Hi Raj ,
Based on what was discussed in your Case 00974970 , your Windows machine that you are triggering the Kerberos Auth from is not added to the AD Domain Controller used for Kerberos hence why you have a token size of
[token length before validating is 56]
Authorization Header is present: Negotiate 4E 54 4C 4D 53 53 50 00 01 00 00 00 97 82 08 E2 NTLMSSP.....??.â
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
06 01 B1 1D 00 00 00 0F ..±.....
-[NTLM Type1: Negotiation]------------------------------
Provider: NTLMSSP
Type: 1
OS Version: 6.1:7601
Flags: 0xe2088297
Unicode supported in security buffer.
OEM strings supported in security buffer.
Request server's authentication realm included in Type2 reply.
Sign (integrity)
NTLM authentication.
Negotiate Always Sign.
Negotiate NTLM2 Key.
Supports 56-bit encryption.
Supports 128-bit encryption.
Client will provide master key in Type 3 Session Key field.
Domain_Offset: 0; Domain_Length: 0; Domain_Length2: 0
Host_Offset: 0; Host_Length: 0; Host_Length2: 0
Host:
Domain:
------------------------------------
This token causing the Following error in your Agent
[Failed to validate remote GSSAPI token: Minor Status=0, Major Status=65536, Message=Unknown code 0]
As a Next action, please work with your Microsoft team Or use a Machine connected to the Kerberos AD Domain Controller with valid Kerberos token so you are able to test the Flow with a valid Kerberos Token
Regards
Joe