Enabling the IDS server Kerberos bind
The following procedure enables the IDS server for Kerberos bind.
The following example shows how to configure an IDS server for Kerberos bind.
This example was tested using IDS v5.1:
- Install the krb5.client fileset.
- Make sure the /etc/krb5/krb5.conf file
exists and is configured properly. If you need to configure it, you
can run the /usr/sbin/config.krb5 command.
# config.krb5 -r ud3a.austin.ibm.com -d austin.ibm.com -c KDC -s alyssa.austin.ibm.com Initializing configuration... Creating /etc/krb5/krb5_cfg_type... Creating /etc/krb5/krb5.conf... The command completed successfully. # cat /etc/krb5/krb5.conf [libdefaults] default_realm = ud3a.austin.ibm.com default_keytab_name = FILE:/etc/krb5/krb5.keytab default_tkt_enctypes = des3-cbc-sha1 arcfour-hmac aes256-cts des-cbc-md5 des-cbc-crc defaut_tgs_enctypes = des3-cbc-shal1 arcfour-hmac aes256-cts des-cbc-md5 des-cbc-crc [realms] ud3a.austin.ibm.com = { kdc = alyssa.austin.ibm.com:88 admin_server = alyssa.austin.ibm.com:749 default_domain = austin.ibm.com } [domain_realm] .austin.ibm.com = ud3a.austin.ibm.com alyssa.austin.ibm.com = ud3a.austin.ibm.com [logging] kdc = FILE:/var/krb5/log/krb5 admin_server = FILE:/var/krb5/log/kadmin.log default = FILE:/var/krb5/log/krb5lib.log - Get the keytab file of the ldap:/serverhostname principal, and place it in the /usr/ldap/etc directory. For example: /usr/ldap/etc/slapd_krb5.keytab.
- Set the permission to allow the server process to access
the file.
# chown ldap:ldap /usr/ldap/etc/slapd_krb5.keytab # - To enable the IDS server for Kerberos bind, edit the /etc/ibmslapd.conf file and append the following entry:
dn: cn=Kerberos, cn-Configuration cn: Kerberos ibm-slapdKrbAdminDN: ldapadmin ibm-slapdKrbEnable: true ibm-slapdKrbIdentityMap: true ibm-slapdKrbKeyTab: /usr/ldap/etc/slapd_krb5.keytab ibm-slapdKrbRealm: ud3a.austin.ibm.com objectclass: ibm-slapdKerberos objectclass: ibm-slapdconfigEntry objectclass: top - Map the ldapproxy principal to a bind DN named cn-proxyuser,cn=aixdata.
- If the bind DN entry exists in the IDS server, create
a file named ldapproxy.ldif with the following
content:
dn: cn=proxyuser,cn=aixdata changetype: modify add: objectclass objectclass: ibm-securityidentities - add:altsecurityidentities altsecurityidentities: Kerberos:ldapproxy@ud3a.austin.ibm.comOR - If the bind DN entry is not yet added to the server, create a file named proxyuser.ldif with the following content:
Note: You will need to replace proxyuserpwd with your password.dn: cn=proxyuser,cn=mytest cn: proxyuser sn: proxyuser userpassword: proxyuserpwd objectclass: person objectclass: top objectclass: ibm-securityidentities altsecurityidentities: Kerberos:ldapproxy@ud3a.austin.ibm.comAdd the bind DN entry that is created to the IDS server using the ldapmodify command.
# ldapmodify -D cn-admin -w adminPwd -f /tmp/proxyuser.ldif modifying entry cn=proxyuser,cn=mytest # - If the bind DN entry exists in the IDS server, create
a file named ldapproxy.ldif with the following
content:
- Restart the IDS server.