Annotation of wikisrc/kerberos/system.mdwn, revision 1.7

1.1       schmonz     1: [[!tag kerberos howto]]
                      2: 
1.3       wiki        3: #### Why enable Kerberos on your system?
1.1       schmonz     4: 
1.2       schmonz     5: Convenience and security. With
                      6: [Kerberos](http://web.mit.edu/Kerberos/dialogue.html), a single
1.3       wiki        7: login grants access to all NetBSD web services. Configuration is easy
                      8: and you only have to do it once (sometimes less).
1.1       schmonz     9: 
                     10: #### [[!toggle id="macosx" text="Mac OS X"]]
                     11: [[!toggleable id="macosx" text="""
1.2       schmonz    12: OS X autodiscovers and uses the NETBSD.ORG KDC as defined in DNS.
                     13: To use Kerberized TNF services, log in with your Kerberos [[password]]:
1.1       schmonz    14: 
                     15: `$ kinit <username>@NETBSD.ORG`
                     16: 
                     17: The right-hand side is a Kerberos realm, not a DNS domain. Case is significant!
1.5       schmonz    18: 
1.7     ! schmonz    19: ##### A Keychain.app trick
1.5       schmonz    20: 
                     21: To pop up a GUI password dialog:
                     22: 
                     23: `$ kinit <username>@NETBSD.ORG </dev/null`
                     24: 
1.6       schmonz    25: Check "Remember this password in my keychain" to make future Kerberos
1.7     ! schmonz    26: logins (sans input redirection) prompt-free.
1.1       schmonz    27: """]]
                     28: 
                     29: #### [[!toggle id="netbsd" text="NetBSD"]]
                     30: [[!toggleable id="netbsd" text="""
1.2       schmonz    31: NetBSD needs to be configured to prevent Kerberos from being used
                     32: to log into _your_ system, and then to enable Kerberos.
1.1       schmonz    33: 
1.2       schmonz    34: 7. Either disable Kerberos auth for `sshd`, `login`, etc. in
1.4       wiki       35: `/etc/pam.d`, or tell your relevant services not to use PAM.
                     36: 
                     37:    /!\ Disabling KerberosAuthentication in `/etc/ssh/sshd_config` does **NOT** prevent `sshd` from invoking `pam_krb5.so` and prompting for a Kerberos password -- oops. Since you probably do not have a host key in the realm NETBSD.ORG you have little to fear from ssh's KerberosAuthentication method -- nothing can get tickets to use your machine, because there is no host instance for your machine shared between the NetBSD kerberos server and your local keytab. So, the bottom line: turn off UsePAM for `sshd` or adjust your PAM configuration; don't worry about KerberosAuthentication or GSSAPIAuthentication in `sshd` itself.
                     38: 
1.1       schmonz    39: 7. Create `/etc/krb5.conf` containing only the line `[libdefaults]`.
                     40: 
1.2       schmonz    41: NetBSD will now autodiscover and uses the NETBSD.ORG KDC as defined
                     42: in DNS. To use Kerberized TNF services, log in with your Kerberos
                     43: [[password]]:
1.1       schmonz    44: 
                     45: `$ kinit <username>@NETBSD.ORG`
                     46: 
                     47: The right-hand side is a Kerberos realm, not a DNS domain. Case is significant!
                     48: """]]
1.3       wiki       49: 
                     50: #### [[!toggle id="windows" text="Windows XP"]]
                     51: [[!toggleable id="windows" text="""
                     52: 
1.4       wiki       53: Windows does not provide an easy way to configure and use KDCs different from the one embedded into an Active Directory.
                     54: 
                     55: Therefore, to use [[Kerberos]], you should follow the following steps:
                     56: 
                     57: 7. Download the [MIT Kerberos for Windows](http://web.mit.edu/Kerberos/dist/#kfw-3.2) installer. It is composed of different tools traditionally found with Kerberos distributions, like [[!template id=man name=kinit section=1]] or [[!template id=man name=klist section=1]], and a Network Identity Manager, an application used to manage credential caching of Kerberos tickets.
                     58: 
                     59: 7. Install the package. Use the default provided options, then restart the computer.
                     60: 
                     61: 7. The Network Identity Manager [(PDF)](http://web.mit.edu/kerberos/kfw-3.2/kfw-3.2.2/netidmgr_userdoc.pdf) should automatically start when you login. As there is no principal currently configured, it should open a dialog box to obtain the new credentials.
                     62: 
                     63: 7. Enter your principal:
                     64: 
                     65:         Username: <username>
                     66:         Realm: NETBSD.ORG
1.3       wiki       67: 
1.4       wiki       68: 7. Click `Ok`. After a few seconds, it should obtain the TGT for you from NetBSD.ORG KDC.
1.3       wiki       69: 
                     70: """]]

CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb