Hi Sonja,

I am not too sure I understand what you are getting at here.

Why can't the user access the KDC for realm B? Is there a network access issue?

If there is network access then you can certainly use the KDC from realm B.

The rest of this email assumes there is network access to realm B.

If you are using kinit, then you will have to set up your kerberos 
configuration files to define the KDC for realm B. This is trivial if the 
system you wish to run kinit on does not use kerberos. In which case after 
setting up the configuration files you can just use kinit on this system as you 
would for any system using realm B to authenticate.

If  you have configuration files that exist and define realm A, it is more 
complicated but you could try experimenting.  You can define realm B separately 
in the configuration files. I have done this for use with kadmin quite 
recently.  Many years ago, before adopting the MIT version of kerberos, I used 
to use kinit in to authenticate in differing remote realms regularly. Try it 
with a simple test, here are the steps to follow:
1. In your configuration files you need a separate realm paragraph defining the 
kdc for the remote realm and you possibly need the admin server of realm B 
defined for changes of password. Duplicate the paragraph defining realm A, in 
this duplicate paragraph change all references from realm A to realm B and 
references from realm A's servers to realm B's servers. For argument's sake:
         REALMA.COM = {
                 kdc = realmAadminsrv
                 admin_server = realmAadminsrv
                 kpasswd_server = realmAadminsrv:750
                 kadmind_port = 749
                 kpasswd_port = 750
        }
         REALMB.COM = {
                 kdc = realmBadminsrv
                 admin_server = realmBadminsrv
                 kpasswd_server = realmBadminsrv:750
                 kadmind_port = 749
                 kpasswd_port = 750
        }
    Don't worry if your realm definitions are different, it is an adaption of a 
quite ancient configuration, it is merely an illustration of what I said in the 
previous paragraph.
2. Then use kinit with a valid principal name for realm B. Remember you must 
define your principal name fully to include the domain name of realm B. That is:
     kinit <validPrincipal>@REALMB.COM

Good luck,

Jeremy



Sonja Benz wrote:
> Hello,
>
> my example may be uncommon, but imagine an application which is not
> kerberized
> wants to use the passwords of a  KDC for user authentication.
> To make the situation even more special, assume the principal is stored in
>
> a KDC which only can be accessed via cross realm trust.
>
>     ------------                               ------------
>     KDC A                                  KDC B
>     Realm: A.COM<---trust --->   Realm: B.COM
>     ------------                               ------------
>
>     --------------
>     host.other.com
>     --------------
>
> Let the application be kinit, for example:
>
> Now, assume the user's password is stored in realm B.COM and the user at
> host.other.com is only able to access KDC A. Is it possible to get
>
>          host.other.com: $ kinit [email protected]
>
> working?
>
> Sonja
> ________________________________________________
> Kerberos mailing list           [email protected]
> https://mailman.mit.edu/mailman/listinfo/kerberos
>

________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to