Kerberos is a network authentication protocol based on symmetric key cryptography. It is a client-server based model that provides mutual authentication. It requires a trusted third party called the Key Distribution Center (KDC), which in turn consists of an Authentication Server (AS) and Ticket Granting Server (TGS). A Kerberos "realm" consists of Kerberos principals and services that are registered within a Kerberos server.
Windows Active Directory (AD), along with LDAP, also provides Kerberos services. Windows AD forest supports multiple domains and each of them can constitute of a Kerberos realm. The multiple domains may be divided based on business unit, geography, and other variables.
There are several advantages to having multiple realms. They are:
The scope of this article is to configure AIX as a Kerberos client to multiple Kerberos realms hosted on a Windows AD server. It is assumed that the reader of this article has a medium to high level of knowledge of the Kerberos protocol and Windows Active Directory.
The steps described in this article have been tested with Microsoft Windows 2003 AD server as Kerberos servers and IBM NAS 1.4.0.7 the as Kerberos client. The same steps should work with other versions of IBM NAS.
For information on setting up Microsoft Active Directory on Microsoft Windows Server 2003, refer to the relevant Microsoft Windows documentation. Here we configured an Active Directory forest containing a parent and child domain (refer above diagram). The Active Directory Domain is also referred as the Microsoft Kerberos Realm running on Microsoft Active Directory.
For example, the hostname should be "indus28.in.ibm.com".
Use the config.krb5 command to set up the Kerberos client on AIX.
1
2
3
4
|
config.krb5 -C -d (domain name ) -r (realm name) -c (windows server) -s (windows server) Ex:config.krb5 -C -d in.ibm.com -r SEC.IBM.COM -c ibmad2.sec.ibm.com -s ibmad2.sec.ibm.com |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
[libdefaults] default_realm = SEC.IBM.COM default_keytab_name = FILE:/etc/krb5/krb5.keytab default_tkt_enctypes = des-cbc-md5 des-cbc-crc default_tgs_enctypes = des-cbc-md5 des-cbc-crc [realms] SEC.IBM.COM = { kdc = ibmad2.sec.ibm.com:88 admin_server = ibmad2.sec.ibm.com:749 default_domain = in.ibm.com } IBM.COM = { kdc = ibmad1.ibm.com:88 admin_server = ibmad1.ibm.com:749 default_domain = in.ibm.com } [domain_realm] .in.ibm.com = SEC.IBM.COM ibmad2.sec.ibm.com = SEC.IBM.COM ibmad1.ibm.com = SEC.IBM.COM [logging] kdc = FILE:/var/krb5/log/krb5kdc.log admin_server = FILE:/var/krb5/log/kadmin.log default = FILE:/var/krb5/log/krb5lib.log |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
|
KRB5A: program = /usr/lib/security/KRB5A options = authonly KRB5Afiles: options = db=BUILTIN,auth=KRB5A Note: For AIX 6.1 TL02 onwards add the Kerberos stanza as below: KRB5: program = /usr/lib/security/KRB5 options = authonly,is_kadmind_compat=no KRB5files: options = db=BUILTIN,auth=KRB5 |
For example, in this case a username, indus28, is created on the AD as the Kerberos client is being configured on indus28.in.ibm.com. While creating a user, you will be asked for information such as password. Provide a valid password for the username.
On the Active Directory server, do the following:
Use the Active Directory Management tool to create a new user corresponding to the AIX Kerberos client machine indus28.in.ibm.com.
1
2
3
4
5
6
7
8
9
10
|
ktpass -princ host/indus28.in.ibm.com@SEC.IBM.COM -mapuser indus28 -pass 123 -out indus28.keytab -ptype KRB5_NT_PRINCIPAL Ktpass: -princ user@realm , The user will be the aix client box, so in our case it will be indus28. in.ibm.com, this has to be full domain name -mapuser : The user name will be indus28 -pass provide the password or * if you want it to prompt for password -out , the name of output keytab file. |
Securely transfer the indus28.keytab file to the AIX Kerberos client indus28.in.ibm.com.
1
2
3
4
5
|
ktpass.exe -princ host/indus28.in.ibm.com@IBM.COM -mapuser indus28_ibm -pass 123 -out indus28_ibm.keytab -ptype KRB5_NT_PRINCIPAL Note: The map user is indus28_ibm and the keytab is indus28_ibm.keytab and the princ name is again host/indus28.in.ibm,com |
Securely transfer the indus28_ibm.keytab file to the AIX Kerberos client.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
#/usr/krb/sbin/ktutil ktutil: rkt /usr/krb/sbin/indus28.keytab ktutil: wkt /etc/krb5/krb5.keytab ktutil: q # /usr/krb5/bin/klist -ke Keytab name: FILE:/etc/krb5/krb5.keytab KVNO Principal ---- --------- 18 host/indus28.in.ibm.com@SEC.IBM.COM (ArcFour with HMAC/md5) #/usr/krb5/sbin/ktutil ktutil: rkt /usr/krb/sbin/indus28_ibm.keytab ktutil: wkt /etc/krb5/krb5.keytab ktutil: q #/usr/krb5/bin/klist -ke Keytab name: FILE:/etc/krb5/krb5.keytab KVNO Principal ---- --------- 18 host/indus28.in.ibm.com@SEC.IBM.COM (ArcFour with HMAC/md5) 4 host/indus28.in.ibm.com@IBM.COM (ArcFour with HMAC/md5) |
1
2
|
#mkuser -R KRB5Afiles registry= KRB5Afiles SYSTEM= KRB5Afiles foo #mkuser -R KRB5Afiles registry= KRB5Afiles SYSTEM= KRB5Afiles foo1 |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
# /usr/krb5/bin/kinit foo1 Password for foo1@SEC.IBM.COM: # /usr/krb5/bin/klist Ticket cache: FILE:/var/krb5/security/creds/krb5cc_0 Default principal: foo1@SEC.IBM.COM Valid starting Expires Service principal 02/27/08 15:29:37 02/28/08 01:29:40 krbtgt/SEC.IBM.COM@SEC.IBM.COM Renew until 02/28/08 15:29:37 # /usr/krb5/bin/kinit foo@IBM.COM Password for foo@IBM.COM: # /usr/krb5/bin/klist Ticket cache: FILE:/var/krb5/security/creds/krb5cc_0 Default principal: foo@IBM.COM Valid starting Expires Service principal 02/27/08 15:29:49 02/28/08 01:29:49 krbtgt/IBM.COM@IBM.COM Renew until 02/28/08 15:29:49 |
Article Number: 277
Posted: Mon, Jun 25, 2018 3:16 PM
Last Updated: Mon, Jun 25, 2018 3:16 PM
Online URL: http://kb.ictbanking.net/article.php?id=277