Este conteúdo não está disponível no idioma selecionado.
Chapter 16. Kerberos PKINIT authentication in IdM
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) is a preauthentication mechanism for Kerberos. The Identity Management (IdM) server includes a mechanism for Kerberos PKINIT authentication.
16.1. Default PKINIT configuration Copiar o linkLink copiado para a área de transferência!
The default PKINIT configuration on your IdM servers depends on the certificate authority (CA) configuration.
CA configuration | PKINIT configuration |
---|---|
Without a CA, no external PKINIT certificate provided | Local PKINIT: IdM only uses PKINIT for internal purposes on servers. |
Without a CA, external PKINIT certificate provided to IdM | IdM configures PKINIT by using the external Kerberos key distribution center (KDC) certificate and CA certificate. |
With an Integrated CA | IdM configures PKINIT by using the certificate signed by the IdM CA. |
16.2. Displaying the current PKINIT configuration Copiar o linkLink copiado para a área de transferência!
IdM provides multiple commands you can use to query the PKINIT configuration in your domain.
Procedure
To determine the PKINIT status in your domain, use the
ipa pkinit-status
command:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The command displays the PKINIT configuration status as
enabled
ordisabled
:-
enabled
: PKINIT is configured using a certificate signed by the integrated IdM CA or an external PKINIT certificate. -
disabled
: IdM only uses PKINIT for internal purposes on IdM servers.
-
To list the IdM servers with active Kerberos key distribution centers (KDCs) that support PKINIT for IdM clients, use the
ipa config-show
command on any server:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
16.3. Configuring PKINIT in IdM Copiar o linkLink copiado para a área de transferência!
If your IdM servers are running with PKINIT disabled, use these steps to enable it. For example, a server is running with PKINIT disabled if you passed the --no-pkinit
option with the ipa-server-install
or ipa-replica-install
utilities.
Prerequisites
- Ensure that all IdM servers with a certificate authority (CA) installed are running on the same domain level.
Procedure
Check if PKINIT is enabled on the server:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If PKINIT is disabled, you will see the following output:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow You can also use the command to find all the servers where PKINIT is enabled if you omit the
--server <server_fqdn>
parameter.If you are using IdM without CA:
On the IdM server, install the CA certificate that signed the Kerberos key distribution center (KDC) certificate:
ipa-cacert-manage install -t CT,C,C ca.pem
# ipa-cacert-manage install -t CT,C,C ca.pem
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To update all IPA hosts, repeat the
ipa-certupdate
command on all replicas and clients:ipa-certupdate
# ipa-certupdate
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check if the CA certificate has already been added using the
ipa-cacert-manage list
command. For example:ipa-cacert-manage list
# ipa-cacert-manage list CN=CA,O=Example Organization The ipa-cacert-manage command was successful
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
ipa-server-certinstall
utility to install an external KDC certificate. The KDC certificate must meet the following conditions:-
It is issued with the common name
CN=fully_qualified_domain_name,certificate_subject_base
. -
It includes the Kerberos principal
krbtgt/REALM_NAME@REALM_NAME
. It contains the Object Identifier (OID) for KDC authentication:
1.3.6.1.5.2.3.5.
ipa-server-certinstall --kdc kdc.pem kdc.key systemctl restart krb5kdc.service
# ipa-server-certinstall --kdc kdc.pem kdc.key # systemctl restart krb5kdc.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
It is issued with the common name
See your PKINIT status:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
If you are using IdM with a CA certificate, enable PKINIT as follows:
ipa-pkinit-manage enable
# ipa-pkinit-manage enable Configuring Kerberos KDC (krb5kdc) [1/1]: installing X509 Certificate for PKINIT Done configuring Kerberos KDC (krb5kdc). The ipa-pkinit-manage command was successful
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you are using an IdM CA, the command requests a PKINIT KDC certificate from the CA.