<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    ivaneeo's blog

    自由的力量,自由的生活。

      BlogJava :: 首頁 :: 聯(lián)系 :: 聚合  :: 管理
      669 Posts :: 0 Stories :: 64 Comments :: 0 Trackbacks

    From a convenience perspective, I want to authenticate as infrequently as possible. However, security requirements suggest that I should be authenticated for all sorts of services. This means that Single Sign On and forwardable authentication credentials would be useful.

    Within an individual organisation at least, it is useful and fairly straightforward to have centralised control for authentication services. More and more authorisation and applications services are able to use centralised authentication services such as Kerberos.

    This document will demonstrate how to configure a machine running OpenSSH server to use GSSAPI so that users can log in if they have authorised kerberos tickets. This is not the place for extensive explanations about tickets or how to set up the Key Distribution Center(KDC) in the first place or how to build or install the necessary software on various different unixlike systems. Likely, your distribution's package management system can provide you with what you need.

    Kerberos

    All destination machines should have /etc/krb5.conf modified to allow forwardable tickets:

    [libdefaults]     default_realm = ALLGOODBITS.ORG     forwardable = TRUE [realms]     ALLGOODBITS.ORG = {                     kdc = kerberos.allgoodbits.org                     } 

    Using kadmin, create a principal for a user:

    kadmin> ank <username>@<REALM> 

    Here the process differs depending upon whether you're using MIT Kerberos (probably) or Heimdal.

    MIT

    Create a principal for the host:

    kadmin> ank -randkey host/<FQDN>@<REALM> 

    Extract the key for the host principal to a keytab file and locate it correctly on the ssh server:

    kadmin> ktadd -k /tmp/<FQDN>.keytab host/<FQDN> 

    Heimdal

    Create a principal for the host:

    kadmin> ank -r host/<FQDN>@<REALM> 

    Extract the key for the host principal to a keytab file and locate it correctly on the ssh server:

    kadmin> ext -k /tmp/<FQDN>.keytab host/<FQDN>@<REALM> 

    SSH

    Then we need to take the keytab file into which you extracted the key for the host principal and copy it to the location on the ssh server where sshd will look for it, probably /etc/krb5.keytab.

    We need to configure sshd_config(5). The important options start with GSSAPI, not to be confused with the Kerberos options which are merely for KDC-validated password authentication; the GSSAPI method allows authentication and login based upon existing tickets. In other words, the "Kerberos" method requires you to enter your password (again), GSSAPI will allow login based on upon the tickets you already have.

    sshd_config:

    GSSAPIAuthentication yes GSSAPICleanupCredentials yes PermitRootLogin without-password 

    ssh_config:

    GSSAPIAuthentication yes GSSAPIDelegateCredentials yes 

    PAM

    Linux Pluggable Authentication Modules(PAM) provide a common framework for authentication/authorisation for applications.

    /etc/pam.d/common-account:

    account sufficient      pam_krb5.so     use_first_pass 

    /etc/pam.d/common-auth:

    auth    sufficient      pam_krb5.so     use_first_pass 

    /etc/pam.d/common-password:

    password        sufficient      pam_krb5.so 

    /etc/pam.d/common-session:

    session optional      pam_krb5.so 

    This is sufficient to allow OpenAFS based home directories because although AFS uses Kerberosv4, MIT Kerberos does 5 to 4 ticket conversion on the fly.

    Troubleshooting

    • As with anything concerned with kerberos, make sure you have NTP and DNS working properly before you even start.
    • ssh -v can give you a lot of valuable information.
    • read your logs.
    posted on 2013-10-12 18:12 ivaneeo 閱讀(319) 評論(0)  編輯  收藏 所屬分類: GNU牛力
    主站蜘蛛池模板: 亚洲色欲或者高潮影院| 婷婷精品国产亚洲AV麻豆不片| 亚洲码一区二区三区| 国产日韩一区二区三免费高清 | 日韩精品福利片午夜免费观着| 亚洲最新永久在线观看| 久久免费精彩视频| 亚洲国产国产综合一区首页| 无码精品国产一区二区三区免费| 精品国产亚洲一区二区三区| 免费视频成人手机在线观看网址| 色拍自拍亚洲综合图区| 国产在线jyzzjyzz免费麻豆| 亚洲日韩一区精品射精| 波多野结衣中文一区二区免费| 人妖系列免费网站观看| 亚洲AV无码乱码在线观看裸奔| 亚洲一区动漫卡通在线播放| 日韩吃奶摸下AA片免费观看| 亚洲.国产.欧美一区二区三区| 免费一级特黄特色大片在线观看| 国产精品福利在线观看免费不卡| 亚洲AV无码一区东京热久久| 国产在线观看麻豆91精品免费| 亚洲Aⅴ在线无码播放毛片一线天| 亚洲AV永久无码精品一区二区国产| fc2成年免费共享视频18| 亚洲va无码手机在线电影| 久久精品国产免费观看三人同眠| 国产成人亚洲综合网站不卡| 亚洲高清成人一区二区三区| 国产精品白浆在线观看免费| 亚洲中文字幕乱码AV波多JI| 亚洲第一黄片大全| 91成人在线免费观看| 亚洲AV无码一区二区三区牲色| 亚洲人成人网站色www| 歪歪漫画在线观看官网免费阅读| 搜日本一区二区三区免费高清视频| 亚洲AV无码一区二区二三区入口| 精品国产免费一区二区|