Created on 09-28-2015 03:37 PM - edited 09-16-2022 02:42 AM
I have Kerberos authentication working with a stand alone KDC. However, our next step is to allow users from another realm/domain to access the cluster. Obviously I followed the guide for cross realm configuration, but I am having little success. Does anyone know of another way to test the cross realm configuration without going through the cluster? Or at least how to turn on some more robust logging?
The authentication always stays on the local kdc and never tries to go out to the AD. I was under the impression that once the configurations with the cross realm principals were in place, kerberos would look first locally for an acount and then remotely. However I am guessing that I am completely off base. Here are my crossrealm entries in my KDC:
krbtgt/DATA.FOREST.COM@DATA.FOREST.COM
krbtgt/DATA.FOREST.COM@FOREST.COM
krbtgt/FOREST.COM@DATA.FOREST.COM
Here is my krb5.conf:
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = DATA.FOREST.COM
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = true
[realms]
DATA.FOREST.COM = {
kdc = ip-10-0-0-241.us-west-2.compute.internal
admin_server = ip-10-0-0-241.us-west-2.compute.internal
default_domain = data.forest.com
}
FOREST.COM = {
kdc = ip-10-0-0-251.us-west-2.compute.internal
admin_server = ip-10-0-0-251.us-west-2.compute.internal
default_domain = forest.com
}
[domain_realm]
.data.forest.com = DATA.FOREST.COM
data.forest.com = DATA.FOREST.COM
.forest.com = FOREST.COM
forest.com = FOREST.COM
Any assistance would be appreciated.
Created 10-01-2015 03:57 AM
Created 10-01-2015 03:57 AM
Created 10-02-2015 06:33 AM
Thanks this is very helpful. It seems that the problem was the encryption of the cross realm entries in the MIT KDC. Using kvno is a very quick way of testing.
Created 10-02-2015 06:44 AM
Created on 10-02-2015 07:09 AM - edited 10-02-2015 07:12 AM
To solve this I did a kinit <account>@FOREST.COM which goes to the remote (AD) domain and then klist -e to see what encryption types were being sent back. In my case we were getting aes256 and arcfour. The cross realm entries were only encrypted for arcfour, so I recreated the cross realm entries with all the encryption types being sent by the remote domain in my local KDC. So it looked like this:
addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal" krbtgt/DATA.FOREST.COM@DATA.FOREST.COM
addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal" krbtgt/DATA.FOREST.COM@FOREST.COM
after a restart of the local KDC things are working well. The most helpful piece was turning on debugging:
HADOOP_OPTS="-Dsun.security.krb5.debug=true"
Without the debugging I had no idea it was even trying to connect to the remote domain.
Created 01-31-2018 05:54 AM
Hi Harsha,
I need your help in Setting up Cross-Realm Auth between 2 secured clusters. How can i reach you?
Thanks,
Created 01-31-2018 05:55 AM
Created 01-31-2018 10:01 AM
Hello @Platform,
Since this is a community, you get the benefit of many people looking at your questions or issues.
We prefer to keep our discussions here public unless there are sensitive data involved.
Please start a new thread and explain what you have tried and what the result was and I and many others will be happy to help you out.
Thanks,
Ben
Created 02-28-2018 01:34 AM
Thanks... Following the cloudera Doc's I was able to sucessfully setup Cross-realm trust. Issue is with DNS.