Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
Configuring the Kerberos Service (Task Map)
Configuring Additional Kerberos Services (Task Map)
Configuring KDC Servers
Configuring Cross-Realm Authentication
Configuring Kerberos NFS Servers
Configuring Kerberos Clients
Synchronizing Clocks Between KDCs and Kerberos Clients
Swapping a Master KDC and a Slave KDC
Administering the Kerberos Database
Managing a KDC on an LDAP Directory Server
Increasing Security on Kerberos Servers
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
|
Configuring Kerberos Network Application Servers
Network application servers are hosts that provide access using one or more of
the following network applications: ftp, rcp, rlogin, rsh, ssh, and telnet. Only a
few steps are required to enable the Kerberos version of these commands on
a server.
How to Configure a Kerberos Network Application ServerThis procedure uses the following configuration parameters:
Application server = boston
admin principal = kws/admin
DNS domain name = example.com
Realm name = EXAMPLE.COM
Before You BeginThis procedure requires that the master KDC has been configured. To fully test
the process, several Kerberos clients must be configured.
- (Optional) Install the NTP client or another clock synchronization mechanism.
See Synchronizing Clocks Between KDCs and Kerberos Clients for information about NTP.
- Add principals for the new server and update the server's keytab.
The following command reports the existence of the host principal: boston # klist -k |grep host
4 host/[email protected]
4 host/[email protected]
4 host/[email protected]
4 host/[email protected] If the command does not return a principal, then create new principals using
the following steps. How to use the Graphical Kerberos Administration Tool to add a principal is
explained in How to Create a New Kerberos Principal. The example in the following steps shows how to
add the required principals using the command line. You must log in with
one of the admin principal names that you created when configuring the
master KDC. boston # /usr/sbin/kadmin -p kws/admin
Enter password: <Type kws/admin password>
kadmin:
- Create the server's host principal.
kadmin: addprinc -randkey host/boston.example.com
Principal "host/boston.example.com" created.
kadmin:
- Add the server's host principal to the server's keytab.
If the kadmin command is not running, restart it with a command similar
to the following: /usr/sbin/kadmin -p kws/admin kadmin: ktadd host/boston.example.com
Entry for principal host/boston.example.com with kvno 3, encryption type AES-256 CTS mode
with 96-bit SHA-1 HMAC added to keytab WRFILE:/etc/krb5/krb5.keytab.
Entry for principal host/boston.example.com with kvno 3, encryption type AES-128 CTS mode
with 96-bit SHA-1 HMAC added to keytab WRFILE:/etc/krb5/krb5.keytab.
Entry for principal host/boston.example.com with kvno 3, encryption type Triple DES cbc
mode with HMAC/sha1 added to keytab WRFILE:/etc/krb5/krb5.keytab.
Entry for principal host/boston.example.com with kvno 3, encryption type ArcFour
with HMAC/md5 added to keytab WRFILE:/etc/krb5/krb5.keytab.
Entry for principal host/boston.example.com with kvno 3, encryption type DES cbc mode
with RSA-MD5 added to keytab WRFILE:/etc/krb5/krb5.keytab.
kadmin:
- Quit kadmin.
kadmin: quit
|