since I updated my DC to 4.4-0 erata47 the kerberos-SSO isn’t working anymore. My Clients and users get still kerberos tickets from the kdc for e.g. shares but not for http/ucs-sso.example.com.
As I followed these instructions from “Debugging the SAML Kerberos authentication” post, I ended up with
root@dc1:~# kinit -t /etc/simplesamlphp.keytab HTTP/ucs-sso.$(ucr get domainname)@$(ucr get kerberos/realm)
Take a look at the keys stored in the keytab with ktutil -k /etc/simplesamlphp.keytab list & post the list here. Please also post the output of ucr get domainname and ucr get kerberos/realm, just to make sure the values are set correctly.
Does ucr get kerberos/realm really yield lower-case phiku.de instread of PHIKU.DE? 'cause Kerberos is case-sensitive, and your keytab contains keys in the expected upper case.
However, the error message would be different if the requested ID used lower case:
It’s possible that the key version in the exported key tab is too old (meaning that a newer version is present on the KDC). Please execute the following & post the output:
univention-s4search --cross-ncs "(|(userPrincipalName=HTTP/ucs-sso.$(ucr get domainname)@$(ucr get kerberos/realm))(cn=ucs-sso))" | ldapsearch-wrapper
univention-s4search --cross-ncs "(|(userPrincipalName=HTTP/ucs-sso.$(ucr get domainname)@$(ucr get kerberos/realm))(cn=ucs-sso))" msDS-KeyVersionNumber
samba-tool domain exportkeytab ucs-sso.keytab --principal HTTP/ucs-sso.$(ucr get domainname)@$(ucr get kerberos/realm)
ktutil -k ucs-sso.keytab list
kinit -t ucs-sso.keytab HTTP/ucs-sso.$(ucr get domainname)@$(ucr get kerberos/realm)