Load Balancing KCDs
Jonathan Towles
jjtowles at synterex.com
Thu Feb 18 16:53:19 EST 2021
Yeah I saw this also.
>From what I've read holistically, Putting your DCs behind a VIP tends to be problematic because the member server name doesn't match the name of the SPN thus it becomes vehemently unhappy.
I suppose you could possibly build an ASA similar to how you do Kerberos with Exchange and try to leverage that but I've read/heard there's a ton of reliability issues and you should just rely on the krb5.conf like:
[realms]
ATHENA.MIT.EDU = {
kdc = kerberos.mit.edu
kdc = kerberos-1.mit.edu
kdc = kerberos-2.mit.edu:750
admin_server = kerberos.mit.edu
master_kdc = kerberos.mit.edu
default_domain = mit.edu
Jon Towles
CTO, Synterex
(m) 978-609-5545
-----Original Message-----
From: Robbie Harwood <rharwood at redhat.com>
Sent: Thursday, February 18, 2021 4:48 PM
To: Jonathan Towles <jjtowles at synterex.com>; kerberos at mit.edu
Subject: Re: Load Balancing KCDs
Jonathan Towles <jjtowles at synterex.com> writes:
> Does anyone have experience putting DCs behind a network load balancer
> for Kerberos Authentication?
>
> Depending on who you ask, it doesn't really work. I wanted to ask the
> group to see if anyone has strong experience in doing it and if it's
> feasible?
I usually refer to Simo's post on this:
https://ssimo.org/blog/id_019.html
Thanks,
--Robbie
More information about the Kerberos
mailing list