This appendix provides information on configuring Java Kerberos Authentication for Query Design Center, Relational Design Center and the Relational Database Server for ClearPath MCP JDBC Driver.
Configuring Kerberos Authentication
-
Create a registry key using the Windows Registry Editor to make the session ticket-granting ticket (TGT) key available. Do the following:
-
Open Registry Editor and expand the HKEY_LOCAL_MACHINE folder.
-
Expand the SYSTEM folder.
-
Expand the CurrentControlSet folder.
-
Expand the Control folder.
-
Expand the LSA folder.
-
Right-click the Kerberos folder.
-
Select New and click DWORD (32-bit) Value.
-
In the right pane of the Registry Editor window, name the new DWORD AllowTGTSessionKey.
-
Right-click AllowTGTSessionKey and select Modify....
The Edit DWORD (32-bit) Value dialog box appears.
-
In the Value data field, change the value to 1.
-
Click OK.
-
-
Locate the java.security file using one of the following methods:
-
For systems running Java 11, in your Java directory, do the following:
-
Click the config folder.
-
Click the security folder.
-
-
For systems running Java 8, in your Java directory, do the following:
-
Click the lib folder.
-
Click the security folder.
-
-
-
Modify the java.security file to reference the Java Authentication and Authorization Service (JAAS) configuration file named jaas.config, which is in the same directory. For example:
login.config.url.1=file:${java.home}/lib/security/jaas.configNote: If login.config.url.1 exists, use the next available number. For example, login.config.url.2=file:${java.home}/lib/security/jaas.config. -
Create or modify the ${java.home}lib/security/jaas.config file.
The JAASconfiguration file indicates the Pluggable Authentication Module (PAM) to use. The following lists sample contents, which can be added to an existing jaas.config file:
unisys.mcpsql.provider { com.sun.security.auth.module.Krb5LoginModule required useTicketCache=true client=true debug=false useKeyTab=true default_tkt_enctypes=des-cdc-md5 default_tgs_enctypes=des-cbc-md5; }; -
Create the Kerberos configuration file named krb5.conf in the lib/security directory of the JRE structure.
The following lists sample contents of the Kerberos configuration file:
[libdefaults] default_realm = FOO.BAR dns_lookup_kdc = true[realms] FOO.BAR = { kdc = kdc.foo.bar admin_server = kdc.foo.bar } [domain_realm] [logging] -
Optionally, you can configure Kerberos Authentication for Query Design Center, Relational Design Center, and the JDBC Driver. Do the following:
-
Launch the tool you want to configure Kerberos Authentication for (for example, the Query Design Center, Relational Design Center, or the JDBC Driver).
The \.MCPSQL directory is created in your home directory. A file with the extension .properties is also created with all property settings commented out. The following lists the file name of each tool for which you can configure Kerberos Authentication:
Software
File Name
Query Design Center
qdc.properties
Relational Design Center
rdc.properties
JDBC Driver
provider.properties
-
Using a text editor, change the properties for the service name attributes.
You change a property by removing the number sign character (#) at the beginning of a property name and editing the corresponding value.
-
Save the file in the \.MCPSQL directory.
The modified properties take effect the next time you launch the tool you configured Kerberos Authentication for.
-
Caching Kerberos Credentials
Once you have configured Kerberos Authentication, you can cache your Kerberos credentials using the Java kinit command.

