apacheds 之 kerberos

876 阅读1分钟

apacheds服务端配置


保存后重启apacheds

重新打开apache directory studio

选择file->new->LDIF File

添加如下为两条ldif信息均做添加,主要是生成对应kerberos库信息

dn: ou=servicePrincioals,o=users,dc=example,dc=com
objectClass: organizationalUnit
objectClass: top
ou: servicePrincioals


dn: uid=krbtgt,ou=servicePrincioals,o=users,dc=example,dc=comobjectClass: organizationalUnit
objectClass: uidObject
objectClass: krb5KDCEntry
objectClass: krb5Principal
objectClass: top
krb5KeyVersionNumber: 1
krb5PrincipalName: krbtgt/SOUCHE.COM@SOUCHE.COM
ou: TGT
uid: krbtgt
userPassword:: e1NTSEF9bkE3Njl4dlZqUkFHZStUZU95bE5xUHJmNC9aTFhHOVdCQm9PWmc9P

添加用户信息

dn: uid=test,o=users,dc=example,dc=comobjectClass: krb5KDCEntry
objectClass: organizationalPerson
objectClass: person
objectClass: inetOrgPerson
objectClass: krb5Principal
objectClass: top
cn: test
krb5KeyVersionNumber: 7
krb5PrincipalName: test@EXAMPLE.COM
sn: test
uid: test
userPassword:: e1NTSEF9bkE3Njl4dlZqUkFHZStUZU95bE5xUHJmNC9aTFhHOVdCQm9PWmc9P

上述密码均可在修改,使用格式为plaintext格式

客户端验证

需要新增配置

/etc/krb5.conf

[libdefaults]
default_realm = EXAMPLE.COM
#下边的认证方式必须要加不然会出现密码错误的提示
default_tkt_enctypes = aes128-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-md5 aes128-cts des3-cbc-sha1-kd aes128-cts-hmac-sha1-96

[realms]
 SOUCHE.COM = {
#端口为kdc端口,主机为apacheds的设备IP
  kdc = 172.17.41.20:60088
#端口为admin端口
  admin_server = 172.17.41.20:60464
#  acl_file = /etc/krb5kdc/store/kadm5.acl
 }

[domain_realm]
.example.com = EXAMPLE.COM
example.com = EXAMPLE.COM

测试方式

kinit test

备注:

服务介绍: kdc服务主要是提供kerberos 的tickets在域(realm)的环境里 默认端口为88 kerberos admin server主要提供密码更改服务和管理(realm)域设置 密码服务默认是464端口 管理域服务默认是749端口 

 有效的Principals信息

 john@APACHE.ORG A user 

john/admin@APACHE.ORG A user who is an admin host/www.apache.org/apache.org@APACHE.ORG A host with two hostnames 

ldap/www.apache.org@APACHE.ORG A service (Ldap server)