskeytab_WD.keytab -J-Djava.security.krb5.conf=E:\SASConfig\Lev1\Web\WebAppServer\SASServer1_1\conf\krb5.ini HTTP/otsisasnode.ex.com@EX.COM &lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get the error -&amp;nbsp;&lt;/P&gt;&lt;P&gt;Exception: krb_error 0 Do not have keys of types listed in default_tkt_enctypes available; only have keys of following type: No error&lt;BR /&gt;KrbException: Do not have keys of types listed in default_tkt_enctypes available; only have keys of following type:&lt;BR /&gt;at sun.security.krb5.internal.crypto.EType.getDefaults(EType.java:280)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.build(KrbAsReqBuilder.java:261)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.send(KrbAsReqBuilder.java:315)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.action(KrbAsReqBuilder.java:361)&lt;BR /&gt;at sun.security.krb5.internal.tools.Kinit.&amp;lt;init&amp;gt;(Kinit.java:219)&lt;BR /&gt;at sun.security.krb5.internal.tools.Kinit.main(Kinit.java:113)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something related to the ticket encryption used is&amp;nbsp; causing the problem.&lt;/P&gt;&lt;P&gt;Can you please give some pointers to resolve the issue so that atleast I can generate the ticket using the keytab for test run before moving to further steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Content of file (krb5.ini):&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = EX.COM&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tkt_enctypes = aes256-cts&lt;BR /&gt;default_tgs_enctypes = aes256-cts&lt;BR /&gt;permitted_enctypes = aes256-cts&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;EX.COM = {&lt;BR /&gt;kdc = dc16.ex.com&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;[domain_realm]&lt;BR /&gt;ex.com = EX.COM&lt;BR /&gt;.ex.com = EX.COM&lt;/P&gt;</description>
    <pubDate>Tue, 15 Apr 2025 10:50:03 GMT</pubDate>
    <dc:creator>PrathmeshX</dc:creator>
    <dc:date>2025-04-15T10:50:03Z</dc:date>
    <item>
      <title>SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637268#M18633</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using SAS on windows (9.4 M6)&amp;nbsp; and connecting to Hadoop.&amp;nbsp; My windows PC is on a different domain compared to Hadoop. I generated Kerberos ticket and it works for ODBC connection to Hadoop and also works on Java applications. My KRB5CCNAME environment variable resolves properly on SAS. However, when I run libname statement in SAS, it is trying to connect to use my windows realm ticket (rather than using ticket for Hadoop realm). Is there any change that I am missing to do in configuration?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 13:45:13 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637268#M18633</guid>
      <dc:creator>Rveerepalli</dc:creator>
      <dc:date>2020-04-03T13:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637272#M18634</link>
      <description>Where is krb5.conf file located in your environment?&lt;BR /&gt;When you SAS Session is spawned using any client, how does it generate the krb ticket?</description>
      <pubDate>Fri, 03 Apr 2020 14:09:31 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637272#M18634</guid>
      <dc:creator>AnandVyas</dc:creator>
      <dc:date>2020-04-03T14:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637275#M18635</link>
      <description>&lt;BR /&gt;Added the below two Java security settings to the SAS config file&lt;BR /&gt;-Djava.security.krb5.conf=C:\Hadoop\Kerberos\krb5.ini&lt;BR /&gt;-Djavax.security.auth.useSubjectCredsOnly=false&lt;BR /&gt;&lt;BR /&gt;Also ticket is pre-generated at login by MIT Kerberos application</description>
      <pubDate>Fri, 03 Apr 2020 14:21:02 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637275#M18635</guid>
      <dc:creator>Rveerepalli</dc:creator>
      <dc:date>2020-04-03T14:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637293#M18636</link>
      <description>Can you run klist on the ticket generated and resolved for the  KRB5CCNAME ENV variable to see if it's of the Hadoop realm or windows?&lt;BR /&gt;And when you say you have generated ticket and was able to make ODBC connection to Hadoop, that is using tools outside of SAS?</description>
      <pubDate>Fri, 03 Apr 2020 15:30:24 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/637293#M18636</guid>
      <dc:creator>AnandVyas</dc:creator>
      <dc:date>2020-04-03T15:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964324#M29862</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Hello Rveerepalli,&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;so from your post I'm assuming you had completed the SSO implementation.&lt;/P&gt;&lt;P class=""&gt;I'm new to SAS Administration and have recently completed a SAS 9.4 M6 installation on our internal Demo Server(Windows).&lt;/P&gt;&lt;P class=""&gt;I've now been assigned the task of implementing Single Sign-On (SSO) using Integrated Windows Authentication (IWA) with Kerberos, following the guidance provided in the SAS documentation:&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Support for Integrated Windows Authentication&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://documentation.sas.com/doc/en/bicdc/9.4/bimtag/p1871e69gmwdr0n1o182krslc10p.htm" target="_new" rel="noopener"&gt;https://documentation.sas.com/doc/en/bicdc/9.4/bimtag/p1871e69gmwdr0n1o182krslc10p.htm&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;I've obtained the keytab file from our IT team. However, when testing the keytab using the &lt;CODE&gt;kinit&lt;/CODE&gt; command to generate a Kerberos ticket, I encountered issues.&lt;/P&gt;&lt;P class=""&gt;Here’s the command I ran:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Copy&lt;/SPAN&gt;&lt;SPAN class=""&gt;Edit&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;CODE class=""&gt;&lt;SPAN&gt;kinit -V -k -t D:/keytab/12apr/saskeytab_WD.keytab -J-Djava.security.krb5.conf=E:\SASConfig\Lev1\Web\WebAppServer\SASServer1_1\conf\krb5.ini HTTP/otsisasnode.ex.com@EX.COM &lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get the error -&amp;nbsp;&lt;/P&gt;&lt;P&gt;Exception: krb_error 0 Do not have keys of types listed in default_tkt_enctypes available; only have keys of following type: No error&lt;BR /&gt;KrbException: Do not have keys of types listed in default_tkt_enctypes available; only have keys of following type:&lt;BR /&gt;at sun.security.krb5.internal.crypto.EType.getDefaults(EType.java:280)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.build(KrbAsReqBuilder.java:261)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.send(KrbAsReqBuilder.java:315)&lt;BR /&gt;at sun.security.krb5.KrbAsReqBuilder.action(KrbAsReqBuilder.java:361)&lt;BR /&gt;at sun.security.krb5.internal.tools.Kinit.&amp;lt;init&amp;gt;(Kinit.java:219)&lt;BR /&gt;at sun.security.krb5.internal.tools.Kinit.main(Kinit.java:113)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something related to the ticket encryption used is&amp;nbsp; causing the problem.&lt;/P&gt;&lt;P&gt;Can you please give some pointers to resolve the issue so that atleast I can generate the ticket using the keytab for test run before moving to further steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Content of file (krb5.ini):&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = EX.COM&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tkt_enctypes = aes256-cts&lt;BR /&gt;default_tgs_enctypes = aes256-cts&lt;BR /&gt;permitted_enctypes = aes256-cts&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;EX.COM = {&lt;BR /&gt;kdc = dc16.ex.com&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;[domain_realm]&lt;BR /&gt;ex.com = EX.COM&lt;BR /&gt;.ex.com = EX.COM&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 10:50:03 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964324#M29862</guid>
      <dc:creator>PrathmeshX</dc:creator>
      <dc:date>2025-04-15T10:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964776#M29893</link>
      <description>Remove the -V option from your kinit command, that option is not valid on Windows.&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Apr 2025 18:36:42 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964776#M29893</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2025-04-21T18:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964777#M29894</link>
      <description>&lt;P&gt;It could be related to the active directory too. Its worth to check below...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What account did you use to create the HTTP SPN? (verify your SPN creation command something like this "setspn -s HTTP/&amp;lt;servername&amp;gt; &amp;lt;DOMAIN&amp;gt;\&amp;lt;username&amp;gt;")&lt;/P&gt;
&lt;P&gt;look for the username in AD and enable &lt;SPAN&gt;aes256 e&lt;/SPAN&gt;ncryption under the account/options tab.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 18:53:40 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/964777#M29894</guid>
      <dc:creator>mkiran</dc:creator>
      <dc:date>2025-04-21T18:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: SAS  windows Kerberos</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/968221#M30031</link>
      <description>&lt;P&gt;Thanks for the Suggestion,&lt;/P&gt;&lt;P&gt;The actual problem lied in the encryption option of the user in the AD server,&lt;/P&gt;&lt;P&gt;Enabled the encryption to aes256 and aes128 which is commonly used in the ticket generation using the keytab file.&lt;/P&gt;&lt;P&gt;After this changes, I was able to generate the ticket with the new keytab file from the AD Admin.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 06:18:30 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-windows-Kerberos/m-p/968221#M30031</guid>
      <dc:creator>PrathmeshX</dc:creator>
      <dc:date>2025-06-05T06:18:30Z</dc:date>
    </item>
  </channel>
</rss>

