mod_auth_kerb realm stripping
Chris Cowley
chriscowleysound at googlemail.com
Tue Oct 13 12:28:15 EDT 2009
Hello all
I am trying to tweak my mod_auth_kerb setup. Currently it works
nicely, I am able to authenticate to web pages on our intranet and
everything is dandy.
The problem I am having is the contents of Apache's REMOTE_USER
variable. Currently it has my REALM on the end, which I do not want. I
have upgraded to mod_auth_kerb 5.4 which introduced an
"KrbLocalUserMapping" option. As you can see in the log below it
rewriting my principal, but then I am not found in AD. the value I am
being re-written to matches my sAMAccount name, so it should be found.
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1578): [client
172.19.77.8] kerb_authenticate_user entered with user (NULL) and
auth_type Kerberos
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1213): [client
172.19.77.8] Acquiring creds for HTTP/svn.snellwilcox.local
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1335): [client
172.19.77.8] Verifying client data using KRB5 GSS-API
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1351): [client
172.19.77.8] Client didn't delegate us their credential
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1370): [client
172.19.77.8] GSS-API token of length 161 bytes will be sent back
[Tue Oct 13 17:13:26 2009] [debug] src/mod_auth_kerb.c(1484): [client
172.19.77.8] kerb_authenticate_a_name_to_local_name
ChrisCowley at SNELLWILCOX.LOCAL -> ChrisCowley
[Tue Oct 13 17:13:26 2009] [debug] mod_authnz_ldap.c(561): [client
172.19.77.8] ldap authorize: Creating LDAP req structure
[Tue Oct 13 17:13:26 2009] [debug] mod_authnz_ldap.c(573): [client
172.19.77.8] auth_ldap authorise: User DN not found, User not found
http.conf:
AuthType Kerberos
AuthName "Subversion - use your SNELLWILCOX domain login (as
used to log in to Windows"
Krb5Keytab /etc/kerberos/svn.keytab
KrbVerifyKDC On
KrbMethodNegotiate On
KrbMethodK5Passwd On
KrbAuthRealms SNELLWILCOX.LOCAL
KrbLocalUserMapping on
AuthLDAPBindDN <binddn>
AuthLDAPBindPassword <password>
AuthLDAPURL
ldap://<windoze_dn>/OU=SnellWilcox,DC=snellwilcox,DC=local?userPrincipalName,sAMAccountName,mail,displayname,cn?sub?(objectClass=*)
require ldap-attribute
msSFU30PosixMemberOf="CN=SG_Linux_CVS_IT,OU=Linux Authentication
Groups,OU=Security Groups,OU=SnellWilcox,DC=snellwilcox,DC=local"
More information about the Kerberos
mailing list