Enabling Kerberos authentication

To enable Kerberos authentication for the Adaptive Server ODBC Driver, add the following connection properties:

AuthenticationClient=<one of 'mitkerberos' 
or 'cybersafekerberos' or 'activedirectory'> 
and ServerPrincipal=<Adaptive Server name>

where <Adaptive Server name> is the logical name or the principal as configured in the key distribution center (KDC). The Adaptive Server ODBC Driver uses this information to negotiate Kerberos authentication with the configured KDC and Adaptive Server.

The Kerberos client libraries are compatible across various KDCs. For example, on Linux you can set AuthenticationClient equal to mitkerberos, even if your KDC is a Microsoft Active Directory.

If you want the Kerberos client to look for the Ticket Granting Ticket (TGT) in another cache, you might want to specify the userprincipal property.

If you use SQLDriverConnect with the SQL_DRIVER_NOPROMPT, ConnectString appears similar to the following:

"Driver=Adaptive Server Enterprise;UID=sa;
PWD='';Server=sampleserver;
Port=4100;Database=pubs2;
AuthenticationClient=mitkerberos;
ServerPrincipal=MANGO;”