[email protected] wrote:
> Hi All,
> 
> I'm trying to configure Kerberos clients on CentOS 5.2 to authenticate 
> against two AD forests.  Here's what I'm hoping to accomplish:
> 
> 
> -          Default Realm = REALM1.COM
> 
> -          Second Realm = REALM2.COM
> 
> -          [email protected] can authenticate as User1 or [email protected]
> 
> -          [email protected] can authenticate as [email protected]
> 
> -          REALM1.COM and REALM2.COM are stripped during auth so that 
> [email protected] or [email protected] are resolved to local UIDs User1 and 
> User2
> 
> I can run kinit to get a ticket for either realm.  I see the valid ticket 
> with klist.  I can authenticate as User1 or User2 against either realm when 
> it's set to the default realm.  I cannot login when the user string is 
> [email protected] or [email protected].  I get an error from PAM saying 
> "Invalid user [email protected]..." I think because PAM expects 
> [email protected] to be a local UID.
> 
> I've looked through the man pages and some other info online.  I think the 
> auth_to_local, auth_to_local_names, or auth_to_local_realm directives and/or 
> .k5login might be part of the solution, but the various configurations I've 
> tried have all failed with the PAM Invalid User error for fully qualified 
> user names.  Any suggestions and help would be greatly appreciated.
> 

What version of pam_krb5 are you using?
It may or may not accept a principal in place of a name. Some
versions of pam_krb5 can add an additional prompt to
prompt for the principal, so that the local user name does noit
have to match the principal, and can be fro a different realm.


Russ's version has the above feature and is in Debian:
     <http://www.eyrie.org/~eagle/software/pam-krb5/>

You also did not say if you created a host keytab and registered
the host in AD. pam_krb5 will try and get a service ticket
for the loccal host.






wil normally try and get a
> Here is my current simple krb5.conf:
> 
> [libdefaults]
>  clockskew     = 300
>  dns_lookup_realm = false
>  dns_lookup_kdc = true
>  default_realm = REALM1.COM
> 
> [appdefaults]
>  pam = {
>   ticket_lifetime    = 1d
>   renew_lifetime     = 1d
>   forwardable        = true
>   proxiable          = false
>   retain_after_close = false
>   minimum_uid        = 0
>  }
> 
> Thanks,
> 
> Jim Sifferle
> 
> 
> ________________________________________________
> Kerberos mailing list           [email protected]
> https://mailman.mit.edu/mailman/listinfo/kerberos
> 
> 

-- 

  Douglas E. Engert  <[email protected]>
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to