Este contenido no está disponible en el idioma seleccionado.
11.3. Configuring a Kerberos Client
All that is required to set up a Kerberos 5 client is to install the client packages and provide each client with a valid
krb5.conf configuration file. While ssh and slogin are the preferred methods of remotely logging in to client systems, Kerberos-aware versions of rsh and rlogin are still available, with additional configuration changes.
- Install the
krb5-libsandkrb5-workstationpackages on all of the client machines.yum install krb5-workstation krb5-libs
[root@server ~]# yum install krb5-workstation krb5-libsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Supply a valid
/etc/krb5.conffile for each client. Usually this can be the samekrb5.conffile used by the Kerberos Distribution Center (KDC). For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow In some environments, the KDC is only accessible using an HTTPS Kerberos Key Distribution Center Proxy (KKDCP). In this case, make the following changes:- Assign the URL of the KKDCP instead of the host name to the
kdcandadmin_serveroptions in the[realms]section:Copy to Clipboard Copied! Toggle word wrap Toggle overflow For redundancy, the parameterskdc,admin_server, andkpasswd_servercan be added multiple times using different KKDCP servers. - On IdM clients, restart the
sssdservice to make the changes take effect:systemctl restart sssd
[root@server ~]# systemctl restart sssdCopy to Clipboard Copied! Toggle word wrap Toggle overflow
- To use Kerberos-aware
rshandrloginservices, install thershpackage. - Before a workstation can use Kerberos to authenticate users who connect using
ssh,rsh, orrlogin, it must have its own host principal in the Kerberos database. Thesshd,kshd, andklogindserver programs all need access to the keys for the host service's principal.- Using
kadmin, add a host principal for the workstation on the KDC. The instance in this case is the host name of the workstation. Use the-randkeyoption for thekadmin'saddprinccommand to create the principal and assign it a random key:addprinc -randkey host/server.example.com
addprinc -randkey host/server.example.comCopy to Clipboard Copied! Toggle word wrap Toggle overflow - The keys can be extracted for the workstation by running
kadminon the workstation itself and using thektaddcommand.ktadd -k /etc/krb5.keytab host/server.example.com
ktadd -k /etc/krb5.keytab host/server.example.comCopy to Clipboard Copied! Toggle word wrap Toggle overflow
- To use other Kerberos-aware network services, install the krb5-server package and start the services. The Kerberos-aware services are listed in Table 11.3, “Common Kerberos-aware Services”.
| Service Name | Usage Information |
|---|---|
| ssh | OpenSSH uses GSS-API to authenticate users to servers if the client's and server's configuration both have GSSAPIAuthentication enabled. If the client also has GSSAPIDelegateCredentials enabled, the user's credentials are made available on the remote system. OpenSSH also contains the sftp tool, which provides an FTP-like interface to SFTP servers and can use GSS-API. |
| IMAP |
The
cyrus-imap package uses Kerberos 5 if it also has the cyrus-sasl-gssapi package installed. The cyrus-sasl-gssapi package contains the Cyrus SASL plugins which support GSS-API authentication. Cyrus IMAP functions properly with Kerberos as long as the cyrus user is able to find the proper key in /etc/krb5.keytab, and the root for the principal is set to imap (created with kadmin).
An alternative to
cyrus-imap can be found in the dovecot package, which is also included in Red Hat Enterprise Linux. This package contains an IMAP server but does not, to date, support GSS-API and Kerberos.
|