Thanks to Jim Doyle at Boston University!

         Daniel

----- Forwarded message from Jim Doyle -----

Date: Wed, 22 Apr 1998 14:02:18 -0400 (EDT)
From: Jim Doyle <[EMAIL PROTECTED]>
To: "Daniel D. Arrasjid" <[EMAIL PROTECTED]>
Subject: Re: long running DCE jobs?

> We think this is a general problem for batch jobs that use k4/k5 and/or
> AFS/DFS services.  What have people been doing in the k4/k5/AFS/DFS
> space to deal with this problem?

> Outside of keytabs.  We're looking at creating a batch job wrapper
> which requires the username/password of the user, obtains the
> credential, and refreshes it for the duration of the process.
> Any thoughts?

Transarc has a tool that does this... Its called 'dce_refresh'. You can
feed it a cleartext password, or point it at a keytab. It establishes 
a new context & PAG, and keeps the password in memory... A thread runs
in the parent process that refreshes the DCE login context before
it expires.

If you want to pick up a copy, its in my AFS home directory:

        /afs/bu.edu/usr/it/jrd/work/Authentication/DCE/dce_login_refresh


I also have some other toys of interest to some people:


1. dce_login from DCE 1.2.2.  Takes the '-k <keytabfile>' option.

   directory: /afs/bu.edu/usr/it/jrd/work/Authentication/DCE/dce_login_keytab

   The latest Transarc DCE supplies this feature, older DCE implementations
   dont. If you need it, and dont have, this is it.

2. dce_mkacctskel, dce_setkrb5key   

   directory: /afs/bu.edu/usr/it/jrd/work/Authentication/DCE/dce_set_krb5_keys

   These are some simple tools that I've written... They basically get
   around a problem with dcecp insisting that you type the administrators
   password to a prompt for certain functions (i.e. creating a new acct,
   setting the password).

   dce_setkrb5key allows you to set the Kerberos V keystring value
   for a particulary account... This may be useful for people who have
   Kerberos 5 keys stored somewhere and wish to move them into DCE.

   We use this for our account administration infrastructure.. We convert
   passwords to AFS and Krb5 keys, pump them to DCE and AFS, and store
   copies in a very secure database.

   It could be easily adapted to accept cleartext passwords instead
   of hexadecimal strings representing a Krb5 Key.

3. afs_login_refresh, afs_login_keytab

   directory: /afs/bu.edu/usr/it/jrd/work/Authentication/AFS

   These are some AFS tools that I wrote, borrowing heavily from
   the Transarc 'dce_refresh' tool.

   afs_login_keytab basically establishes a PAG from a Krb4 srvtab file.
   afs_login_refresh uses the same srvtab files to refresh the AFS token
    just before it expires.

-- Jim


+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Jim Doyle                         Boston University   Information Technology
Systems Analyst/Programmer        email: [EMAIL PROTECTED]   Distributed Systems
http://www.bu.edu/~jrd/                               tel. (617)-353-8248
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+-+-+-


----- End of forwarded message from Jim Doyle -----

-- 
Daniel D. Arrasjid                   Computing and Information Technology
Voice: (716) 645-6153                State University of New York at Buffalo
Fax:   (716) 645-5972                301 Computing Center, Buffalo, NY 14260
E-Mail: [EMAIL PROTECTED]      WWW: http://www.acsu.buffalo.edu/~daniel
PGP public key: http://www.acsu.buffalo.edu/~daniel/key.html

Reply via email to