Greetings all: I have made significant progress, but have a few remaining questions. First, please take a look at these configs. Why must authmethod and krb5realm be explicitly defined in both pref and codaauth2 -- did I foul up a config somewhere, or perhaps dns? And is there no way to define the location of the -keytab krb5.conf declaration in a config (pref?), or perhaps a default location it looks for the keytab so that I can place the krb5.keytab there and omit the explicit declaration entirely?
[r...@sandbox1]# cat /vice/codaauth2.conf
4 {
authorities {
  coda.realm {
    authmethod = kerberos5
    methodopts {
      krb5realm = KERBEROS.REALM
    }
  }
}
}
[r...@sandbox1]# cat ~/.codafs/clog/pref
5 {
loginto = coda.realm
identities {
  coda.realm {
    desc = coda.realm
    identity = codaadmin/codaa...@coda.realm
    authmethod = kerberos5
    methodopts {
      krb5realm = KERBEROS.REALM
    }
  }
}
[r...@sandbox1]# clog -keytab ~/.codafs/clog/krb5.keytab

Regarding keytab auth, I found this site referring to kerberos _service_ principal keytab based afs auth (3rd paragraph from the top, under "Background" section): http://www.stanford.edu/services/kerberos/sysadmin/keytabs.html A service key would be ideal for my application. We are simply wanting to provide configuration data and some media content from our coda fileserver to an application on our application server. Having to deal with user names, passwords, password policies (and expiration!) simply adds unneeded head aches. Do you know of a way to swap out a kerberos user principal for a kerberos service principal for the purpose of coda user authentication?

Lastly, the following scripts/binaries are annoyingly interactive:
*) cocli
*) coser
*) createvol_rep Is there a automation friendly flag I can pass in to make unattended roll-outs possible? I don't want to have to resort to expect just to pass through a few [enter] key strokes.

Regards,
-Don
{void}

Regardless, I'll start converting my command line into codaauth2.conf (and perhaps .codafs/clog/pref if it's worth doing).

I have fixed the DNS SRV records, so the krb and tokens entries have been striken, however, it appears the following have to be in both codaauth2 and pref:
authmethod = kerberos5
methodopts { krb5realm = KERBEROS.REALM
methodopts { krb5service { coda/coda.realm NOTE: I know this syntax is incorrect, I'm simply displaying linear container hierarchy to provide scope for the end config option. Is there any way to push these settings to dns, or at least push them to codaauth2 only? I'm sure there is some distinction between codaauth2 and pref that I as yet do not understand. yes, I know coda/ is non-standard, and I wouldn't need it if I used codaauth, but I'd still like to know why this can't be set in codaauth2 and striken from pref. Most important, is it at all possible to define the keytab in codaauth2 or pref? Is there a default location that the keytab is looked for by clog?

Regards,
-Don
{void}


Reply via email to