Wes Modes wrote:
To clarify.To separate and modularize some of these services, we have three servers: A file server running Samba; A directory server running OpenLDAP to provide personal and group identities; and an authentication server running Kerberos (administered by another group). Samba connects to OpenLDAP through smbldap-tools. And OpenLDAP connects to the Kerberos server via SASL/GSSAPI.
smbldap-tools contacts the KDC (Kerberos server) and obtains a service ticket for the OpenLDAP server. In order for this to be possible there must be a service principal in the KDC database for the OpenLDAP service and a keytab containing the matching
key(s) must be installed on the OpenLDAP server.
The service ticket for the OpenLDAP server is used to authenticate the connection betweenWhen someone requests a Samba logon, Samba requests an LDAP bind, which in turn should use SASL to authenticate via Kerberos.
Samba and OpenLDAP.
The connection between Samba and OpenLDAP is working swell. It is theKerberos connection that has me flummoxed.
For what purpose is the OpenLDAP server communicating with the KDC?
kadmin.local is a version of the kadmin tool that works only on the local system.Simply put, OpenLDAP with SASL2 and GSSAPI support will be running on one server, while the Kerberos KDC will be running on another server. I haven't found any documents that address this not-so-wacky design.So when a document says, run kadmin.local,
If you are not on the local system you use the 'kadmin' tool.
You have to explain what you want in this forum as well, otherwise you won't getto generate a principle, that is not available to me. If I can ask specifically for what I want, I might be able to convince the kerberos administrators to do it for me, but I have to be pretty specific about what I want.
very many useful answers.
The docs I'm referring to are Cyrus SASL for System Administrators http://www.sendmail.org/~ca/email/cyrus/sysadmin.html <http://www.sendmail.org/%7Eca/email/cyrus/sysadmin.html>OpenLDAP 2.2 Administrator's Guide - Using SASLhttp://www.openldap.org/doc/admin22/guide.html#Using%20SASL Thank you for the OpenLDAP config suggestions. Those are more or lessconsistent with what I read.However, in several documents, it was suggested that before you try connecting OpenLDAP to Kerberos that you test to make sure your Kerberosconfiguration is working.
Again the question is connecting OpenLDAP to Kerberos for what purpose?The KDC is not under your control so you do not have the ability to create new
principals or alter the configurations of the existing ones. Are you really expecting the OpenLDAP server to establish a network channel with the KDC? What messages are you expecting to have sent? Or are you simply confused about the concept of a service principal and the associated key?
smime.p7s
Description: S/MIME Cryptographic Signature
________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos