Consistent GSSAPI Authentication Challenge Process for Users in Identity Management
Issue
-
Two different accounts exhibit different behavior during authentication on remote nodes in an IDM cluster. For example:
- Account A requires authentication (smart card or password) on Node A and is challenged for credentials on Node B.
-
Account B does not require authentication on Node A and is granted immediate access on Node B.
-
Desired authentication behavior is that the user is challenged every time.
Environment
- Red Hat Enterprise Linux 9.5
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.