> > Firstly, have you created a valid kerberos principal
> > in the Solaris 9 KDC database for the ldap user in question ?
>
> The user has following DN:
> uid=bob,ou=people,ou=sale,ou=examplecity,dc=example,dc=com and the principal
> is bob/sale.examplecity.example.com.
> The mapping looks like
> dsmatching-pattern: ${Principal}
> dsmatching-regexp: (.*)/(.*).(.*)[EMAIL PROTECTED]
> dsmappeddn: uid=$1,ou=people,ou=$2,ou=$3,dc=example,dc=com
>

On the S9 KDC,
What does a #kadmin.local -q "getprinc [EMAIL PROTECTED]" reveal ?

If there is no principal for bob, you would need to do:

bash-2.05b# kadmin.local
Authenticating as principal root/[EMAIL PROTECTED] with password.
kadmin.local:  addprinc bob
<enter ldap pwd for bob>


> >
> > And for pam-kerberos to work correctly, you would need to setup
> > pam.conf correctly for the required service (which in this case
> > is login, I presume) on the client.
>
> I did that too. The lines for authentication look like
> (...)
> auth    sufficient    pam_unix.so likeauth nullok
> auth    sufficient pam_krb5.so use_first_pass
> (...)


If you want to authenticate using ldap, I think you would also
need a PAM ldap module on the stack, marked as
requisite/required.

And you might want to change the control flag for pam_unix
to 'required'/'requisite' (as the case maybe), since with 'sufficient'
if successful, it will return immediately without doing pam_krb5.

>
> I'm not sure if the thing with the host principal worked well. Do I always
> need a principal for the host and what's the easiest way to create a
> principal for a Linux box on a Solaris KDC?


Which pam-kerberos module are you using ?

If it does TGT verification you would need
the host svc principal in your local keytab
on the Linux box.

On the s9 KDC, do
bash-2.05b# kadmin.local
Authenticating as principal root/[EMAIL PROTECTED] with password.
kadmin.local:  addprinc -randkey host/<fqdn of client>

Add this principal to a tmp keytab on the KDC and securely transfer
this to your linux client.

Arun.

>
> Thanks for answers,
> Johannes
>
>
> ________________________________________________
> Kerberos mailing list           [EMAIL PROTECTED]
> https://mailman.mit.edu/mailman/listinfo/kerberos
>


________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to