From Fedora Project Wiki

(Link to the page for testing domain access)
(Add link to default krb5.conf file)
Line 9: Line 9:
#: <pre>$ kinit Administrator@AD.EXAMPLE.COM</pre>
#: <pre>$ kinit Administrator@AD.EXAMPLE.COM</pre>
#: You should be prompted for a password, and no error message should be printed.
#: You should be prompted for a password, and no error message should be printed.
# Now place the <code>/etc/krb5.conf</code> attached to this ticket into place. This is the default config.
# Now place the [[File:Default-example-krb5.conf|default krb5.conf]] into place. This is the default config distributed with <code>krb5-libs</code>.
#: <pre>$ sudo vi /etc/krb5.conf</pre>
#: <pre>$ sudo vi /etc/krb5.conf</pre>
# Do a <code>kinit</code> again.
# Do a <code>kinit</code> again.

Revision as of 13:25, 16 October 2012

Description

Work has been done to make krb5 configurationless, and unbreak the default /etc/krb5.conf that was distributed with Fedora 17 and earlier.

Setup

  1. Verify that your Active Directory domain access works. If you don't have an Active Directory domain, you can set one up.
  2. Move /etc/krb5.conf away if it exists:
    $ sudo mv /etc/krb5.conf /etc/krb5.conf.bak

How to test

  1. Do a kinit against your Active Directory domain. Yes it's vital that you use the fully capitalized form of the domain name.
    $ kinit Administrator@AD.EXAMPLE.COM
    You should be prompted for a password, and no error message should be printed.
  2. Now place the File:Default-example-krb5.conf into place. This is the default config distributed with krb5-libs.
    $ sudo vi /etc/krb5.conf
  3. Do a kinit again.
    $ kinit Administrator@AD.EXAMPLE.COM

Expected Results

The kinit commands should complete successfully

Look at the ticket that kinit retrieved. It should look something like:

$ klist -e
Ticket cache: DIR::/run/user/1000/krb5cc_...
Default principal: Administrator@AD.EXAMPLE.COM

Valid starting     Expires            Service principal
10/15/12 00:52:34  10/15/12 10:52:34  krbtgt/AD.EXAMPLE.COM@AD.EXAMPLE.COM
        renew until 10/16/12 00:52:39, Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha1-96