08.01.2013 Views

AIX and Linux Interoperability - IBM Redbooks

AIX and Linux Interoperability - IBM Redbooks

AIX and Linux Interoperability - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ACL restrictions.<br />

Enter password for principal "admin/admin@WEEORG.COM":<br />

Re-enter password for principal "admin/admin@WEEORG.COM":<br />

Principal "admin/admin@WEEORG.COM" created.<br />

Creating keytable...<br />

Attempting to bind to one or more LDAP servers. This may take a while...<br />

Creating /var/krb5/krb5kdc/kadm5.acl...<br />

Starting krb5kdc...<br />

Attempting to bind to one or more LDAP servers. This may take a while...<br />

krb5kdc was started successfully.<br />

Starting kadmind...<br />

Attempting to bind to one or more LDAP servers. This may take a while...<br />

kadmind was started successfully.<br />

The comm<strong>and</strong> completed successfully.<br />

Even though the Kerberos data is accessible through st<strong>and</strong>ard LDAP browsers,<br />

you should modify it with Kerberos tools, such as kadmin <strong>and</strong> ksetup. An<br />

important exception to the rule is the LDAP access controls. Regardless of how<br />

the LDAP server sets the ACLs initially, you should apply appropriate control,<br />

given the sensitivity of the Kerberos data. In particular, both read <strong>and</strong> write<br />

access to the KrbMstrKey <strong>and</strong> KrbKey object classes should be restricted to the<br />

KDCs <strong>and</strong> the administration server. Note that this is different from the Kerberos<br />

ACLs, which are manipulated using the kadmin program.<br />

The configuration script may not set all desired options for LDAP access. For<br />

example, if you access LDAP servers in different ways, then you must edit the<br />

/var/krb5/krb5kdc/.kdc_ldap_data configuration file using a text editor. We show<br />

one possible configuration in Example 3-5. Even though LDAP has a referral<br />

mechanism to deal with updates sent to replica servers, it is better to use the<br />

replica_type tag <strong>and</strong> specify whether the server’s data may be updated. The<br />

Kerberos servers keep connections open to all specified LDAP servers, but the<br />

preference tag governs which server is queried. The default preferences are 4 for<br />

the master LDAP server <strong>and</strong> 5 for the slave servers.<br />

Example 3-5 LDAP access configuration in /var/krb5/krb5kdc/.kdc_ldap_data<br />

70 <strong>AIX</strong> <strong>and</strong> <strong>Linux</strong> Interoperabilty<br />

[ldapdefaults]<br />

realm = WEEORG.COM<br />

bind_dn = cn=root<br />

bind_dn_pw = secret<br />

ldapserver = r-aix.weeorg.com<br />

ldapserver = ldap-1.weeorg.com<br />

bind_type = simple<br />

[servers]<br />

r-aix.weeorg.com = {<br />

port = 389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!