You can find below logs from "tail -f /var/log/secure /var/log/audit/audit.log" from the moment of trying log in from AD Windows Station with SELinux=1
[root@client1 ~]# tail -f /var/log/secure /var/log/audit/audit.log
==> /var/log/secure <==
Nov 7 08:14:08 client1 sshd[19874]: debug1: session_input_channel_req: session 0 req shell
Nov 7 08:14:08 client1 sshd[19875]: debug1: Setting controlling tty using TIOCSCTTY.
Nov 7 08:14:12 client1 su: pam_unix(su-l:session): session opened for user root by leszek(uid=507)
Nov 7 08:14:59 client1 sshd[17287]: debug1: Got 100/242 for keepalive
Nov 7 08:19:59 client1 sshd[17287]: debug1: Got 100/243 for keepalive
Nov 7 08:21:27 client1 sshd[17876]: Received signal 15; terminating.
Nov 7 08:21:27 client1 sshd[19980]: Set /proc/self/oom_score_adj from 0 to -1000
Nov 7 08:21:27 client1 sshd[19980]: debug1: Bind to port 22 on 0.0.0.0.
Nov 7 08:21:27 client1 sshd[19980]: Server listening on 0.0.0.0 port 22.
Nov 7 08:21:27 client1 sshd[19980]: socket: Address family not supported by protocol
==> /var/log/audit/audit.log <==
type=PATH msg=audit(1415344887.668:20203): item=0 name="/var/lock/subsys/" inode=8204 dev=fd:03 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:var_lock_t:s0 nametype=PARENT
type=PATH msg=audit(1415344887.668:20203): item=1 name="/var/lock/subsys/sshd" inode=51 dev=fd:03 mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=unconfined_u:object_r:var_lock_t:s0 nametype=DELETE
type=AVC msg=audit(1415344887.708:20204): avc: denied { read } for pid=19977 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344887.708:20204): arch=c000003e syscall=4 success=no exit=-13 a0=7f75ee5a6f5d a1=7fffdd78b620 a2=7fffdd78b620 a3=22 items=1 ppid=19963 pid=19977 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344887.708:20204): cwd="/root"
type=PATH msg=audit(1415344887.708:20204): item=0 name="/var/tmp" nametype=UNKNOWN
type=AVC msg=audit(1415344887.708:20205): avc: denied { read } for pid=19977 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344887.708:20205): arch=c000003e syscall=4 success=no exit=-13 a0=7f75ee5a6f66 a1=7fffdd78b620 a2=7fffdd78b620 a3=22 items=1 ppid=19963 pid=19977 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344887.708:20205): cwd="/root"
type=PATH msg=audit(1415344887.708:20205): item=0 name="/usr/tmp" nametype=UNKNOWN
==> /var/log/secure <==
Nov 7 08:22:27 client1 sshd[19980]: debug1: Forked child 19985.
Nov 7 08:22:27 client1 sshd[19985]: Set /proc/self/oom_score_adj to 0
Nov 7 08:22:27 client1 sshd[19985]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
==> /var/log/audit/audit.log <==
type=AVC msg=audit(1415344947.928:20206): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344947.928:20206): arch=c000003e syscall=4 success=no exit=-13 a0=7f92c290df5d a1=7fff76e983d0 a2=7fff76e983d0 a3=22 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344947.928:20206): cwd="/"
type=PATH msg=audit(1415344947.928:20206): item=0 name="/var/tmp" nametype=UNKNOWN
type=AVC msg=audit(1415344947.928:20207): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344947.928:20207): arch=c000003e syscall=4 success=no exit=-13 a0=7f92c290df66 a1=7fff76e983d0 a2=7fff76e983d0 a3=22 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344947.928:20207): cwd="/"
type=PATH msg=audit(1415344947.928:20207): item=0 name="/usr/tmp" nametype=UNKNOWN
==> /var/log/secure <==
Nov 7 08:22:27 client1 sshd[19985]: debug1: inetd sockets after dupping: 3, 3
Nov 7 08:22:27 client1 sshd[19985]: Connection from 10.X.X.X port 61085
Nov 7 08:22:27 client1 sshd[19985]: debug1: Client protocol version 2.0; client software version PuTTY_Release_0.63
Nov 7 08:22:27 client1 sshd[19985]: debug1: no match: PuTTY_Release_0.63
Nov 7 08:22:27 client1 sshd[19985]: debug1: Enabling compatibility mode for protocol 2.0
Nov 7 08:22:27 client1 sshd[19985]: debug1: Local version string SSH-2.0-OpenSSH_5.3
==> /var/log/audit/audit.log <==
type=CRYPTO_KEY_USER msg=audit(1415344948.001:20208): user pid=19988 uid=0 auid=507 ses=1213 subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=1c:73:d2:ef:e3:0a:f1:9f:30:b5:76:ab:ec:97:1d:3f direction=? spid=19988 suid=0 exe="/usr/sbin/sshd" hostname=? addr=10.X.X.X terminal=? res=success'
type=CRYPTO_KEY_USER msg=audit(1415344948.001:20209): user pid=19988 uid=0 auid=507 ses=1213 subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=c5:7e:2c:50:ca:8a:de:47:61:7e:2e:52:78:bb:2c:83 direction=? spid=19988 suid=0 exe="/usr/sbin/sshd" hostname=? addr=10.X.X.X terminal=? res=success'
==> /var/log/secure <==
Nov 7 08:22:28 client1 sshd[19988]: debug1: permanently_set_uid: 74/74
Nov 7 08:22:28 client1 sshd[19988]: debug1: list_hostkey_types: ssh-rsa,ssh-dss
==> /var/log/audit/audit.log <==
type=AVC msg=audit(1415344948.005:20210): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.005:20210): arch=c000003e syscall=6 success=no exit=-13 a0=7f92c5af22b0 a1=7fff76e99470 a2=7fff76e99470 a3=7fff76e99150 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344948.005:20210): cwd="/"
type=PATH msg=audit(1415344948.005:20210): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
type=AVC msg=audit(1415344948.006:20211): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.006:20211): arch=c000003e syscall=87 success=no exit=-13 a0=7f92c5af22b0 a1=0 a2=0 a3=7fff76e99230 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key="delete"
type=CWD msg=audit(1415344948.006:20211): cwd="/"
type=PATH msg=audit(1415344948.006:20211): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
type=AVC msg=audit(1415344948.231:20212): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.231:20212): arch=c000003e syscall=2 success=no exit=-13 a0=7f92c5af22b0 a1=2c1 a2=180 a3=7fff76e991b0 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key="access"
type=CWD msg=audit(1415344948.231:20212): cwd="/"
type=PATH msg=audit(1415344948.231:20212): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
==> /var/log/secure <==
Nov 7 08:22:28 client1 sshd[19985]: debug1: Unspecified GSS failure. Minor code may provide more information\nCannot create replay cache file /var/tmp/host_0: Permission denied\n
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_KEXINIT sent
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_KEXINIT received
Nov 7 08:22:28 client1 sshd[19988]: debug1: kex: client->server aes256-ctr hmac-sha2-256 none
==> /var/log/audit/audit.log <==
type=CRYPTO_SESSION msg=audit(1415344948.233:20213): user pid=19985 uid=0 auid=507 ses=1213 subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 spid=19988 suid=74 rport=61085 laddr=10.X.X.X lport=22 exe="/usr/sbin/sshd" hostname=? addr=10.X.X.X terminal=? res=success'
==> /var/log/secure <==
Nov 7 08:22:28 client1 sshd[19988]: debug1: kex: server->client aes256-ctr hmac-sha2-256 none
==> /var/log/audit/audit.log <==
type=CRYPTO_SESSION msg=audit(1415344948.233:20214): user pid=19985 uid=0 auid=507 ses=1213 subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 spid=19988 suid=74 rport=61085 laddr=10.X.X.X lport=22 exe="/usr/sbin/sshd" hostname=? addr=10.X.X.X terminal=? res=success'
==> /var/log/secure <==
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
Nov 7 08:22:28 client1 sshd[19988]: debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_NEWKEYS sent
Nov 7 08:22:28 client1 sshd[19988]: debug1: expecting SSH2_MSG_NEWKEYS
Nov 7 08:22:28 client1 sshd[19988]: debug1: SSH2_MSG_NEWKEYS received
Nov 7 08:22:28 client1 sshd[19988]: debug1: KEX done
Nov 7 08:22:28 client1 sshd[19988]: debug1: userauth-request for user USER1 service ssh-connection method none
Nov 7 08:22:28 client1 sshd[19988]: debug1: attempt 0 failures 0
Nov 7 08:22:28 client1 sshd[19985]: debug1: PAM: initializing for "USER1"
Nov 7 08:22:28 client1 sshd[19985]: debug1: PAM: setting PAM_TTY to "ssh"
Nov 7 08:22:28 client1 sshd[19988]: debug1: userauth_send_banner: sent
Nov 7 08:22:28 client1 sshd[19988]: debug1: userauth-request for user USER1 service ssh-connection method gssapi-with-mic
Nov 7 08:22:28 client1 sshd[19988]: debug1: attempt 1 failures 0
==> /var/log/audit/audit.log <==
type=AVC msg=audit(1415344948.799:20215): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.799:20215): arch=c000003e syscall=6 success=no exit=-13 a0=7f92c5c3b970 a1=7fff76e99470 a2=7fff76e99470 a3=10 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null)
type=CWD msg=audit(1415344948.799:20215): cwd="/"
type=PATH msg=audit(1415344948.799:20215): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
type=AVC msg=audit(1415344948.799:20216): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.799:20216): arch=c000003e syscall=87 success=no exit=-13 a0=7f92c5af58e0 a1=0 a2=0 a3=10 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key="delete"
type=CWD msg=audit(1415344948.799:20216): cwd="/"
type=PATH msg=audit(1415344948.799:20216): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
type=AVC msg=audit(1415344948.800:20217): avc: denied { read } for pid=19985 comm="sshd" name="tmp" dev=dm-3 ino=925 scontext=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=lnk_file
type=SYSCALL msg=audit(1415344948.800:20217): arch=c000003e syscall=2 success=no exit=-13 a0=7f92c5af58e0 a1=2c1 a2=180 a3=65726373662f7274 items=1 ppid=19980 pid=19985 auid=507 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1213 comm="sshd" exe="/usr/sbin/sshd" subj=unconfined_u:system_r:sshd_t:s0-s0:c0.c1023 key="access"
type=CWD msg=audit(1415344948.800:20217): cwd="/"
type=PATH msg=audit(1415344948.800:20217): item=0 name="/var/tmp/host_0" nametype=UNKNOWN
==> /var/log/secure <==
Nov 7 08:22:28 client1 sshd[19985]: debug1: Unspecified GSS failure. Minor code may provide more information\nCannot create replay cache file /var/tmp/host_0: Permission denied\n
Nov 7 08:22:28 client1 sshd[19988]: debug1: userauth-request for user USER1 service ssh-connection method keyboard-interactive
Nov 7 08:22:28 client1 sshd[19988]: debug1: attempt 2 failures 0
Nov 7 08:22:28 client1 sshd[19988]: debug1: keyboard-interactive devs
Nov 7 08:22:28 client1 sshd[19988]: debug1: auth2_challenge: user=USER1 devs=
Nov 7 08:22:28 client1 sshd[19988]: debug1: kbdint_alloc: devices 'pam'
Nov 7 08:22:28 client1 sshd[19988]: debug1: auth2_challenge_start: trying authentication method 'pam'
Nov 7 08:22:28 client1 sshd[19988]: Postponed keyboard-interactive for USER1 from 10.X.X.X port 61085 ssh2
I have GSSApiAuthentication yes in the sshd_config.
Klist from the Windows machine showing no entries from sssd linux client machine.
To eliminate problem with Windows, I created another test: trying to log in by GSSAPI from sssd client client1 to the same client client1.
So the problem is within client1.