Enabling Kerberos Authentication

Enable Kerberos authentication by adding connection properties in the key distribution center (KDC).

  1. To enable Kerberos authentication for the Adaptive Server ODBC Driver, add these connection properties:
    AuthenticationClient=<one of 'mitkerberos' 
    or 'cybersafekerberos' or 'activedirectory'> 
    and ServerPrincipal=<Adaptive Server name>

    where <Adaptive Server name> is the logical name or the principal as configured in the KDC. The Adaptive Server ODBC Driver uses this information to negotiate Kerberos authentication with the configured KDC and Adaptive Server.

    The Kerberos client libraries are compatible across various KDCs. For example, on Linux you can set AuthenticationClient equal to mitkerberos, even if your KDC is a Microsoft Active Directory.

  2. If you want the Kerberos client to look for the Ticket Granting Ticket (TGT) in another cache, specify the userprincipal property.

    If you use SQLDriverConnect with the SQL_DRIVER_NOPROMPT, ConnectString appears as:

    "Driver=Adaptive Server Enterprise;UID=sa;
    PWD='';Server=sampleserver;
    Port=4100;Database=pubs2;
    AuthenticationClient=mitkerberos;
    ServerPrincipal=MANGO;”