Set Up Keytab Authentication Using the Default Keytab and a Principal Other than the CA IAM Connector Server Host Principal
To specify keytab authentication using the default keytab and a principal other than the CA IAM Connector Server host principal, you can add keytab entries for the principal to the keytab file.
To specify keytab authentication using the default keytab and a principal other than the CA IAM Connector Server host principal
kadmin: ktadd principal
Note: This creates a new randomized password for the target principal, therefore any entries for the target principal in any existing keytab file are no longer valid.
kadmin: ktadd -k temp_keytab principal
Note: This creates a new randomized password for the target principal, thus any entries for the target principal in any existing keytab file are no longer valid.
ktutil: read_kt temp_keytab
ktutil: read_kt /etc/krb5/krb5.keytab
ktutil: write_kt /etc/krb5/krb5.keytab
The temporary keytab file is merged into the target keytab file you want to use.
Note: Make sure that the entries for the target principal are the same, and are the latest key version number.
ktutil: read_kt /etc/krb5/krb5.keytab
ktutil: addent -password -p principal -k kvno -e enctype
ktutil adds the entries to the default keytab file.
Note: Ensure you add all keys for the principal, and that all resulting entries for the principal are the same and latest key version number.
ktutil: list
ktutil: write_kt /etc/krb5/krb5.keytab
Note: Use * to specify all privileges.
The Kerberos Connector uses the keytab you specified for authentication.
|
Copyright © 2014 CA.
All rights reserved.
|
|