This section describes the tasks involved in adding Kerberos V4 to the SP system.
If any node in a partition is running a level earlier than |PSSP 3.4, you must install and configure Kerberos V4 and activate it as an authentication method in that SP system partition. In addition to Kerberos V4, you can also select to install and configure DCE for each system partition.
To provide Kerberos V4 authentication services on your SP system, choose from the following three authentication implementations.
Once you have installed and initialized Kerberos V4 authentication on your SP system, you can add other IBM RS/6000 workstations to your authentication realm. Two reasons for adding additional workstations might be:
When you use the SP authentication server support in the ssp.authent option, you may choose to have more than one server system. If you configure your local authentication realm with more than one server, you must designate one as the primary server. All others are secondary servers. Only the primary server has the administrative daemon, kadmind, that manages the content of the authentication database. The databases used by the secondary authentication servers are copies of the primary database and are updated periodically from the primary authentication server.
Additional servers can provide for greater reliability, since the authentication service will try all servers listed in the configuration file before failing a service request. If there are network problems, or if your primary server system fails, authentication requests can be handled as long as one of the configured servers is active and accessible. There may also be performance reasons to configure a secondary server. Only when there is an authentication server running on the control workstation can the switch be used for authentication protocol traffic to and from the SP nodes. In configurations where you are integrating the SP system into an existing authentication realm, where the primary authentication server is already on another workstation, you can make this possible by setting up a secondary server on the control workstation. In this way, you could have multiple SP systems in the same authentication realm, and give all SP nodes access to an authentication server across the switch.
Adding principals and changing passwords takes place in the primary database and is propagated to secondary databases through periodic updates only. Secondary databases are maintained by the kpropd daemon that runs only on secondary server workstations and receives the database content in encrypted form from the kprop program that runs on the primary server workstation. The SP authentication services include a script that you can schedule for execution in the root crontab file to keep your secondary authentication databases up-to-date.
Use the following configuration files located in the /etc directory to set up your system's authentication realm:
This file contains information used by the internet routing daemon inetd to route incoming requests for service to one of a large number of dynamically started daemons that are named in the file. When the SP authentication services are installed on your systems, the file is updated to route "kshell" service requests to the AIX Kerberos-authenticated remote command daemon (krshd). You should not modify this information, but you might have to resolve conflicts with names of locally installed services.
This file maps the names of network services to the well-known ports that they use to receive requests from their clients. This file may already contain entries relating to authentication services, since the file shipped with AIX 4.1 contains entries used by DCE. In addition to the DCE entries, many other reserved port names were added in this version of AIX, including an entry for the Kerberos V5 port, 88. The service name for this port is given as "kerberos", which is also the name used by the standard MIT Kerberos V4 service. The port number usually assigned to the Kerberos V4 service is 750. In order to be consistent with and interoperate with AIX 3.2.5 systems running PSSP 1.2 with authentication services based on Kerberos V4, it was necessary to use the name "kerberos4". You do not have to create an entry in the file for "kerberos4", because the default port of 750/udp will be used if no "kerberos4" entry is found. If you are not using AFS Version 3.4 authentication servers, you should only have to modify /etc/services if you are using some other service that uses one or more of the traditionally used (but not formally reserved) Kerberos V4 ports. They are:
You will also have to modify this file if you are using AFS Version 3.4 authentication servers. The kaserver in AFS Version 3.4 for AIX 4.1 accepts Kerberos V4 protocol requests using the well-defined udp port assigned to the "kerberos" service assigned to port 88 in the file distributed with the base operating system. MIT Kerberos V4, on which PSSP authentication services are based, uses a default port number of 750. PSSP authentication commands use the service name "kerberos4" to avoid this conflict with the Kerberos V5 service name, which is also used by DCE. For PSSP authentication commands to communicate with an AFS 3.4 kaserver, you must do either of the following:
This file contains the name of the local realm for your SP system and identifies the host names of all the authentication servers for all Kerberos realms known to the local realm. For more information on the content of the file, see krb.conf in the book PSSP: Command and Technical Reference.
If you configure your realm to use AFS authentication servers, this file is built for you automatically from the corresponding AFS configuration file CellServDB. When you use PSSP authentication servers, you create this file or one is generated by default by the setup_authent script that must run on each workstation after you install the PSSP files. You must provide the file if the workstation is a client workstation or a secondary authentication server. If it is the primary authentication server, you need to provide the file only if the system's host name contains no domain portion, following conventional network naming rules.
By convention, Kerberos uses the domain portion of a network interface name, converted to upper case, as the default realm to which the host belongs. If you want to define your own local realm name that does not follow convention, or if the host name of your primary server host has no domain portion, you must supply a file with your choice of local realm name in the first line. When using AFS authentication, the local AFS cell name, contained in the ThisCell file, converted to uppercase, becomes the local Kerberos realm name.
This file maps network interface (host) names to realms. When Kerberos needs to determine to which realm a network interface is assigned, it looks in this file. If there is no entry for the host name or for the domain part of the host name, the default is a realm name equal to the domain portion of the host name, converted to upper case. Any network interface names on systems using SP authenticated services which have a domain portion which is not the same as the local realm name, except for case, must have an entry in this file.
Entries for all network interfaces on the SP nodes and on the control workstation that require this mapping in /etc/krb.realms are added automatically by either setup_authent initially or by the setup_server script. The file is kept identical on the control workstation and the nodes by the node installation customization process. There may be cases involving other work stations, however, where you will have to add entries to the file on one or more systems.
When you set up a secondary authentication server or set up a system as an authentication client system, you are instructed to copy the configuration files from the primary server. If the new system requires mapping in krb.realms, the setup_authent script will create the entry in the local copy of the file. You will have to manually add the entry for the workstation you just configured into the control workstation's file and into the files on any other client and server workstations already installed.
The first system that you set up, when you install your PSSP software, is your primary authentication server. The primary authentication server may be your control workstation or it could be some other IBM RS/6000 workstation. You may want to have your servers entirely off of the SP system itself to provide greater physical security for them. You may want to allow logins to the control workstation that are not appropriate for the authentication servers.
The setup_authent script is used to configure your authentication services. If you have installed the ssp.authent file set on the workstation prior to running the script, it assumes that the system will be a PSSP authentication server. If you provide your own krb.conf file, the script will look for an entry for the local host name. If it cannot find one, it allows you to configure the system without any server (as an authentication client system).
The setup_authent script creates the service principals for local service instances and creates the server key file for them. It updates the krb.realms file as needed, and creates the root user's .klogin file to authorize the initial administrator principal to use remote commands.
The daemons which provide the authentication server (the KDC), and the database administration server, are started by adding entries to /etc/inittab.
The procedure to set up the primary authentication server is the following:
The procedure to set up a secondary authentication server is the following:
The procedure to set up your SP control workstation as a secondary authentication server is the same. For more information, see Step 21.3: Initializing as a secondary Kerberos V4 authentication server.
The procedure to set up an authentication client system is the following:
The procedure to set up your SP control workstation as an authentication client system is the same. For more information, see Step 21.4: Initializing as an authentication client system.
Some of the directory paths that are used with authentication services are the following:
Notes:
Perform the following steps to configure Kerberos V4 security for each system partition:
If setup_authent was run previously, it is not necessary to run it again. Refer to Step 21: Initialize RS/6000 SP Kerberos V4 (optional) for information on the different ways you can run setup_authent.
spsetauth -p partition1 -i dce k4
The preceding example assumes that DCE was the current setting.
spsetauth -p partition1 -d dce k4
This step generates the necessary authorization files for each selected method and removes files or entries that are not needed. When adding k4, you will need to add it to the current setting. This implies that if dce was previously set, it must also be set now.
chauthpar -c -p partition1 k5 k4
chauthpts -c -p partition1 dce compat
spbootins -r customize -s yes -l 1,3,5
Your system is now configured and enabled to use Kerberos V4, where appropriate, as an authentication method.
chauthpts -p partition1 compat
This disables SP Trusted Services from using DCE as an authentication method. The steps for removing DCE or Kerberos V4 authentication are detailed in the "Changing the security configuration" chapter in PSSP: Administration Guide.