Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages
        Log Message Reference >>
            User Authentication - Common
            User Authentication - Host-Based
            User Authentication - Keyboard-Interactive PAM
            User Authentication - Keyboard-Interactive Password
            User Authentication - Keyboard-Interactive
            User Authentication - Kerberos TGT
            User Authentication - Kerberos
            User Authentication - PAM
            User Authentication - Password
            User Authentication - Public Key
            User Authentication - SecurID
            User Authentication - GSSAPI
            Certificate-Specific Code
            SFTP Server
            Agent Forwarding
            Session Channels
            SSH1 Agent Forwarding
            Port Forwarding
            X11 Forwarding
            Common Code
            Host Key I/O
            General Server Log Messages
            SFTP

User Authentication - GSSAPI

Error received from GSSAPI

auth: gss-api: <error-name> error: major: <major-error-code> minor: <minor-error-code>

A warning message is received from GSSAPI.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

GSSAPI mechanism is not supported by system

auth: gss-api: '<mechanism-name>' GSSAPI mechanism is not supported on this system.

A GSSAPI mechanism is not supported on this system.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

Parsing Kerberos principal name fails

auth: gss-api: parsing krb5 principal name failed, failing authentication for user '<username>'.

Parsing Kerberos principal name fails, resulting in failed user authentication

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

User not allowed to login by KUSEROK

auth: gss-api: user '<username>' not allowed to login by kuserok.

User is not allowed to login by KUSEROK.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

Ticket forwarding is not enabled

Function(s) needed for ticket forwarding not available. Ticket forwarding is disabled.

One or more functions required for ticket forwarding are not available, resulting in disabled ticket forwarding.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_INFORMATIONAL

Cannot load GSSAPI library

Cannot load GSSAPI library. GSSAPI disabled.

GSSAPI library load fails, resulting in disabled GSSAPI.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

Cannot load Kerberos library

Could not load Kerberos library. GSSAPI disabled.

Kerberos library loading fails, resulting in disabled GSSAPI.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_WARNING

Functions required by GSSAPI are not available

Missing functions. GSSAPI disabled.

One or more functions required by GSSAPI are missing, resulting in disabled GSSAPI.

Facility: SSH_LOGFACILITY_AUTH

Level: SSH_LOG_ERROR

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now