Recently i’m working on itegration between ISC and MSSQL on-prem database. Our customer request us to use Windows Authentication so additional step is to authenticate to Kerberos service. However i’m receivig follwowing error:
Error Received:
> [ ConnectorException ] [ Error details ] The server encountered an unexpected error while contacting target system. Please check the logs. Kerberos Login failed: Integrated authentication failed. ClientConnectionId:92149d5e-2afb-4b3e-a324-924a6d5811cd due to javax.security.auth.login.LoginException (Unable to obtain Principal Name for authentication )
Steps done so far:
FW ports to kerberos server were opened on port 88 and 464
@brennenscott Many thanks for sharing that guide. I’m awaiting for response from MSSQL team to change service account for MSSQL service. I’ll keep you posted.
In a meantime (in relation to provided guide):
Does the name of the service account have to be the same case-sensitive name everywhere?
Connector on ISC must be JDBC or still i can use MSSQL?
Hi @radoslaw_klimkowski, this is for JDBC specifically but the principles of the configuration still stand for MSSQL.
The specifications in the guide are important, such as the <DOMAIN IN ALL CAPS> labels. Each step needs to be followed meticulously, as the domain in all caps is for the realm, which needs to be in all caps. The name of the service account does not necessarily have to be in all caps, but the domain does (where specified). I recommend just copying the format as provided in the examples in the guide.
I followed the steps in your guide but I am getting the attached error message “Missing required jar.” although I uploaded it in the GUI as shown in the attached screenshot. Also, I tried the newer version file i.e ‘mssql-jdbc-12.6.2.jre11.jar’ but without any luck.
Thanks for the update. On Friday last week I didn’t have this issue. It seems this issue has started around 1st June 2024 in the sandbox tenant and this could be due to some recent changes by the SailPoint. The prod seems to be OK.
@nhassan after the issue with missing JAR files has been resolved, have you been able to re-test the configurations you made according to the guide I provided?
I am still waiting for our database team to configure the windows svc account at their end and set the required permissions. Once it’s done I will give it a try to see if the test connection is successful. I will update you then.
As per step 1 and 2 of part-1 in your guide, is it mandatory to set the “SQL Server (MSSQLSERVER) service” to log on as windows svc account?
Unlike above, would the connection still be successful if the windows svc account is configured on the SQL Server side just to be able to login to the database instance?
My experience shows that if leaving the service as the default NT Service\MSSQLSvc (I think that’s the name off the top of my head), any operation would result in the following error:
Error occurred in Kerberos Authentication while test configuration operation. GSSException: Defective token detected (Mechanism level: AP_REP token id does not match!)
The service does not need to be run by the service account used by ISC, but it does need to be either Local System or another service account.
The integration with mssql and kerberos has been completed successfully! I was able to test the connection and even aggregate and correlate accounts. Both teams (IDN and MSSQL) followed the instructions (exactly step by step) provided by @brennenscott.