Set Up Keytab Authentication Using a Custom Keytab and a Principal Other than the CA IAM CS Host Principal
To specify keytab authentication using a keytab file other than the default keytab and a principal other than the CA IAM CS host principal, you can add entries for the desired principal to the desired keytab file.
To set up keytab authentication using a custom keytab and a principal other than the CA IAM CS host principal
kadmin: ktadd -k keytab principal
Note: This creates a new randomized password for the target principal, therefore any entries for the target principal in any existing keytab file are no longer valid.
kadmin: ktadd -k temp_keytab principal
Note: This creates a new randomized password for the desired principal, thus any entries for the desired principal in any existing keytab file are no longer valid.
ktutil: read_kt keytab
ktutil: read_kt temp_keytab
ktutil: write_kt keytab
The temporary keytab file is merged into the target keytab file you want to use.
Note: Make sure that the entries for the desired principal are the same, and are the latest key version number.
ktutil: read_kt /etc/krb5/krb5.keytab
ktutil: addent -password -p principal -k kvno -e enctype
ktutil adds the entries to the keytab file you want to use.
Note: Ensure you add all keys for the principal, and that all resulting entries for the principal are the same and latest key version number.
ktutil: list
ktutil: write_kt /etc/krb5/krb5.keytab
Note: Use * to specify all privileges.
The Kerberos Connector uses the keytab you specified for authentication.
Copyright © 2013 CA.
All rights reserved.
|
|