Let me revisit the discussion about AD trusts and foreign users. I
authenticate to my AFS as a foreign user, [email protected], via the AD
trust that the AFS authentication domain, RESOURCE.NET, has with my
user-authentication domain, IU.EDU. aklog sets up the appropriate
foreign-realm group and user:
[root@afs1c afs]# pts listentries -groups -noauth
Name ID Owner Creator
system:administrators -204 -204 -204
system:backup -205 -204 -204
system:anyuser -101 -204 -204
system:authuser -102 -204 -204
system:ptsviewers -203 -204 -204
system:[email protected] -207 -204 2
[root@afs1c afs]# pts membership system:[email protected] -noauth
Members of system:[email protected] (id: -207) are:
[email protected]
[root@afs1c afs]# pts listentries -users -noauth
Name ID Owner Creator
anonymous 32766 -204 -204
afs 1 -204 32766
dantolov 2 -204 32766
[email protected] 1507121 -204 -204
and I get a normal-looking token as a foreign user:
[root@afs1c afs]# tokens
Tokens held by the Cache Manager:
User's (AFS ID 1507121) tokens for [email protected] [Expires Sep
15 19:08]
--End of list--
However, this does not let me touch the files in the cell. Trying to add
the foreign-realm group to the directory ACL, like this:
[root@afs1c afs]# fs setacl -dir /afs/afs1.bedrock.iu.edu -acl
system:[email protected] rlidwka
does not seem to work, and just adds the group system:authuser to the
ACL once more:
[root@afs1c afs]# fs listacl /afs/afs1.bedrock.iu.edu
Access list for /afs/afs1.bedrock.iu.edu is
Normal rights:
system:administrators rlidwka
system:authuser rlidwka
system:authuser rlidwka
system:anyuser rl
The documentation says that broadening the privileges of system:anyuser
grants access to foreign users, but that is too indiscriminate. Is there
a way to selectively assign access rights to foreign-realm groups?
Thanks,
Danko Antolovic
Andrew Deason wrote:
On Tue, 19 Jul 2011 13:52:08 -0400
"Danko Antolovic" <[email protected]> wrote:
[root@afs1c afs]# pts adduser -user dantolov -group system:[email protected]
-noauth
No, don't do this. In your setup, the _only_ user that will be
recognized as "dantolov" is someone that authenticates with the
principal [email protected], which, if I understand correctly, does
not exist, so there should not be a user called "dantolov" at all. The
user that authenticates via the kerberos principal [email protected] will
have the AFS PT name "[email protected]" if IU.EDU is not in krb.conf.
Predictably, when I authenticate as a foreign user (via trust), I can't
touch the files in /afs/afs1.bedrock.iu.edu
aklog is supposed to automatically create the user [email protected] and
add it to system:[email protected] for you; you don't need to do it
yourself. Does [email protected] exist? What does aklog say when you give
it the -d option when you authenticate with [email protected] ?
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info