VMware Aria Automation Orchestrator 8.13 and above, when attempting to use Kerberos authentication the user displays an error:
"Unsupported mechanism requested: 1.2.840.113554.1.2.2"
The PowerShell plugin relies on the SunJGSS security provider, which is not FIPS compatible and, therefore, is not used in FIPS mode.
Starting with Java 17, the SunJGSS provider cannot be used at runtime unless it is explicitly exposed using a JVM parameter.
Workaround for PowerShell Host Plugin Authentication Issue in VMware Aria Automation 8.14
Currently, there is no official resolution for this issue. However, you can follow the workaround below based on your FIPS compliance requirements.
Possible Workarounds:
Use the appliance without FIPS mode (for new installations).
Use an alternative authentication method instead of Kerberos.
Utilize Polyglot PowerShell scripts as an alternative approach.
If FIPS compliance is not strictly required, you can modify the environment by adding the following JVM parameter:
Note: This setting will not persist after an upgrade.
Steps to apply the addition of JVM parameter workaround:
1. Run the following command.
kubectl -n prelude edit deployment vco-app
2. Edit deployment YAML file - find the JVM_OPTS for the vco-server:
name: JVM_OPTS
value: -DCONSOLE_LOG_PATTERN= -DLOG_FILE=/var/log/collected-logs/vco-server-app.log
Add the line to the JVM_OPTS value.
--add-exports java.security.jgss/sun.security.jgss=ALL-UNNAMED
3. Save the file.
This will allow the vco server to use SunJGSS provider, which is not in the list of FIPS-approved providers.
Applying this workaround allows the vCO server to use the SunJGSS provider, which is not included in the list of FIPS-approved providers.
In any case, when Kerberos authentication is used in FIPs mode, make sure that the supplied algorithms in krb5.conf are FIPS-compliant, depending on the desired FIPS level.
See here for examples:https://www.ibm.com/docs/en/zos/2.5.0?topic=service-configuration-encryption-types-fips-level
Impact/Risks: