To enable Kerberos for the Adaptive Server ADO.NET Data Provider, add the following to your program:
AuthenticationClient=<one of ‘mitkerberos’ or ‘cybersafekerberos’ or ‘activedirectory’ and ServerPrincipal=<ASE server name>
where <ASE server name> is the logical name or the principal as configured in the Key Distribution Center (KDC).
The Adaptive Server ADO.NET Data Provider will use this information to negotiate a Kerberos authentication with the configured KDC and Adaptive Server. On Windows, you might want to choose activedirectory to avoid any additional setup.
The Kerberos client libraries are compatible across various KDCs. For example, you can set AuthenticationClient equal to mitkerberos even if your KDC is a Microsoft Active Directory.
If you want the Kerberos client to look for the TGT in another cache, you might want to specify the userprincipal connection property.
If you use SQLDriverConnect with the SQL_DRIVER_NOPROMPT, ConnectString appears similar to the following:
"Driver=Adaptive Server Enterprise;UID=sa; PWD='';Server=sampleserver; Port=4100;Database=pubs2; AuthenticationClient=mitkerberos; ServerPrincipal=MANGO;”