C    Single Sign On

Single Sign On (SSO) is an optional client/server software that uses Kerberos technology to provide a secure communication when using the ftp, rcp, rlogin, rsh, and telnet network commands and applications that use Kerberos.

This appendix contains the following information:

C.1    Kerberos Servers and Clients

A Kerberos server is a system on which the Kerberos server software is installed. Kerberos server technology is not provided with the Tru64 UNIX operating system software. A Kerberos server, for example a Windows 2000 Server, must exist in the intranet. The remainder of this appendix refers to a Kerberos server as server.

A Kerberos client is a system on which the Kerberos client software is installed. The Tru64 UNIX Single Sign On (SSO) software provides the Kerberos client software that runs on a system running the Tru64 UNIX Version 5.1A or higher operating system software. The Kerberos client software provides Kerberos versions of the ftp, rcp, rlogin, rsh, and telnet commands and the rcmd function. The remainder of this appendix refers to a Kerberos client as client.

C.2    Kerberos Authentication Process

A Kerberos network is divided into security domains called realms. Each realm has a primary server, can have secondary servers, and implements its own security policy.

Administrators populate and maintain a principal database on the server. The principal database contains a key (entry) for each principal (user, service, application, and host) that contains information about a principal, including a secret value, such as a password. The server uses the key information to authenticate a principal. See your Kerberos server documentation for more information about the principal database.

Realms are hierarchical. Each realm can have child realms, and each realm can have a parent. This allows organizations implementing Kerberos to have different levels of security for different information classes within the organization and allows realms that have no direct contact to share authentication information. All principal names in a realm must be unique. The information security policy is the same for all principals within a realm.

When you install the Tru64 UNIX SSO software, a Security Integration Architecture (SIA) module is installed that directs principal authentication requests to a Kerberos server.

On Tru64 UNIX clients, you can populate and maintain a file called the service key table. The service key table contains a key that you extract from the principal database for each principal (host) that was previously authenticated to communicate with the client. The client reuses the key information to reauthenticate a principal on subsequent requests. That is, after the server initially authenticates a principal, a client can reauthenticate a principal if the principal's key is in its service key table.

C.3    Upgrading the SSO Software

To upgrade the SSO Version 1.0 software, you must deinstall previously installed SSO subsets and install the new SSO software. For example, to deinstall the SSO Version 1.0 software (W2KSSO100), enter:

# /usr/sbin/setld -d W2KSSO100

C.4    Installing and Configuring the SSO Software

You must install some SSO software on the Tru64 UNIX system and some on the Windows 2000 Server system.

You must install the SSO software on the Windows 2000 Server system before installing on the Tru64 UNIX system.

The SSO software that you install on the Tru64 UNIX operating system installs a Security Integration Architecture (SIA) mechanism that directs authentication requests to the Windows 2000 Active Directory.

The SSO software that you install on the Windows 2000 Server extends the Active Directory to include Tru64 UNIX user account and group attributes such as user login name, User ID (UID), Group ID (GID), a comment, a path to a home directory, and a login shell. See System Administration for more information on Tru64 UNIX user account and group attributes.

Note the following considerations before you install the SSO software:

C.4.1    Installing and Configuring the SSO Software on the Windows 2000 System

When you install the SSO software on a Windows 2000 domain controller, the SSO software:

C.4.1.1    Extending the Active Directory Schema

Follow these steps to extend the Active Directory schema on the Windows 2000 domain controller:

  1. Insert the Tru64 UNIX base CD-ROM into the CD-ROM drive on the Windows 2000 domain controller.

  2. In the Windows Explorer window, expand the icon associated with the CD-ROM drive, then expand the Windows2000_SSO folder, and then expand the kit/windows_kit folder.

  3. Double-click on the setup.exe file. The following window is displayed:

  4. In the Schema Extensions box, click on the Install button to extend the Active Directory to include Tru64 UNIX attributes. In the Active Directory User Interface Extensions box, click on the Install button to update the MMC to include a Tru64 UNIX property page.

    Informational messages about the installation are displayed in a command prompt window. This window automatically closes at the end of a successful installation.

C.4.1.2    Updating the MMC

Follow these steps to update the MMC on a Windows 2000 Server to include the Tru64 UNIX property pages:

  1. Insert the Tru64 UNIX base CD-ROM into the CD-ROM drive on the Windows 2000 Server.

  2. In the Windows Explorer, expand the icon associated with the CD-ROM drive, expand the Windows2000_SSO folder, then expand the kit/windows_kit folder, and then the MMC_Setup folder.

  3. Double-click on the setup.exe file and follow the instructions on the screen.

C.4.2    Installing and Configuring the SSO Software on the Tru64 UNIX System

The SSO software is an optional subset that is included with the base Tru64 UNIX operating system software.

The SSO subset is called OSFSSOW2Knnn, Single Sign On for Windows 2000 (Network-Server/Communications). The nnn represents the Tru64 UNIX version number. See the Release Notes for the current version number.

See Installation Guide and setld(8) for information on installing subsets.

After you install the SSO software on the Tru64 UNIX system, you configure the SSO software and the Kerberos SIA mechanism. You can optionally configure the SSO software in a TruCluster Server environment

C.4.2.1    Configuring the SSO Software

You must run the /usr/sbin/w2ksetup script to configure the SSO software. The /usr/sbin/w2ksetup script will prompt you for the following required information:

Follow these steps to configure the SSO software:

  1. Add an entry in the /etc/hosts file for the Windows 2000 Server. See hosts(4) for more information.

  2. Start the SSO setup script:

    # /usr/sbin/w2ksetup

    You are prompted to run the SSO setup script.

  3. Enter yes when asked if you want to run the SSO setup script:

    Do you want to run the setup script now? [y/n]? y
    

    The following information is displayed:

    Running /usr/sbin/w2ksetup... 
    /usr/sbin/w2ksetup[79]: 2598 Terminated
    

    Note

    If you enter no when asked if you want to run the SSO setup script, you will return to the command prompt. You can run the SSO setup script later by entering the following command.

    # /usr/sbin/w2ksetup

    You are prompted for the name of the Windows 2000 domain that the Tru64 UNIX system will use for authentication.

  4. Press the Enter key to use the default name or enter a domain name and press the Enter key:

    Enter the name of the Windows 2000 domain. This is in 
    the form domain.com - Typically the Windows 2000 domain is 
    the same as the DNS domain. 
     
    Domain: [SSO.CORP.COM]
    

    You are prompted for the name of the Windows 2000 host name controller.

  5. Press the Enter key to use the default name or enter a host name and press the Enter key:

    Enter the hostname of a Windows 2000 domain controller.
    Domain Controller: w2khost.sso.corp.com
    

    Note

    If you are unable to communicate with the Windows 2000 domain controller, check the /etc/hosts file for an entry with the fully qualified domain name of the Windows 2000 domain controller. If it is missing, add it to the file. Also verify that system time on the client and server systems is the same, because a large time difference between the two systems can cause communication problems.

    To create a machine account for the Tru64 UNIX system on the Windows 2000 domain controller, you must provide the name and password of a user account with administrative privileges on the Windows 2000 KDC.

    The following information is displayed:

    To create the machine account, you must be logged
    in as root and have admin Kerberos credentials. For security
    reasons Windows 2000 does not allow anyone to authenticate
    through Kerberos using the Administrator account. Therefore
    you must choose an account other than the Administrator
    account that has admin privileges. The username of an account
    must be in the Windows 2000 KDC
    

  6. Enter the user name and password of an account in the Windows 2000 KDC with administrative privileges:

    Enter Admin principal: user
    Password for user@SSO.CORP.COM:
    

    The following information is displayed:

    Adding unixhost.sso.corp.com to directory...
     
    Extracting host/unixhost.sso.corp.com key...
     
    Updating /etc/ldapcd.conf...
     
    The machine account has been set up. 
    You might need to set permissions in Windows 2000 
    to enable access to the UNIX information in the 
    user objects. Please see the Windows documentation 
    for further information.
    

    You are prompted to start the Windows 2000 services.

  7. Enter yes to the following question if you want to start services immediately:

    Do you want to start the Windows 2000 services now? [y/n]?: y
    

    The following information is displayed:

    LDAP caching daemon (ldapcd) started
     
     
    

  8. Restart the X server:

    # /sbin/init.d/xlogin restart

C.4.2.2    Configuring the SSO Software in a TruCluster Server Environment

Follow these steps to configure the SSO software in a TruCluster Server environment:

  1. Run the /usr/sbin/w2ksetup script on each TruCluster Server member (Section C.4.2.1).

  2. For each cluster alias, enter the following command on the last TruCluster Server member on which you ran the /usr/sbin/w2ksetup script:

    # creacct -h fully_qualifed_cluster_alias_name -u
    

    This command adds the fully qualified cluster alias name to the Active Directory to allow SSO log in when using the cluster alias.

C.4.2.3    Adding Other SIA Mechanisms with Kerberos (if required)

The Kerberos SIA mechanism must be the first entry in the SIA mechanism configuration file (/etc/sia/matrix.conf). The SSO installation procedure complies with this restriction. However, if you add other SIA security mechanisms, you must use the /usr/sbin/siacfg command to remove the Kerberos entry, add the other entries, then add back the Kerberos entry. For example:

  1. Remove the Kerberos entry:

    # siacfg -r Kerberos

  2. Add the new entries:

    # siacfg -a sianew /location

  3. Add back the Kerberos entry:

    # siacfg -a -P -g sci Kerberos /usr/shlib/libcsfsiad.so

C.5    SSO Configuration Files on Tru64 UNIX

Table C-1 identifies SSO configuration files on Tru64 UNIX.

Table C-1:  SSO Configuration Files

File Contains
krb.conf

The host computer's default realm. Associates known realms to their primary and secondary Kerberos servers by host name and network location.

krb.realms

Server names and their associated realm names.

v5srvtab

The principal keys extracted from the principal database on the Kerberos server.

.k5login

A list of principals authorized to access a specific user account.

ldapcd.conf

SSO caching parameters that you can tune for performance.

ldapusers.deny

An entry for each local Tru64 UNIX user who is authenticated only by Tru64 UNIX when SSO is installed.

C.5.1    The krb.conf File

The /krb5/krb.conf file is a text file that contains Kerberos realm information. The information defines the system's default realm and associates known realms to their primary and secondary Kerberos servers by host name and network location.

If you can configure the name of the Kerberos server by using default naming conventions (that is, the ordering convention or the DNS rotary convention), you do not need to configure and maintain a krb.conf file.

If the krb.conf file is not found, is empty, or does not list a valid default realm, the Tru64 UNIX operating system converts the host's domain name to uppercase letters and uses that as the default realm name. If the Kerberos server information is missing from the krb.conf file, the Tru64 UNIX operating system attempts to locate the Kerberos server when the default naming conventions are in place.

In the krb.conf file, each entry must be on a separate line, fields are separated by spaces or tabs, comments are preceded by a number sign (#) (characters after a number sign are ignored to the end of line), and blank lines and leading or trailing white space on a line are ignored.

The order of entries in the krb.conf file is important, because it identifies the order in which Kerberos servers are used. Applications read the entries one at a time in the listed order when attempting to connect to a Kerberos server. Secondary Kerberos servers are used when another Kerberos server is unavailable or a network timeout has occurred (for example, during the authentication sequence when the network connection between the client and a Kerberos server is interrupted).

Example C-1 shows a sample krb.conf file.

Example C-1:  Sample krb.conf File

BIZ.COM  [1]
BIZ.COM shoe.biz.com admin server  [2]
BIZ.COM sneakers.biz.com  [3]
BIZ.COM boot.biz.com
FOOTWEAR.BIZ.COM leather.footwear.biz.com admin server  [4]
 
 

The entries in Example C-1 create the following configuration:

  1. The first line identifies the name of the system's default realm. Realm names are in uppercase letters to distinguish them visually from domain names. You must type the correct case for the realm name if your site does not follow the uppercase convention. In the sample, BIZ.COM is the name of the system's default realm. [Return to example]

  2. The second line identifies the realm name and fully qualified domain name (FQDN) of the primary Kerberos server for the realm. In Example C-1, shoe.biz.com is the FQDN of the primary Kerberos server. [Return to example]

  3. The next lines identify the realm name and the FQDN of the secondary Kerberos servers in the realm. In Example C-1, sneakers.biz.com and boot.biz.com are the names of secondary Kerberos servers. [Return to example]

  4. The next line identifies the name of the realm where interrealm authentication is performed. Interrealm authentication is when a realm accepts authentication from other realms without reauthentication. The line also identifies the FQDN of the Kerberos server followed by admin server, and optionally a tcp/port #.

    By default, UDP is the default communication protocol and does not need to be specified. If the Kerberos server uses TCP for its communication protocol, you must specify tcp and the port # that TCP uses. To specify a port value, use a numeric value or a service name listed in the /etc/services file, such as tcp/88 or tcp/kerberos5.

    In Example C-1, FOOTWEAR.BIZ.COM is the realm name and leather.footwear.biz.com is the Kerberos server. The server is using the default UDP communication protocol. [Return to example]

See krb.conf(4) for more information.

C.5.2    The krb.realms File

The /krb5/krb.realms file is a text file that contains Kerberos server names and their associated Kerberos realm names. Secured applications use the krb.realms file to determine the realm from which to request a ticket. By default, the Tru64 UNIX operating system converts the server's name to uppercase letters and uses that as the realm name. In this case, you do not need to configure and maintain a krb.realms file.

Wildcards are special characters in the krb.realms file that associate multiple servers to a single realm by using one entry.

There are two permitted wildcard characters:

When secure applications search the krb.realms file, they check for a matching server name, then a matching domain name. If they do not find a match, they check for a wildcard match. If no associated entry applies or if the krb.realms file does not exist, the secure application converts the server's domain name to uppercase letters and uses that as the default.

The order of the entries in the krb.realms file is not important. Each entry must be on a separate line and requires two fields, separated by a space or a tab and formatted as follows:

To create comments in the krb.realms file, use the number sign (#). Any characters after a number sign are ignored to the end of the line. Blank lines and any leading or trailing white space on a line are also ignored.

Example C-2 shows a sample krb.realms file.

Example C-2:  Sample krb.realms File

footwear.biz.com SERIOUS.BIZ.COM  [1]
.admin.biz.com ADMIN.BIZ.COM  [2]
*.biz.com BIZ.COM  [3]
 
 

The entries in Example C-2 create the following associations:

  1. Associates the server footwear.biz.com with the SERIOUS.BIZ.COM realm. [Return to example]

  2. Associates all servers in the admin.biz.com domain with the ADMIN.BIZ.COM realm.

    Notice the addition of a preceding period identifies the first field as a domain name rather than a server name. Typically, this line is not required because the realm name is the uppercase letter equivalent of the domain name. However, in this example, it is required to prevent mapping the servers in the admin.biz.com domain to the BIZ.COM realm by the third line. [Return to example]

  3. Associates all other servers in other domains with the root name biz.com with the BIZ.COM realm. For example, servers in sales.biz.com and support.teams.biz.com domains are mapped to the BIZ.COM realm. [Return to example]

See krb.realms(4) for more information.

C.5.3    The v5srvtab File

The /krb5/v5srvtab service key table file is a binary file that contains the principal keys extracted from the principal database on the Kerberos server. A Kerberos client, such as Tru64 UNIX, uses the key information in the service key table to reauthenticate a principal. That is, after the Kerberos server initially authenticates a principal, a Kerberos client can reauthenticate a principal if its key is in the service key table.

See v5srvtab(4) for more information. See Section C.7.4 for information on managing the /krb5/v5srvtab service key table file.

C.5.4    The .k5login File

The /krb5/.k5login file is a hidden text file that contains a list of principals authorized to access a specific user account. Unauthorized access to the .k5login file jeopardizes the integrity of the user's account.

If you configure the Kerberos secured daemons to use .k5login authorization, each user must have a private authorization list in a .k5login file stored in the user's home directory. The list determines which principals are allowed to access the user's account.

Only the user can own and have write permissions to the user's .k5login file. Otherwise, authentication fails and users receive a permission denied error message.

The .k5login file has one entry per line. An entry is a full principal name spelled exactly as it appears in the principal database. Do not include comments or trailing spaces at the end of a line.

Example C-3 shows a sample .k5login file configured for a user named Jack who normally logs in as jack@COMPANY.COM, but wants to also log in as the principal jack_hill@COMPANY.COM. In addition, he wants to grant the principal jill@HR.COMPANY.COM access to his account.

Example C-3:  Sample .k5login File

jack@COMPANY.COM  
jack_hill@COMPANY.COM
jill@HR.COMPANY.COM

To log in to the account, Jack and Jill must enter the following information:

# rlogin hostname -l username 
 

For example, Jack would enter the following command to log in to a server called server1:

# rlogin server1 -l jack

C.5.5    The ldapcd.conf File

The /etc/ldapcd.conf is a text file that contains SSO caching parameters. If users are waiting an unusually long time for the Tru64 UNIX system to respond, you can tune the Windows 2000 SSO software by using a text editor to change the values of the caching parameters in the ldapcd.conf text file located on the Tru64 UNIX system.

Example C-4 shows an ldapcd.conf file. Comment lines begin with a pound sign ( # ). Table C-2 describes caching parameters.

Example C-4:  Sample ldapcd.conf File

# configuration file for ldapcd
#
# format of the file is <id>: <value>
# values that contain spaces, or : or # must be quoted
# if an id listed but no value specified the id will
# use the default value 
#
# max entries in cache, and number of seconds before entries
# expire in the cache
#
connections: 4
pw_cachesize:	500
pw_expirecache:	900
gr_cachesize:	100
gr_expirecache: 900
 
usesasl: 1
 
directory: server1
searchbase: "cn=users,DC=SSO,DC=CORP,DC=COM"
machine_acctname: emerald.ne.corp.com
machine_dn: "cn=emerald,cn=computers,DC=SSO,DC=CORP,DC=COM"
 
 

Table C-2:  Caching Parameters

Parameter Description
connections

The number of open connections that the caching daemon can make to the Active Directory.

Increasing the value of this entry opens more connections to the Active Director; however, this consumes more file descriptors and increases the load on the Active Directory.

Typically, 4 connections are adequate for a workstation, and 15 connections are adequate for a server.

Default: 4 connections

pw_cachesize

The maximum number of user entries to store in cache.

Increase or decrease this value as the maximum number of users increases or decreases.

Default: 500 entries

pw_expirecache

The maximum number of seconds to cache a user entry.

Increasing this value increases Tru64 UNIX performance, because a user's entry is readily available in the cache.

If you delete a recently used user account, its entry remains in the cache for the amount of time specified by this parameter.

Default: 900 seconds

gr_cachesize

The maximum number of group IDs to cache.

Increasing this value increases Tru64 UNIX performance, because group IDs are readily available in the cache.

Default: 100 group IDs

gr_expirecache

The maximum number of seconds to cache group IDs.

Default: 900 seconds

Note

If you change the value of a cache parameter in the /etc/ldapcd.conf file, you must enter the following command to restart the caching daemon:

# /sbin/init.d/ldapcd restart

See ldapcd.conf(4) for more information.

C.5.6    The ldapusers.deny File

The /etc/ldapusers.deny file is a text file that contains an entry for each Tru64 UNIX user who is authenticated only by Tru64 UNIX when SSO is installed.

You must enter only one user name per line, and the user name must exactly match a user name in the /etc/passwd file.

To create comments, use the number sign (#). Any characters after a number sign are ignored to the end of the line. Blank lines and any leading or trailing white space on a line are also ignored.

Example C-5 shows a sample ldapusers.deny file.

Example C-5:  Sample /etc/ldapusers.deny File

# The following file lists account names that are not allowed to use 
# the Windows 2000 authentication information when it is enabled.
# Account names must match exactly the user account name in the 
# /etc/passwd file.
#
# Syntax: account_1
#            .
#            .
#            .
#         account_n
root
nobody
nobodyV
daemon
bin
uucp
uucpa
auth
cron
lp
tcb
adm
ris
wnn
pop
imap
Peter
Dave
Evan
Martha
 
 

See ldapusers.deny(4) for more information.

C.6    Creating Accounts and Groups

You must create user accounts, computer accounts, and groups on the Windows 2000 Server if they are to be authenticated by the Windows 2000 Server. User accounts and groups created on the Tru64 UNIX system are created in accordance with the Tru64 UNIX user account and group policy on that system and are not authenticated by a Windows 2000 Server.

This section describes how to:

C.6.1    Creating a User Account

To create user accounts on the Windows 2000 Server, you can use:

C.6.1.1    Creating a User Account Using the Tru64 UNIX creacct Command

To create a user account using the creacct command, enter:

# creacct -a username

You are prompted for the following information:

See creacct(1) for more information.

C.6.1.2    Creating a User Account Using the MMC Interface

Follow these steps to use the MMC interface to create a user account:

  1. Display the Active Directory Users and Computers window:

    1. Click on the Start button.

    2. Choose Program, Administrative Tools, and then Active Directory Users and Computers.

    The Active Directory Users and Computers window is displayed.

  2. If necessary, highlight the Users folder. From the Action menu, choose New, and then User.

    The New Object — User Window (Figure C-1) is displayed:

    Figure C-1:  New Object — User Window: Required Information

  3. Enter the required information in the New Object — User window, then click on the Next button. The First name and Initial fields are optional.

    A second New Object — User window (Figure C-2) is displayed:

    Figure C-2:  New Object — User Window: Password Information

  4. Enter a password and select password options, then click on the Next button.

    A confirmation window is displayed.

  5. Click on the Continue button to create the user account, or click on the Cancel button to quit without creating the user account.

    If you choose to continue, the Active Directory Users and Computers window is displayed.

  6. Double click on the name of the account that you just created.

    A properties dialog box for the user is displayed.

  7. Click on the Tru64 UNIX tab.

    The Tru64 UNIX user properties dialog box (Figure C-3) is displayed.

    Figure C-3:  Tru64 UNIX User Properties Dialog Box

  8. Enter Tru64 UNIX user account information. Tru64 UNIX user account restrictions apply; for example, the length of the Tru64 UNIX user account name cannot exceed the maximum length determined by the Tru64 UNIX operating system software. See System Administration for more information on Tru64 UNIX user account restrictions.

    Note

    If you do not specify a valid home directory, the default value is set to the root (/) directory. The .profile file or the .cshrc file in the root directory sets the environment path to first check the /sbin directory when Tru64 UNIX commands are executed. As a result, the ls -l command will not work as expected when the home directory is set to the root directory.

    When you move your mouse over an attribute, a description of that attribute is displayed in the Description section of the window.

  9. Enter Tru64 UNIX user account attribute information and click on the OK button.

    The Active Directory User and Group window is displayed.

C.6.2    Setting a Principal's Password

To set a principal's password, you can use the Microsoft Management Console (MMC) interface or the Tru64 UNIX creacct command.

To use the creacct command to set a password, enter:

# creacct -s principal

You are prompted for the name and password for an administrative account on the Windows 2000 Server, then for the principal's password.

See creacct(1) for more information about the creacct command.

See your Windows 2000 documentation for information on using the MMC interface to set passwords.

C.6.3    Creating a Computer Account

Creating a computer account creates the account on the Windows 2000 Server and adds it to the key service table. All computer accounts are added to the current domain in the Active Directory under the Computers group.

Follow these steps to create a computer account:

  1. Enter the creacct command specifying the fully qualified computer name:

    # creacct -h computer_name [-t keytable] [-u]

    You are prompted for the user name and password of a principal who has administrator privileges on the Windows 2000 Server.

  2. Enter the user name and password.

    The Active Directory is searched first for the specified computer. If an entry is found, you are prompted to replace or modify the existing entry.

  3. Choose:

See creacct(1) for more information.

C.6.4    Creating a Group

You must use the MMC interface to create groups on the Windows 2000 Server. You can create a group of which Tru64 UNIX and Windows 2000 users are members.

Follow these steps to create a group:

  1. Display the Active Users and Computers window:

    1. Click on the Start button.

    2. Choose Program, Administrative Tools, and then Active Directory Users and Computers.

    The Active Directory Users and Computers window is displayed.

  2. If necessary, highlight the Users folder. From the Action menu, choose New, and then Group.

    The New Object — Group window is displayed.

  3. Enter the name of the group and click on the OK button.

    The Active Directory Users and Computers window is displayed.

  4. Double click on the name of the group that you just created.

    A properties dialog box for the group is displayed.

  5. Click on the Tru64 UNIX tab.

    The Tru64 UNIX properties dialog box for the group (Figure C-4) is displayed.

    Figure C-4:  Group Properties Dialog Box

  6. Enter Tru64 UNIX group information.

    When you move your mouse over an attribute, a description of that attribute is displayed in the Description section of the window.

  7. Enter Tru64 UNIX group attribute information and click on the OK button.

    The Active Directory User and Group window is displayed.

C.7    Managing the SSO Software

This section describes how to:

C.7.1    Requesting Tickets

Use the /sbin/kinit command to request tickets.

The syntax of lifetime and postdate options is [nw][nd][nh][nm][ns], where w = weeks, d = days, h = hours, m = minutes, and s = seconds. No spaces are allowed unless they are enclosed in quotation marks. For example, "1w 2d 3h 4m 5s". The default lifetime and postdate options are in hours unless otherwise specified.

If the requested postdate time period is less than the server's clock skew value (typically five minutes), the ticket's start time is set to the current time and it is issued as if the -d option had not been specified.

See kinit(1) for more information about requesting tickets.

C.7.2    Displaying Tickets

Use the /sbin/klist command to display the tickets stored in the credentials cache.

See klist(1) for more information about displaying tickets.

C.7.3    Removing the Credential Cache

To destroy all the tickets in a specific credential cache and remove the credential cache, enter:

# kdestroy  [-c cachename]

For example, to destroy all the tickets in a credential cache called /var/tmp/mycache, enter:

# kdestroy -c /var/tmp/mycache

See kdestroy(1) for more information about removing tickets.

C.7.4    Managing the Service Key Table

Use the /sbin/ktutil command to display and delete entries in the service key table file, destroy the service key table, and merge service key tables.

Use the /usr/sbin/creacct command to extract keys from the Windows 2000 Server and add them to the service key table. When using the /usr/sbin/creacct command, you are prompted for the user name and password of a principal who has administrative privileges on the Windows 2000 Server.

The default service key table file is /krb5/v5srvtab. This file is owned by the root user account.

See ktutil(1) and creacct(1) for more information about managing the service key table.

C.8    Troubleshooting the SSO Software

Because of the many interlocking dependencies that the SSO software has across multiple operating systems, it is critical that the setup procedures are followed exactly as described in Section C.4. If they are not, then the SSO software will not work properly, as generally signified with an invalid login response message. The majority of SSO problems are setup problems and can be found quickly by validating the setup of the SSO software.

C.8.1    SSO Configuration Problems

If the administrative account is not accepted as being valid when running the /usr/sbin/creacct command or the /usr/sbin/w2ksetup script, verify that the administrative account is a member of the Administrators, DnsAdmins, Domain Admins, Domain Users, and Users groups on the Windows 2000 domain controller.

When the Active Directory is created on the Windows 2000 server, its name must be specified in lower case. All other references to this name, which is the Kerberos Realm name, must be entered in upper case on all platforms.

C.8.2    Problems Using the kinit Command or Obtaining an Initial Ticket on Tru64 UNIX

Follow these steps if you are having trouble when entering the kinit command or receiving an initial ticket when logging in to the Tru64 UNIX system:

  1. Verify that the /etc/sia/matrix.conf file has an entry for LDAP and Kerberos by entering the following command to display the contents of the matrix.conf file and looking for LDAP and Kerberos related entries in the display:

    # more /etc/sia/matrix.conf
     
     
    

    If the /etc/sia/matrix.conf file does not include the entries, enter the following commands:

    # siacfg -r LDAP > /dev/null
    # siacfg -r Kerberos > /dev/null
    # siacfg -a -g pg -P LDAP /usr/shlib/libsialdap.so > /dev/null
    # siacfg -a -P -g sci Kerberos /usr/shlib/libcsfk5siad.so > /dev/null
    

  2. Verify that there is an entry in the /etc/hosts file for the KDC; for example:

    12.345.67.890   w2khost.mycompany.com w2khost  
     
    

    This step generally solves the problem when the initial /usr/sbin/w2ksetup utility is run and the following error message is displayed after the administrator's name and password are entered:

    ldap_gssapi_bind: Operations error
     
    

  3. Verify that the /krb5/krb.conf and /krb/krb.realms files are set up correctly.

    Example krb.conf file:

    MYCOMPANY.COM 
    MYCOMPANY.COM  w2khost.mycompany.com admin server
    

    Example krb.realms file:

    *.mycompany.com MYCOMPANY.COM 
     
    

  4. Verify that the time on the KDC and the client are the same. A few minutes difference is acceptable, but should not exceed more than five (5) minutes.

  5. Verify that the v5srvtab file is working correctly by entering the following command to extract the key:

    # kinit -k 
    

    If the command fails, rerun the /usr/sbin/w2ksetup script or delete the /krb5/v5srvtab file, then enter the following command:

    # /usr/sbin/creacct -h mymachinename -u
    

C.8.3    Password Prompting on Tru64 UNIX

Follow these steps if you are able to get a ticket from the kdc, but are still prompted for a password during subsequent logins on the Tru64 UNIX system:

  1. Verify that a service ticket can be acquired for the target host by entering the following command:

    #  kinit -S host/targetmachinename.mycompany.com  
     
    

    If this command fails, the host that you are trying to access is not part of the Kerberos realm. To correct this, enter the following command:

    # /usr/sbin/creacct -h targetmachinename.mycompany.com -u
    

  2. Verify that the first line of the /krb5/krb.conf files are the same on the current host and the target host.

  3. Verify that there are no entries in the /etc/ldapusers.deny file or in the .k5login file in the users home directory that prevents login.

  4. Verify that the /etc/services and /etc/inetd.conf files are set up correctly and contain the following entries:

    Note

    • Add -x to the end of the two lines in the inetd.conf file if you want encrypted communications.

    • If you changed the inetd.conf file, you must enter the following command to restart the network:

      # rcinet restart
      

C.8.4    Problems with SSO in a TruCluster

Follow these steps if the SSO software is not working correctly on cluster members in a TruCluster:

  1. Verify that the /etc/ldapcd.conf file contains the following entries defined for each cluster member:

    directory: 
    searchbase: 
    machine_acctname: 
    machine_dn:
    

    If these entries do not display for a cluster member, rerun the /usr/sbin/w2ksetup script on that cluster member.

  2. Enter the following command and verify that an entry for each cluster member is displayed:

    # /usr/sbin/ktutil
    

    If an entry for each cluster member is not displayed, enter the following command:

    # /usr/sbin/creacct -h missingmembername -u