On Mon, 21 Jul 2014, Jaap Winius wrote:

Hi folks,

After setting up Kerberos cross-realm access and then creating a system:authuser@<MY_REALM> group in a foreign cell, it seems that basic rl access to the cell's contents is only possible after that group is given rl access to every single directory that system:authuser has access to. Not very convenient.

Is there an easy way around this, like something equivalent to making system:authuser@<MY_REALM> a member of system:authuser?

If the two Kerberos realms involved have a unified namespace for client principals (minus the realm name), you can configure your cell to accept authentication from either realm by creating AFS service principals in both realms and putting both sets of keys on the AFS servers. It is probably a good idea to make the AFS service principals have distinct kvnos, as this was required for 1DES keys in the KeyFile, and will be required again for all keys in the KeyFileExt (the code on master), but is not currently required for krb5 keys in the rxkad.keytab.

The krb.conf config file is used to specify what realms authenticate to the cell.

This sort of configuration does require some thought and analysis of whether it is actually applicable to your site. For example, if the two realms involved are A.EXAMPLE.ORG and B.EXAMPLE.ORG, and j...@a.example.org and j...@b.example.org are different people, this scheme is not appropriate.

-Ben
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to