How to Configure Kerberos Clients Using AI
Ensure that your role has the appropriate rights profiles to perform this procedure. See Using Rights Profiles to Install Oracle Solaris.
In this procedure, the keytab file for the Kerberos client has already been created and stored on the AI server. In the examples use auto-registration to configure Kerberos clients by using preexisting credentials or using new principals. The auto-registration process is simpler because you do not have to create and encode keytab files for individual Kerberos clients.
Example 5-6 Downloading Existing Keys While Deploying Kerberos Clients
Note that using auto-registration only works if the KDC is either an Oracle Solaris KDC or an MS AD. If the KDC is MIT, Heimdal or Shishi, only pre-generated keytab transfer is possible.
In order to use auto-registration to download existing keys, you must first have created an admin principal on the KDC with c
and i
administration privileges. In this example, the name of the principal is download/admin
.
In this example, the KDC is running Oracle Solaris. Also, the keys for the Kerberos client have already been created.
This example shows how to add the download/admin
principal when you are creating the system configuration profile for the Kerberos configuration file. The download/admin
principal is a special admin principal that is used to transfer existing keys from the KDC server when the Kerberos client is deployed.
$ kclient -x /root/krb-sc.xml Starting client setup --------------------------------------------------- Is this a client of a non-Solaris KDC ? [y/n]: n No action performed. Do you want to use DNS for Kerberos lookups ? [y/n]: n No action performed. Enter the Kerberos realm: EXAMPLE.COM Specify the master KDCs for the above realm using a comma-separated list: kdc.example.com Do you have any slave KDC(s) ? [y/n]: y Enter a comma-separated list of slave KDC host names: kdc2.example.com Do you have multiple domains/hosts to map to realm ? EXAMPLE.COM [y/n]: n No action performed. Should the client automatically join the realm ? [y/n]: y Enter the krb5 administrative principal to be used: download/admin Password for download/admin: xxxxxxxx Do you plan on doing Kerberized nfs ? [y/n]: n No action performed. Is this client a member of a cluster that uses a logical host name ? [y/n]: n No action performed. Do you have multiple DNS domains spanning the Kerberos realm EXAMPLE.COM ? [y/n]: n No action performed. Setting up /root/krb-sc.xml.
Example 5-7 Creating New Keys While Deploying Kerberos Clients
Note that using auto-registration only works if the KDC is either an Oracle Solaris KDC or an MS AD. If the KDC is MIT, Heimdal or Shishi, only pre-generated keytab transfer is possible.
In order to use auto-registration to download new keys, you must first have created an admin principal on the KDC
with a
, c
and i
administration privileges.
In this example, the name of the principal is create/admin
.
In this example, the KDC is running Oracle Solaris.
This example adds the create/admin
principal when you are creating the system configuration profile for the Kerberos configuration file.
The create/admin
principal is a special admin principal that is used to transfer new keys from the KDC server when the Kerberos client is deployed.
This command includes more options so fewer questions are asked.
$ kclient -x /root/krb-sc.xml -R EXAMPLE.COM -a create/admin -d none -m kdc.example.com Starting client setup --------------------------------------------------- Do you have multiple domains/hosts to map to realm ? EXAMPLE.COM [y/n]: n No action performed. Should the client automatically join the realm ? [y/n]: y Password for create/admin: xxxxxxxx Setting up /root/krb-sc.xml.
Example 5-8 Automatically Joining an Kerberos Client to a MS AD Domain
In this example, the Kerberos client is joining an AD domain. Use the following command to add the Administrator
principal when you are creating the system configuration profile for the Kerberos configuration file.
$ kclient -x /root/krb-sc.xml Starting client setup --------------------------------------------------- Is this a client of a non-Solaris KDC ? [y/n]: y Which type of KDC is the server: ms_ad: Microsoft Active Directory mit: MIT KDC server heimdal: Heimdal KDC server shishi: Shishi KDC server Enter required KDC type: ms_ad Should the client automatically join AD domain ? [y/n]: y Enter the Kerberos realm: EXAMPLE.COM Enter the krb5 administrative principal to be used: Administrator Password for Administrator: xxxxxxxx Setting up /root/krb-sc.xml.