Fixes are available
8.0.0.5: WebSphere Application Server V8.0 Fix Pack 5
7.0.0.27: WebSphere Application Server V7.0 Fix Pack 27
8.5.0.2: WebSphere Application Server V8.5 Fix Pack 2
8.0.0.6: WebSphere Application Server V8.0 Fix Pack 6
7.0.0.29: WebSphere Application Server V7.0 Fix Pack 29
8.0.0.7: WebSphere Application Server V8.0 Fix Pack 7
8.0.0.8: WebSphere Application Server V8.0 Fix Pack 8
7.0.0.31: WebSphere Application Server V7.0 Fix Pack 31
7.0.0.27: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.33: WebSphere Application Server V7.0 Fix Pack 33
8.0.0.9: WebSphere Application Server V8.0 Fix Pack 9
7.0.0.35: WebSphere Application Server V7.0 Fix Pack 35
8.0.0.10: WebSphere Application Server V8.0 Fix Pack 10
7.0.0.37: WebSphere Application Server V7.0 Fix Pack 37
8.0.0.11: WebSphere Application Server V8.0 Fix Pack 11
7.0.0.39: WebSphere Application Server V7.0 Fix Pack 39
8.0.0.12: WebSphere Application Server V8.0 Fix Pack 12
7.0.0.41: WebSphere Application Server V7.0 Fix Pack 41
8.0.0.13: WebSphere Application Server V8.0 Fix Pack 13
7.0.0.43: WebSphere Application Server V7.0 Fix Pack 43
8.0.0.14: WebSphere Application Server V8.0 Fix Pack 14
7.0.0.45: WebSphere Application Server V7.0 Fix Pack 45
8.0.0.15: WebSphere Application Server V8.0 Fix Pack 15
7.0.0.27: Java SDK 1.6 SR12 Cumulative Fix for WebSphere Application Server
7.0.0.29: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.45: Java SDK 1.6 SR16 FP60 Cumulative Fix for WebSphere Application Server
7.0.0.31: Java SDK 1.6 SR15 Cumulative Fix for WebSphere Application Server
7.0.0.35: Java SDK 1.6 SR16 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.37: Java SDK 1.6 SR16 FP3 Cumulative Fix for WebSphere Application Server
7.0.0.39: Java SDK 1.6 SR16 FP7 Cumulative Fix for WebSphere Application Server
7.0.0.41: Java SDK 1.6 SR16 FP20 Cumulative Fix for WebSphere Application Server
7.0.0.43: Java SDK 1.6 SR16 FP41 Cumulative Fix for WebSphere Application Server
APAR status
Closed as program error.
Error description
When a Kerberos token exists in the Microsoft Windows native ticket cache, Java security has access to the token, so the WS-Security token generator should be able to pick it up and generate it. However, WS-Security is unable to pick up the token from the Microsoft Windows native ticket cache.
Local fix
N/A
Problem summary
**************************************************************** * USERS AFFECTED: IBM WebSphere Application Server users of * * WS-Security enabled JAX-WS applications * * and Kerberos * **************************************************************** * PROBLEM DESCRIPTION: WS-Security Kerberos token generator * * does not pick up tokens from Microsoft * * Windows native ticket cache * **************************************************************** * RECOMMENDATION: Apply a fix pack that contains this APAR. * **************************************************************** The WS-Security Kerberos token generator KRBGenerateLoginModule is not picking up a Kerberos token that is available in the Microsoft Windows native ticket cache. When there is a token available in the Microsoft Windows native ticket cache and a Kerberos token is not available through other methods (username and password in callback handler or Kerberos token on runAs subject), an error similar to the following may occur: [20/07/2012 16:52:20:241 EDT] 00000000 3 ecurity.wssapi.token.impl.KRBGenerateLoginModule idForServiceTicket is null. [20/07/2012 16:52:20:241 EDT] 00000000 ecurity.wssapi.token.impl.KRBGenerateLoginModule Error: CWWSS7292E: Failed to login for Kerberos AP_REQ token generation due to exception java.lang.NullPointerException from Kerberos Token Profile processing runtime. CWWSS7292E: Failed to login for Kerberos AP_REQ token generation due to exception java.lang.NullPointerException from Kerberos Token Profile processing runtime.
Problem conclusion
The WS-Security runtime dit not recognize that there is a ticket in the Microsoft Windows native ticket cache. The WS-Security runtime is updated to access a Kerberos token in the Microsoft Windows native ticket cache. The Kerberos token generator will use the following priority when generating tokens: 1) Username and password specified on the callback handler 2) Ticket in runAs subject on the current thread 3) Ticket in Microsoft Windows native ticket cache The ticket will only be used from the Microsoft Windows native ticket cache if there is no username and password specified in the token generator's callback handler, and there is no Kerberos ticket on the current thread's runAs subject. The fix for this APAR is currently targeted for inclusion in fix packs 7.0.0.27, 8.0.0.5, and 8.5.0.2. Please refer to the Recommended Updates page for delivery information: http://www.ibm.com/support/docview.wss?rs=180&uid=swg27004980
Temporary fix
Comments
APAR Information
APAR number
PM69334
Reported component name
WEBS APP SERV N
Reported component ID
5724H8800
Reported release
700
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt
Submitted date
2012-07-20
Closed date
2012-07-24
Last modified date
2012-11-27
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
WEBS APP SERV N
Fixed component ID
5724H8800
Applicable component levels
R700 PSY
UP
R800 PSY
UP
R850 PSY
UP
Document Information
Modified date:
29 October 2021