Previous Topic: KDC Configuration on UNIX Example

Next Topic: Kerberos Configuration at the Policy Server on Windows Example


Kerberos Configuration at the Policy Server on UNIX Example

The following procedure shows an example of how to configure a Policy Server on a UNIX host to support SiteMinder Kerberos authentication.

Follow these steps:

  1. Create a user, for example, sol10psuser, with the same password used for creating a service account for the Policy Server host (sol10ps) in Active Directory.
  2. Add the host to the test.com domain and login to host with user sol10psuser.
  3. Install and configure SiteMinder Policy Server.
  4. Install and configure policy store directory services.
  5. Add a Host Configuration Object referencing the Solaris Policy Server.
  6. Add an Agent Configuration Object and add the following three new parameters:

Parameter

Value

KCCExt

.kcc

HttpServicePrincipal

Specify the web server principal name.

Example: HTTP/win2k8sps.test.com@TEST.COM

SmpsServicePrincipal

Specify the Policy Server principal name.

Example: smps@winps.test.com

  1. Create a user directory.
  2. Create a user, for example, testkrb, in the user directory.
  3. Configure a new Authentication Scheme using the SiteMinder Admin UI:
    1. Create the scheme using the custom template.
    2. Specify the SiteMinder Kerberos Authentication Scheme library.
    3. Select the parameter field and specify the following three semicolon-delimited values in the specified order:
      • Server name and target fields.
      • Policy Server principal name from the Windows 2003 Kerberos realm.
      • Mapping between the user principal and an LDAP search filter.

      Sample parameter field:

      http://sol10sunone.test.com/siteminderagent/Kerberos/creds.kcc;smps/sol10ps.test.com@TEST.COM;(uid=%{UID})
      
  4. Configure a policy domain.
  5. Add a realm to protect a resource using the Authentication Scheme.
  6. Add Rules and Policies to allow access for the user, testkrb.
  7. Configure a Kerberos configuration file (krb5.ini) and place krb5.ini in the /etc/krb5 system path.
  8. Use the ktutil utility to merge the keytab files (sol10ps_smps.keytab & sol10ps_host.keytab) containing the host principal and service principal names for the Policy Server host in the /etc/krb5.keytab file:
    ktutil: rkt sol10ps_host.keytab
    ktutil: wkt /etc/krb5.keytab
    ktutil: q
    ktutil: rkt sol10ps_smps.keytab
    ktutil: wkt /etc/krb5.keytab
    ktutil: q
    
  9. Verify the created krb5.keytab as follows:
    klist -k
    Keytab name: FILE:/etc/krb5.keytab
    KVNO Principal
    ---- --------------------------------------------------------------------------
       3 host/sol10ps.test.com@TEST.COM
       3 smps/sol10ps.test.com@TEST.COM
    
  10. Deploy the Windows 2003 KDC keytab file containing the host and Policy Server principal credentials to a secure location on the Policy Server.
  11. Verify that the following environment variable is set before starting the Policy Server:

    KRB5_CONFIG=/etc/krb5/krb5.conf

The Policy Server on a UNIX host is configured for Kerberos authentication.