Set Up Keytab Authentication Using the Default Keytab and a Principal Other than the CA IAM CS Host Principal
To specify keytab authentication using the default keytab and a principal other than the CA IAM CS host principal, you can add keytab entries for the principal to the keytab file.
To specify keytab authentication using the default keytab and a principal other than the CA IAM CS host principal
kadmin: ktadd principal
Note: This creates a new randomized password for the target principal, therefore any entries for the target principal in any existing keytab file are no longer valid.
kadmin: ktadd -k temp_keytab principal
Note: This creates a new randomized password for the target principal, thus any entries for the target principal in any existing keytab file are no longer valid.
ktutil: read_kt temp_keytab
ktutil: read_kt /etc/krb5/krb5.keytab
ktutil: write_kt /etc/krb5/krb5.keytab
The temporary keytab file is merged into the target keytab file you want to use.
Note: Make sure that the entries for the target principal are the same, and are the latest key version number.
ktutil: read_kt /etc/krb5/krb5.keytab
ktutil: addent -password -p principal -k kvno -e enctype
ktutil adds the entries to the default keytab file.
Note: Ensure you add all keys for the principal, and that all resulting entries for the principal are the same and latest key version number.
ktutil: list
ktutil: write_kt /etc/krb5/krb5.keytab
Note: Use * to specify all privileges.
The Kerberos Connector uses the keytab you specified for authentication.
Copyright © 2013 CA.
All rights reserved.
|
|