Configuring a Kerberos Provider using the VAST Web UI
The steps below add a Kerberos provider to the cluster, with a principal service (e.g. NFSv4).
On the VAST Web UI, navigate to the User Management page, and select the VAST Providers tab.
Click Add New Provider (in the upper right), and select Kerberos.
In the General section of the form, complete these fields:
Realm
Enter the realm for the Kerberos provider. A realm is the administrative domain that defines the boundary for Kerberos authentication. It typically maps to an organization or network and includes a Key Distribution Center (KDC) that manages all principals (users, services) within it.
For example, in a company with domain example.com, the Kerberos realm is often written in uppercase as EXAMPLE.COM. All authentications for users and services like alice@EXAMPLE.COM or host/server.example.com@EXAMPLE.COM are handled by the KDC for that realm.
Service Principals
Enter a list of service principals (for NFS) in the Kerberos realm. These are used by NFS clients in the authentication process. For example,
nfs/vippool.mydomain.com, wherevippoolrepresents a CNode in a cluster (and whose DNS name resolves to the cluster).Enter a service principal, and click Add Service Principal. The principal appears in the list. Repeat for additional principals.
Click Create Kerberos and Configure. This creates the Kerberos provider in VMS, and enables configuration settings to be set in the following tabs.
Optionally, in the Kadmin section, enter a list of IP addresses or FQDNs for the Kerberos kadmin server. Enter each address, and then then click Add. The address appears in the list. Repeat for additional addresses, up to five addresses. This step is only necessary if you are manually generating a keytab files (step Step 7.1, below).
In the Key Distribution Center (KDC) List section, enter a list of IP addresses or FQDNs for the KDC. Enter each address, and then click Add. Repeat for additional addresses, up to ten addresses.
In the Keytab File section, you can manually generate a keytab file for principals defined in the General section, using a username and password (of the Kerberos admin), or upload an existing keytab file to VMS.
Select Generate Keytab File to generate a keytab file manually. Enter the username and password (for the Kerberos admin), then click Generate Keytab File. A keytab file is generated for the service principals listed in the General section.
Alternatively, select Upload Keytab File. Drag a keytab file over the Keytab File field, or click on it to browse to a file on your computer. Click
to upload the file. See below, Creating a Keytab File for the Kerberos Provider, for details on creating a keytab file.
Click Save Kerberos.
Enabling or Disabling the Kerberos Provider
When you create a new Kerberos provider on VAST Cluster, it is initially disabled.
Follow these steps to enable the provider.
On the VAST Web UI, navigate to the User Management page, and select the Kerberos tab.
Right-click on the provider to be enabled, and select Enable. The status of the provider in the list changes to Enabled.
Follow these steps to disable the provider.
On the VAST Web UI, navigate to the User Management page, and select the Kerberos tab.
Right-click on the provider to be disabled, and select Disable. The status of the provider in the list changes to Disabled.
Modifying Details for a Kerberos Provider Using the VAST Web UI
On the VAST Web UI, navigate to the User Management page, and select the Kerberos tab.
Right-click on the Kerberos provider in the list, and select Edit.
In the General tab, you can add additional service principals, or remove them from the list. You cannot change the Realm. To remove a principal, right-click on it and select Remove.
In the Kadmin server tab, you can add additional addresses, or remove existing ones. To remove an address, select it in the list and click
.In the Key Distribution Center (KDC) List tab, you can add additional addresses, or remove existing ones. To remove an address, select it in the list and click
.In the Keytab tab, you can generate or upload additional keytab files. The
Generateoption regenerates the keytab file for the same service principals defined in the General section. TheUpload Keytab Fileoption uploads a file, with service principals. Entries for existing service principals are replaced by the entry in the file.After making changes to the provider, click Save Kerberos.
Removing a Kerberos Provider Using the VAST Web UI
In order to remove a Kerberos provider, all tenants associated with it must first be removed from it. Only then can it be deleted.
On the VAST Web UI, navigate to the User Management page, and select the Kerberos tab.
Right-click on the Kerberos provider in the list, and select Remove.
Configuring Kerberos with VAST Local Providers
If a local provider is associated with a tenant, the users in the local provider should be added as user principals in Kerberos (using kadmin).
Configuring Kerberos with LDAP
If an LDAP provider is associated with a tenant, the LDAP domain should be the same as the Kerberos realm. Users in the LDAP provider should be added as user principals in Kerberos.
Associating Kerberos Providers with Tenants
You can associate a Kerberos provider with tenants on the cluster, as with any other local provider. This is done in the Tenants tab of the Elements page.
Creating a Keytab File for the Kerberos Provider
You can generate keytab files for the Kerberos provider using external utilities, depending on the flavor of Kerberos provider you are using.
For MIT Kerberos, use kadmin as follows:
$ kadmin -p <admin> ktadd -k <keytab> <principal>
where admin are the credentials for the admin user on the Kerberos provider, and principal is the principal added to the keytab file.
For Heimdal Kerberos, the form would be like this:
# kadmin -p <admin> ext_keytab -k <keytab> <principal>
For FreeIPA, use:
$ kinit <admin> Password for <admin> $ ipa-getkeytab -k <keytab> -p <principal>
where admin is the admin user on the Kerberos provider, and principal is the principal added to the keytab file.
Configuring Kerberos using the VAST CLI
To configure a Kerberos provider using the VAST CLI, use these commands:
Add a new Kerberos provider. | |
Modify an existing Kerberos provider. | |
Remove a Kerberos provider. | |
Show details for a Kerberos provider. |
To associate a Kerberos provider with cluster tenants, using the VAST CLI, use these commands:
Create a new tenant and associate it with a Kerberos provider. | |
Associate an existing tenant with a Kerberos provider. |