Skip to content

Commit

Permalink
"realm not local"
Browse files Browse the repository at this point in the history
  • Loading branch information
steveloughran committed May 19, 2016
1 parent a700eae commit 45bb853
Showing 1 changed file with 20 additions and 1 deletion.
21 changes: 20 additions & 1 deletion sections/errors.md
Original file line number Diff line number Diff line change
Expand Up @@ -554,4 +554,23 @@ attempts which may or may not be correct.

## Against Active Directory: `Realm not local to KDC while getting initial credentials`

Nobody knows.
Nobody quite knows.

It's believed to be related to Active Directory cross-realm/forest stuff, but there
are hints that it can also be raised when the kerberos client is trying to auth
with a KDC, but supplying a hostname rather than the realm.

This may be because you have intentionally or unintentionally created [A Disjoint Namespace](https://technet.microsoft.com/en-us/library/cc731125(v=ws.10).aspx))

If you read that article, you will get the distinct impression that even the Microsoft
Active Directory team are scared of Disjoint Namespaces, and so are going to a lot of
effort to convince you not to go there. It may seem poignant that even the developers of
AD are scared of this, but consider that these are probably inheritors of the codebase,
not the original authors, and the final support line for when things don't work. Their
very position in the company means that they get the worst-of-the-worst Kerberos-related
problems. If they say "Don't go there", it'll be based on experience of fielding those
support calls *and from having seen the Active Directory source code.*


* [Kerberos and the Disjoint Namespace](http://www.networkworld.com/article/2347477/microsoft-subnet/kerberos-and-the-disjoint-namespace.htmla)
* [Kerberos Principal Name Canonicalization and Cross-Realm Referrals](https://tools.ietf.org/html/rfc6806.html)

0 comments on commit 45bb853

Please sign in to comment.