Hey,

We are trying to tidy things up with our administrator principles in
kerberos and AFS.
Rather than having our normal accounts in the AFS system:administrators
group, we thought it would be better to use the /admin principles we use in
Kerberos.
However, we are having some difficulties which seem to be caused by the
slashes in the principle names.

Both principles are in the system:administrators group  (this run when
authenticated as bobb.crosbie)

     bobb@ophelia:~$ pts membership bobb.crosbie
     Groups bobb.crosbie (id: 5021) is a member of:
      system:administrators

     bobb@ophelia:~$ pts membership bobb.crosbie/admin
     Groups bobb.crosbie/admin (id: 4021) is a member of:
      system:administrators

Both principles are also SUsers:

     bobb@ophelia:~$ bos listusers -server afs01
     bos: running unauthenticated
     SUsers are: admin bobb.crosbie bobb.crosbie/admin [....]


Authenticating as bobb.crosbie works fine:

     bobb@ophelia:~$ kdestroy; unlog; kinit bobb.crosbie; aklog
     Password for [email protected]:

     bobb@ophelia:~$ klist
     Ticket cache: FILE:/tmp/krb5cc_1000
     Default principal: [email protected]

     Valid starting     Expires            Service principal
     01/05/12 12:24:06  01/05/12 20:24:06  krbtgt/
[email protected]
         renew until 01/06/12 12:23:03
     01/05/12 12:24:06  01/05/12 20:24:06  afs/[email protected]
         renew until 01/06/12 12:23:03

     bobb@ophelia:~$ tokens
     Tokens held by the Cache Manager:

     User's (AFS ID 5021) tokens for [email protected] [Expires Jan  5
20:24]
       --End of list--


I can authenticate against kerberos as bobb.crosbie/admin

     bobb@ophelia:~$ kdestroy; unlog; kinit bobb.crosbie/admin; aklog;
klist; tokens
     Password for bobb.crosbie/[email protected]:

     bobb@ophelia:~$ klist
     Ticket cache: FILE:/tmp/krb5cc_1000
     Default principal: bobb.crosbie/[email protected]

     Valid starting     Expires            Service principal
     01/05/12 12:24:46  01/05/12 20:24:46  krbtgt/
[email protected]
         renew until 01/06/12 12:23:44
     01/05/12 12:24:46  01/05/12 20:24:46  afs/[email protected]
        renew until 01/06/12 12:23:44

But I don't seem to get a proper token from AFS - There's no: "(AFS ID
4021)" bit

     bobb@ophelia:~$ tokens
     Tokens held by the Cache Manager:

     Tokens for [email protected] [Expires Jan  5 20:24]
        --End of list--

And bobb.crosbie/admin doesn't have permission to look at group memberships

     bobb@ophelia:~$ pts membership bobb.crosbie/admin
     pts: Permission denied ; unable to get membership of
bobb.crosbie/admin (id: 4021)


Everything seems to work fine if we create another principle in kerberos
without the slash (bobbadmin, say), create that user user in pts and add it
to the system:administrators group.  The slash seems to be the only issue.

Any Ideas ?
Are users/principles with slashes supported ?  Or is it recommended to do
things another way ?
A number of documents (like this:
http://techpubs.spinlocksolutions.com/dklar/afs.html) suggest that slashes
are used.


Many Thanks,

- bobb

Reply via email to