Thanks Joe. I tried that out yesterday before I had the ktpass run by our AD team with the mapuser parameter. I was originally unable to run the ktpass with mapuser due to my lack of permissions in AD. As such, I tried that out yesterday, using first the SPN
BICMS/ServiceAcccount.Name.BUSINESS.DOMAIN.COM@BUSINESS.DOMAIN.COM
and also just with the service account name (which is what the UPN on the account was at the time before running the ktpass with mapuser). From what I read, the mapuser basically updates the UPN of the account specified to the be the same as the SPN passed to ktpass.
ServiceAcccount.Name
After getting the AD team to run ktpass with the mapuser option this morning, I have confirmed in AD that the UPN (userPrincipalName attribute) has been updated to the SPN (BICMS/ServiceAcccount.Name.BUSINESS.DOMAIN.COM@BUSINESS.DOMAIN.COM). I have tried both modes since, but my current setting is:
idm.princ=BICMS/ServiceAcccount.Name.BUSINESS.DOMAIN.COM
Don’t worry - I really don’t know anything about this - I’m just fumbling around from one KB article to the next! 
The strange thing is that it works perfectly as soon as I comment out the keytab line and uncomment the password line in the global properties.
#idm.keytab=C:/Windows/bodev.keytab
idm.password=IaM!APassword
But even with the keytab enabled, I still see the ** credentials obtained… ** being logged to the stderr.log in tomcat. They do look subtly different however (I have just been comparing the logs from alternate attempts).
Logs when using keytab (SSO not working):
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Available KDC found: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Sending message to KDC: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Sending TCP request: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: connected; sending length and request...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: sent request; reading response length...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: read length; reading 398-byte response...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: --- got 398-byte response, initial byte = 0x7e
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Message sent sucessfully to KDC: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Resolving KDC for realm: BUSINESS.DOMAIN.COM
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Available KDC found: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Sending message to KDC: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Sending TCP request: /123.123.123.21:88
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: connected; sending length and request...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: sent request; reading response length...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: read length; reading 2002-byte response...
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: --- got 2002-byte response, initial byte = 0x6b
Thu Jul 28 13:21:38 BST 2016 jcsi.kerberos: Message sent sucessfully to KDC: /123.123.123.21:88
Thu Jul 28 13:21:39 BST 2016 jcsi.kerberos: ** credentials obtained .. **
Logs when using idm.password (SSO working):
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Available KDC found: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Sending message to KDC: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Sending TCP request: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: connected; sending length and request...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: sent request; reading response length...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: read length; reading 245-byte response...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: --- got 245-byte response, initial byte = 0x7e
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Message sent sucessfully to KDC: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: ** KDC requires pre-authentication **
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Acceptable PA type: 19
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Acceptable PA type: 2
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Acceptable PA type: 16
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Acceptable PA type: 15
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: ETypeInfo:
ETypeInfo2Entry:
etype: 18
salt: BUSINESS.DOMAIN.COMBICMSServiceAcccount.Name.BUSINESS.DOMAIN.COM
ETypeInfo2Entry:
etype: 23
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: ** Adding encrypted timestamp pre-auth **
encryption type: 18
salt: BUSINESS.DOMAIN.COMBICMSServiceAcccount.Name.BUSINESS.DOMAIN.COM
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: ** Sending request to KDC .. **
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Resolving KDC for realm: BUSINESS.DOMAIN.COM
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Available KDC found: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Sending message to KDC: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Sending TCP request: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: connected; sending length and request...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: sent request; reading response length...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: read length; reading 2086-byte response...
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: --- got 2086-byte response, initial byte = 0x6b
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: Message sent sucessfully to KDC: /123.123.123.24:88
Thu Jul 28 15:10:21 BST 2016 jcsi.kerberos: ** credentials obtained .. **
Not sure if it’s relevant or not.
Thanks for the suggestion Joe.
Regards,
Graeme
GraemeSmith
(BOB member since 2002-08-16)