Annotation of wikisrc/kerberos/system.mdwn, revision 1.11

1.1       schmonz     1: [[!tag kerberos howto]]
                      2: 
1.8       wiki        3: ## Why enable Kerberos on your system?
1.1       schmonz     4: 
1.2       schmonz     5: Convenience and security. With
                      6: [Kerberos](http://web.mit.edu/Kerberos/dialogue.html), a single
1.3       wiki        7: login grants access to all NetBSD web services. Configuration is easy
                      8: and you only have to do it once (sometimes less).
1.1       schmonz     9: 
1.5       schmonz    10: 
1.8       wiki       11: ## NetBSD
1.1       schmonz    12: 
1.2       schmonz    13: NetBSD needs to be configured to prevent Kerberos from being used
                     14: to log into _your_ system, and then to enable Kerberos.
1.1       schmonz    15: 
1.2       schmonz    16: 7. Either disable Kerberos auth for `sshd`, `login`, etc. in
1.4       wiki       17: `/etc/pam.d`, or tell your relevant services not to use PAM.
                     18: 
                     19:    /!\ Disabling KerberosAuthentication in `/etc/ssh/sshd_config` does **NOT** prevent `sshd` from invoking `pam_krb5.so` and prompting for a Kerberos password -- oops. Since you probably do not have a host key in the realm NETBSD.ORG you have little to fear from ssh's KerberosAuthentication method -- nothing can get tickets to use your machine, because there is no host instance for your machine shared between the NetBSD kerberos server and your local keytab. So, the bottom line: turn off UsePAM for `sshd` or adjust your PAM configuration; don't worry about KerberosAuthentication or GSSAPIAuthentication in `sshd` itself.
                     20: 
1.1       schmonz    21: 7. Create `/etc/krb5.conf` containing only the line `[libdefaults]`.
                     22: 
1.2       schmonz    23: NetBSD will now autodiscover and uses the NETBSD.ORG KDC as defined
                     24: in DNS. To use Kerberized TNF services, log in with your Kerberos
                     25: [[password]]:
1.1       schmonz    26: 
1.9       schmonz    27:     $ kinit <username>@NETBSD.ORG
1.1       schmonz    28: 
                     29: The right-hand side is a Kerberos realm, not a DNS domain. Case is significant!
1.3       wiki       30: 
1.8       wiki       31: 
1.9       schmonz    32: ## Mac OS X
1.8       wiki       33: 
                     34: OS X autodiscovers and uses the NETBSD.ORG KDC as defined in DNS.
                     35: To use Kerberized TNF services, log in with your Kerberos [[password]]:
                     36: 
1.11    ! wiki       37: 7. Launch the `Ticket Viewer.app` from `/System/Library/CoreServices`
1.8       wiki       38: 
1.11    ! wiki       39: 7. Press the "Add Identity" button
1.8       wiki       40: 
1.11    ! wiki       41: 7. In the identity field enter your `<username>@NETBSD.ORG`
1.8       wiki       42: 
1.11    ! wiki       43:     The right-hand side is a Kerberos realm, not a DNS domain. *Case is significant!*
1.8       wiki       44: 
1.11    ! wiki       45: 7. Enter the password associated with this identity in the password field
1.8       wiki       46: 
1.11    ! wiki       47:    By default Ticket Viewer.app will save password details in keychain, un-tick "Remember password in my keychain" if this is not desired behaviour
1.8       wiki       48: 
1.11    ! wiki       49: 7. Press continue
1.10      wiki       50: 
1.11    ! wiki       51: If successful, you'll be returned to the main window with a new entry below the icons containing `<username>@NETBSD.ORG` and the date and time which the ticket obtained is due to expired.
1.8       wiki       52: 
                     53: ## Windows XP
1.3       wiki       54: 
1.9       schmonz    55: Windows does not provide an easy way to configure and use KDCs
                     56: different from the one embedded into an Active Directory.
1.4       wiki       57: 
1.9       schmonz    58: Therefore, to use [[Kerberos]], you should follow the following
                     59: steps:
1.4       wiki       60: 
1.9       schmonz    61: 7. Download the
                     62:    [MIT Kerberos for Windows](http://web.mit.edu/Kerberos/dist/#kfw-3.2)
                     63:    installer. It is composed of different tools traditionally found
                     64:    with Kerberos distributions, like
                     65:    [[!template id=man name=kinit section=1]] or
                     66:    [[!template id=man name=klist section=1]], and a Network Identity
                     67:    Manager, an application used to manage credential caching of
                     68:    Kerberos tickets.
                     69: 
                     70: 7. Install the package. Use the default provided options, then
                     71:    restart the computer.
                     72: 
                     73: 7. The Network Identity Manager
                     74:    [(PDF)](http://web.mit.edu/kerberos/kfw-3.2/kfw-3.2.2/netidmgr_userdoc.pdf)
                     75:    should automatically start when you login. As there is no principal
                     76:    currently configured, it should open a dialog box to obtain the
                     77:    new credentials.
1.4       wiki       78: 
                     79: 7. Enter your principal:
                     80: 
1.9       schmonz    81:     Username: <username>
                     82:     Realm: NETBSD.ORG
1.3       wiki       83: 
1.9       schmonz    84: 7. Click `Ok`. After a few seconds, it should obtain the TGT for
                     85:    you from the NETBSD.ORG KDC.

CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb