Streamlining host principal keytab provisioning?
Sebastian Galiano
Sebastian.Galiano at spilgames.com
Thu May 3 04:09:47 EDT 2012
First I will like to add a user to the ADMIN ACL , for that purpose I modified the remctl.conf and substituted each line with ANYUSER for the path to a ACL file.
I will like to add only one user to the acl. I tried to write directly the username at realm in the file without success. Could you tell me what is the format in which I should write the ACL file?
________________________________________
From: Russ Allbery [rra at stanford.edu]
Sent: 02 May 2012 18:15
To: Sebastian Galiano
Cc: Jeff Blaine; kerberos at mit.edu
Subject: Re: Streamlining host principal keytab provisioning?
Sebastian Galiano <Sebastian.Galiano at spilgames.com> writes:
> Ok, as you pointed I didnt had a principal for the wallet server (it is
> also the kdc server). Adding the principal solved that problem. Now to
> the same command:
> $wallet -f keytab get keytab nfs/hostname.REALMNAME
> wallet: username at REALMNAME not authorized to create keytab:nfs/host.REALMNAME
That's an error from the wallet server, not from remctld or from Kerberos.
wallet doesn't pay any attention to the kadmin ACLs; it maintains its own
database of objects and ACLs for who can download them. So you have to
either set up autocreation (see the Wallet::Config man page or perldoc
under "DEFAULT OWNERS"), or you need to pre-create the object as a user
listed in the ADMIN ACL. For example:
wallet create keytab nfs/<fqdn>
wallet acl create user/<username> krb5 <username>@<realm>
wallet owner keytab nfs/<fqdn> user/<username>
wallet show keytab nfs/<fqdn> will show you the existing wallet record for
that particular object.
--
Russ Allbery (rra at stanford.edu) <http://www.eyrie.org/~eagle/>
More information about the Kerberos
mailing list