9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am installing Authen::Krb5::Easy and during make test I am getting the follwing error :
kinit not ok 2
error was: could not get initial credentials: Cannot contact any KDC for requested realm
we are stroring krb5.conf in diff location ( not in /etc/krb5.conf) , but, PERL is... (1 Reply)
Discussion started by: talashil
1 Replies
2. Shell Programming and Scripting
Hi All,
I am currently writing script to get the details for lot of hosts from jump server. Means each and every time it will ssh to the host and get the information. To achieve that I need to automatically accept the password from Jump server to that main hosts. We are using kerberos password... (6 Replies)
Discussion started by: kamauv234
6 Replies
3. UNIX for Dummies Questions & Answers
Hi ,
I am trying to authenticate my id on client server with Kerberos and receiving below error
kinit rpagadala@BDC.soft.net
kinit: Cannot contact any KDC for realm 'BDC.soft.net' while getting initial credentials
Please find krb5.conf on the client server configuration which is... (1 Reply)
Discussion started by: Tomlight
1 Replies
4. OS X (Apple)
Our Network Security folks have mandated that we "Kerberize" our systems to allow them to perform an authenticated scan. This consists of instructions to change /etc/pam.d/sshd from:
# sshd: auth account password session
auth optional pam_krb5.so use_kcminit
auth optional ... (0 Replies)
Discussion started by: jnojr
0 Replies
5. AIX
I've configured an AIX 5.3 client to use our Windows AD for user authentication via Kerberos.
When I try to ssh to the server using the AD credentials, I eventually get access but not after getting prompted for a password 3 times (which doesn't work) followed by an accepted login on the 4th... (3 Replies)
Discussion started by: jmroderick
3 Replies
6. Red Hat
Hi,
I've configured two linux boxes to authenticate against Windows Active Directory using Kerberos while retrieving authorization data (uids, gids ,,,)from NIS.
The problem I ran into with my PAM configuration is that all authentication attempts succeed in order.i.e. if someone tried his... (0 Replies)
Discussion started by: geek.ksa
0 Replies
7. Linux
Hi,
Anyone can point me a good link to setup IPSec using racoon IKE which uses gssapi_krb authentication method?
I have a debain linux box and Windows 2003R2 system, and I want them to communicate using IPSec.
Thanks,
Emily. (0 Replies)
Discussion started by: egyfan
0 Replies
8. UNIX for Dummies Questions & Answers
Hi,
We've configured Kerberos to authenticate AIX 5.3 users with Active Directory and I now have to port an application written in C to the new security model.
Currently, our users can login as normal and running a "klist" command reveals that they have been successfully granted a ticket. ... (2 Replies)
Discussion started by: phykell
2 Replies
9. AIX
I have 2 servers (lft1 and lft3) running AIX 5.3 ML 5. Both are installed with krb5.client.rte 1.4.0.4 and openssh.base.server 4.3.0.5300.
I have configured some of the users on both servers to authenticate against our Windows 2003 Active Directory. From my PC, I can use telnet to login... (1 Reply)
Discussion started by: asch337
1 Replies
ipa-join(1) IPA Manual Pages ipa-join(1)
NAME
ipa-join - Join a machine to an IPA realm and get a keytab for the host service principal
SYNOPSIS
ipa-join [-d|--debug] [-q|--quiet] [-u|--unenroll] [-h|--hostname hostname] [-s|--server hostame] [-k|--keytab filename] [-w|--bindpw pass-
word] [-b|--basedn basedn] [-?|--help] [--usage]
DESCRIPTION
Joins a host to an IPA realm and retrieves a kerberos keytab for the host service principal, or unenrolls an enrolled host from an IPA
server.
Kerberos keytabs are used for services (like sshd) to perform kerberos authentication. A keytab is a file with one or more secrets (or
keys) for a kerberos principal.
The ipa-join command will create and retrieve a service principal for host/foo.example.com@EXAMPLE.COM and place it by default into
/etc/krb5.keytab. The location can be overridden with the -k option.
The IPA server to contact is set in /etc/ipa/default.conf by default and can be overridden using the -s,--server option.
In order to join the machine needs to be authenticated. This can happen in one of two ways:
* Authenticate using the current kerberos principal
* Provide a password to authenticate with
If a client host has already been joined to the IPA realm the ipa-join command will fail. The host will need to be removed from the server
using `ipa host-del FQDN` in order to join the client to the realm.
This command is normally executed by the ipa-client-install command as part of the enrollment process.
The reverse is unenrollment. Unenrolling a host removes the Kerberos key on the IPA server. This prepares the host to be re-enrolled. This
uses the host principal stored in /etc/krb5.conf to authenticate to the IPA server to perform the unenrollment.
Please note, that while the ipa-join option removes the client from the domain, it does not actually uninstall the client or properly
remove all of the IPA-related configuration. The only way to uninstall a client completely is to use ipa-client-install --uninstall (see
ipa-client-install(1)).
OPTIONS
-h,--hostname hostname
The hostname of this server (FQDN). By default of nodename from uname(2) is used.
-s,--server server
The hostname of the IPA server (FQDN). Note that by default there is no /etc/ipa/default.conf, in most cases it needs to be sup-
plied.
-k,--keytab keytab-file
The keytab file where to append the new key (will be created if it does not exist). Default: /etc/krb5.keytab
-w,--bindpw password
The password to use if not using Kerberos to authenticate. Use a password of this particular host (one time password created on IPA
server)
-b,--basedn basedn
The basedn of the IPA server (of the form dc=example,dc=com). This is only needed when not using Kerberos to authenticate and anony-
mous binds are disallowed in the IPA LDAP server.
-f,--force
Force enrolling the host even if host entry exists.
-u,--unenroll
Unenroll this host from the IPA server. No keytab entry is removed in the process (see ipa-rmkeytab(1)).
-q,--quiet
Quiet mode. Only errors are displayed.
-d,--debug
Print the raw XML-RPC output in GSSAPI mode.
EXAMPLES
Join IPA domain and retrieve a keytab with kerberos credentials.
# kinit admin
# ipa-join
Join IPA domain and retrieve a keytab using a one-time password.
# ipa-join -w secret123
Join IPA domain and save the keytab in another location.
# ipa-join -k /tmp/host.keytab
EXIT STATUS
The exit status is 0 on success, nonzero on error.
0 Success
1 Kerberos context initialization failed
2 Incorrect usage
3 Out of memory
4 Invalid service principal name
5 No Kerberos credentials cache
6 No Kerberos principal and no bind DN and password
7 Failed to open keytab
8 Failed to create key material
9 Setting keytab failed
10 Bind password required when using a bind DN
11 Failed to add key to keytab
12 Failed to close keytab
13 Host is already enrolled
14 LDAP failure
15 Incorrect bulk password
16 Host name must be fully-qualified
17 XML-RPC fault
18 Principal not found in host entry
19 Unable to generate Kerberos credentials cache
20 Unenrollment result not in XML-RPC response
21 Failed to get default Kerberos realm
SEE ALSO
ipa-rmkeytab(1) ipa-client-install(1)
IPA
Oct 8 2009 ipa-join(1)