Previous | Table of Contents | Next |
Kerberos is an authentication system that was developed at the Massachusetts Institute of Technology. Kerberos uses DES to authenticate a user when logging in to the system. Authentication is based on the capability of the sending system to use the common key to encrypt the current time, which the receiving system can decrypt and check against its current time. Kerberos Version 4 is supported in the Solaris 2.6 release.
Kerberos works by authenticating the user's login password. A user enters the kinit command, which acquires a ticket that is valid for the time of the session (or eight hours, the default session time) from the Kerberos authentication server. When the user logs out, the ticket can be destroyed (by using the kdestroy command).
NOTE: Solaris 2.6 provides the capability to connect to the Kerberos functionality. However, it does not provide the Kerberos package. You can ftp Kerberos 4 source from athena-dist.mit.edu using anonymous as a username and your email address as a password. The source is located in the pub/kerberos directory.
The Kerberos software is available from MIT project Athena, and is not part of the SunOS 5.x software. The SunOs 5.x software provides:
This section provides an overview of how the Kerberos authentication procedure works. The following process assumes that the Kerberos key distribution center (KDC) is already installed on the network, using publicly available sources from MIT project Athena.
This section describes the command used to administer Kerberos and provides instructions for the following tasks associated with network security:
Table 19-3 lists commands used to administer Kerberos authentication.
Command | Description |
---|---|
kdestroy | Destroy Kerberos tickets. |
kerbd | Daemon that generates and validates Kerberos tickets for kernel RPC. |
kinit | Log in to Kerberos authentication and authorization system. |
klist | List currently held Kerberos tickets. |
ksrvtgt | Fetch and store Kerberos ticket-granting ticket using a service key. |
Refer to the MIT documentation for details about how to set up and administer Kerberos. Also refer to the kerberos(1), kerberos(3N), and krb.conf(4) manual pages for useful reference information about Kerberos.
If the NFS file system you need to access has not been mounted, you need to acquire a ticket for superuser on the client before mounting it.
To acquire a ticket for a not-yet-mounted file system:
In the following example, seachild is the name of the client system:
#kinit root.seachild Password: #
If the root.<hostname> for the client is present in the /etc/srvtab configuration file, you can use the ksrvtgt command to get a ticket for superuser. In this case, you are not required to give a superuser password. Consult the MIT documentation for information on how to initialize the /etc/srvtab file.
To acquire a ticket for superuser when root.<hostname> is present in the /etc/srvtab configuration file:
In the following example, a Kerberos ticket is acquired for superuser on the client seachild:
#ksrvtgt root.seachild #
Previous | Table of Contents | Next |