Streamlining host principal keytab provisioning?

Sebastian Galiano Sebastian.Galiano at spilgames.com
Thu May 3 04:09:47 EDT 2012


First I will like to add a user to the ADMIN ACL , for that purpose I modified the remctl.conf and substituted each line with ANYUSER for  the path to a ACL file.

 I will like to add only one user to the acl. I tried to write directly the username at realm  in the file without  success. Could you tell me what is the format in which I should write the ACL file?
________________________________________
From: Russ Allbery [rra at stanford.edu]
Sent: 02 May 2012 18:15
To: Sebastian Galiano
Cc: Jeff Blaine; kerberos at mit.edu
Subject: Re: Streamlining host principal keytab provisioning?

Sebastian Galiano <Sebastian.Galiano at spilgames.com> writes:

> Ok, as you pointed I didnt had a principal for the wallet server (it is
> also the kdc server). Adding the principal solved that problem. Now to
> the same command:

> $wallet -f keytab  get keytab nfs/hostname.REALMNAME
> wallet: username at REALMNAME not authorized to create keytab:nfs/host.REALMNAME

That's an error from the wallet server, not from remctld or from Kerberos.
wallet doesn't pay any attention to the kadmin ACLs; it maintains its own
database of objects and ACLs for who can download them.  So you have to
either set up autocreation (see the Wallet::Config man page or perldoc
under "DEFAULT OWNERS"), or you need to pre-create the object as a user
listed in the ADMIN ACL.  For example:

    wallet create keytab nfs/<fqdn>
    wallet acl create user/<username> krb5 <username>@<realm>
    wallet owner keytab nfs/<fqdn> user/<username>

wallet show keytab nfs/<fqdn> will show you the existing wallet record for
that particular object.

--
Russ Allbery (rra at stanford.edu)             <http://www.eyrie.org/~eagle/>



More information about the Kerberos mailing list