cross domain trusts

Montenegro, Michael H (Michael) mhm4 at alcatel-lucent.com
Mon Apr 28 17:31:09 EDT 2008


I have a question regarding trusted AD domains (realms) with
mod_auth_kerb v5.3. I have reviewed the auth_mod_kerb site and checked
various forums but I couldn't locate a solution.

 

My environment:

Multiple Windows 2003 SP1 AD domains that are trusted between them.

MIT Kerberos 1.6.3

Apache 2.0.59

Mod_auth_kerb v5.3

 

The domain abc.domain.com has the HTTP service principle and I can
authenticate successfully all AD users in the abc.domain.com using a web
site protected by mod_auth_kerb. 

 

The problem is when a user in another domain, example xyz.domain.com
tries to access the site they are prompted with a login screen.

 

The apache log only shows:

[Fri Apr 25 12:28:41 2008] [debug] src/mod_auth_kerb.c(1485): [client
xxx.xxx.x.x] kerb_authenticate_user entered with user (NULL) and
auth_type Kerberos

 

However a successful connection to abc.domain.com shows:

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1485): [client
xxx.xxx.x.x] kerb_authenticate_user entered with user (NULL) and
auth_type Kerberos

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1485): [client
xxx.xxx.x.x] kerb_authenticate_user entered with user (NULL) and
auth_type Kerberos

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1172): [client
xxx.xxx.x.x] Acquiring creds for
HTTP/webserver.domain.com at ABC.DOMAIN.COM

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1316): [client
xxx.xxx.x.x] Verifying client data using KRB5 GSS-API

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1332): [client
xxx.xxx.x.x] Verification returned code 0

[Fri Apr 25 12:28:50 2008] [debug] src/mod_auth_kerb.c(1350): [client
xxx.xxx.x.x] GSS-API token of length 161 bytes will be sent back

 

 

My .htaccess:

AuthType Kerberos

AuthName "Kerberos Login"

KrbServiceName HTTP/webserver.domain.com at ABC.DOMAIN.COM

KrbMethodNegotiate on

KrbMethodK5Passwd on

KrbVerifyKDC on

Krb5Keytab /etc/krb5.keytab

KrbAuthRealms ABC.DOMAIN.COM XYZ.DOMAIN.COM

require valid-user

 

My /etc/krb5.conf:

[libdefaults]

 default_realm = ABC.DOMAIN.COM

 ticket_lifetime = 24000

 dns_lookup_realm = true

 dns_lookup_kdc = true

 

[realms]

 ABC.DOMAIN.COM = {

  kdc = ad1.abc.domain.com.:88

  kdc = ad1.abc.domain.com.:88

  admin_server = ad1.abc.domain.com.:464

  default_domain = abc.domain.com

 }

 

 XYZ.DOMAIN.COM = {

  kdc = ad1.xyz.domain.com.:88

  kdc = ad1.xyz.domain.com.:88

  admin_server = ad1.xyz.domain.com.:464

  default_domain = xyz.domain.com

 }

 

 

[domain_realm]

 .ad1.abc.domain.com = ABC.DOMAIN.COM

 ad1.abc.domain.com = ABC.DOMAIN.COM

 .ad1.xyz.domain.com = XYZ.DOMAIN.COM

 ad1.xyz.domain.com = XYZ.DOMAIN.COM

 

 

ON the webserver:

I can successfully  kinit user1 at XYZ.DOMAIN.COM

I can successfully kinit user2 at ABC.DOMAIN.COM

 

Do I need to have a HTTP service principle created on each AD domain? I
have also set the delegation on the AD service principle account to
"Trust this user for delegation to any service (Kerberos Only)"

The trust I have on the ABC.DOMAIN.COM is "Domains trusted by this
domain" :

Domain Name          Trust type   Transitive

XYZ.DOMAIN.COM  External      NO

 

Any help is greatly appreciated,

Michael

 

 




More information about the Kerberos mailing list