After doing some research into Kerberos EAI to handle this issue, and having IBM support suggest that as an option too, I tried an alternative. Having to set up an external application to handle the Kerberos authentication is just one more piece of infrastructure that can break, so I wanted to avoid that option and find something built into Verify Access.
Instead, I configured the reverse proxy SPNEGO config to remove the Kerberos realm, by setting use-domain-qualified-name to "no". Then I configured a user map ping to add the new domain name onto the identity name. This seems to work, I just need to figure out if this is supported by IBM.
<?xml version="1.0" encoding='UTF-8'?>
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:stsuuser="urn:ibm:names:ITFIM:1.0:stsuuser" version="1.0">
<!-- Required to constrain output of rule evaluation -->
<xsl:output method="xml" omit-xml-declaration="yes" encoding='UTF=8' indent="no"/>
<!-- Need this to ensure default text node printing is off -->
<xsl:template match="text()"></xsl:template>
<!-- Let's make it easier by matching the constant part of our XML name -->
<xsl:template match="/XMLUMI/stsuuser:STSUniversalUser/stsuuser:AttributeList">
<identity><xsl:value-of select="/XMLUMI/stsuuser:STSUniversalUser/stsuuser:Principal/stsuuser:Attribute[@name='name']/stsuuser:Value"/>@company.new.tld</identity>
</xsl:template>
</xsl:stylesheet>
Reverse Proxy config updates
[user-map-authn]
rules-file = map-kerberos-to-upn.xsl
Also update the [spnego] stanza value below:
use-domain-qualified-name = no