I work for an organization that follows the common model of assigning people systematically generated user ids. Like most technically inclined employees of this organization, I have local accounts on my workstation that don’t bear any relation to the generated account ids. For the most part this isn’t a problem, except that our organization uses Kerberos to authenticate access to a variety of resources (such as the mailserver and a variety of web applications).
Posts for: #Kerberos
Kerberos authenticated queries to Active Directory
There are many guides out there to help you configure your Linux system as an LDAP and Kerberos client to an Active Directory server. Most of these guides solve the problem of authentication by embedding a username and password into a configuration file somewhere on your system. While this works, it presents some problems:
- If you use a common account for authentication from all of your Linux systems, a compromise on one system means updating the configuration of all of your systems.
- If you don’t want to use a common account, you need to provision a new account for each computer…
- …which is silly, because if you join the system to Active Directory there is already a computer object associated with the system that can be used for authentication.
This document describes how to configure a Linux system such that queries generated by nss_ldap will use either the current user’s Kerberos credentials, or, for the root user, credentials stored in a Kerberos credentials cache.