Consistent GSSAPI Authentication Challenge Process for Users in Identity Management

Solution Verified - Updated -

Issue

  • Two different accounts exhibit different behavior during authentication on remote nodes in an IDM cluster. For example:

    • Account A requires authentication (smart card or password) on Node A and is challenged for credentials on Node B.
    • Account B does not require authentication on Node A and is granted immediate access on Node B.

    • Desired authentication behavior is that the user is challenged every time.

Environment

  • Red Hat Enterprise Linux 9.5

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content