
2-40 Setting Up KerberosV5
LX Series Configuration Guide
Setting Up KerberosV5
KerberosV5 is a computer network authentication protocol that
allows users communicating between machines to securely
prove their identity to one another and ensure data integrity. It
is aimed at a client-server model in which both the user and the
server verify each other's identity. For a detailed explanation of
Kerberos, go to http://web.mit.edu/kerberos.
KerberosV5 maintains a database of secret keys - each network
entity (client or server) shares a secret key known only to itself
and to KerberosV5. Knowledge of this key proves an entity's
identity. When two network entities are communicating with one
another, KerberosV5 generates a session key these entities use
to secure their interactions.
Some issues to be aware of when configuring Kerberos V5:
The clock on the LX must be set to the same time as the host
that runs the KDC server. Kerberos V5 will reject requests
from any host whose clock is not within the specified
maximum clock skew of the Key Distribution Center (KDC).
You can enable the Network Time Protocol (NTP) to keep your
clocks in sync.
The Domain Name System (DNS) must be set up and working
properly. For Kerberos V5 to function correctly, your DNS
entries and your hosts must have the correct information.
Each host name must be in the fully-qualified format, and
each host IP address must reverse-resolve to match the
name.
The krb5.keytab must be the same on all LX units, as well as
the KDC servers. You must copy the /etc/krb5.keytab from
the KDC onto all the LX units (/config/krb5.keytab).
Follow the instructions supplied with the KerberosV5 software to
install and set up the KerberosV5 Master and Slave hosts.
Comentarios a estos manuales