Solaris 9 Cross Realm Authentication Problems
Douglas E. Engert
deengert at anl.gov
Mon Apr 4 10:08:50 EDT 2005
Markus Moeller wrote:
> Has anybody tried to centralise the .k5login by storing this information in
> ldap ?
Not, sure, but a good idea. A related way to do this is to use
the auth_to_local = option in the [realms] secion of the krb5.conf
If all your users from one realm SAMPLE1.COM) are trusted as local
in realm (SAMPLE2.COM), then you could so something like:
[realms]
SAMPLE1.COM = {
kdc= ...
}
SAMPLE2.COM = {
kdc = ...
auth_to_local = RULE:[1:$1@$0](^.*@SAMPLE1.COM$)s/@SAMPLE1.COM//
auth_to_local = default
}
This tells sample2 servers to treat any User at SAMPLE1.COM principals
as User.
>
> Thanks
> Markus
>
> "Jeffrey Hutzelman" <jhutz at cmu.edu> wrote in message
> news:7B1894BF811333D1C3B83881 at sirius.fac.cs.cmu.edu...
>
>>
>>On Friday, April 01, 2005 11:33:08 PM -0800 Darren Hoch
>><darren.hoch at litemail.org> wrote:
>>
>>
>>>Hello All,
>>>
>>>Thanks Jeffery. I deleted the old krbtgt principals and added the
>>>following on each host:
>>>
>>>krbtgt/EXAMPLE.COM at EXAMPLE1.COM
>>>krbtgt/EXAMPLE1.COM at EXAMPLE.COM
>>>
>>>I am almost there. When user darren now tries to telnet (kerberized) from
>>>a host in realm EXAMPLE.COM to a host in EXAMPLE1.COM, the credentials
>>>and encryption are accepted, however, I am still prompted for a password
>>>for the user darren in realm EXAMPLE1.COM. Shoud I be prompted, or should
>>>I be able to do single sign on?
>>
>>It sounds like now you are successfully authenticating to the telnet
>>server, and the authorization check is failing. This is not surprising,
>>since the default policy only allows you to log in as user 'foo' if you
>>are authenticated as the principal 'foo at LOCAL.REALM'. You can override
>>the local policy for a given user by giving that user a .k5login file
>>listing the principals who are allowed to log in as him. For example, you
>>could give 'darren' a .k5login file containing the following two lines:
>>
>>darren at EXAMPLE.COM
>>darren at EXAMPLE1.COM
>>
>>
>>-- Jeffrey T. Hutzelman (N3NHS) <jhutz+ at cmu.edu>
>> Sr. Research Systems Programmer
>> School of Computer Science - Research Computing Facility
>> Carnegie Mellon University - Pittsburgh, PA
>>
>>________________________________________________
>>Kerberos mailing list Kerberos at mit.edu
>>https://mailman.mit.edu/mailman/listinfo/kerberos
>>
>
>
>
>
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
>
--
Douglas E. Engert <DEEngert at anl.gov>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
More information about the Kerberos
mailing list