Kerbros – Solaris – AD SSO

As a windows administrator I run into multiple scenarios where SSO is required –thus we have to setup UNIX to AD authentication via KERBROS.  This is from the Windows point of view and other steps are required by the UNIX admin to be performed that are not covered here.

First create a USER account in ADUC  for the UNIX server that will be doing SSO.  (yes from AD’s point of view the unix server is a user object and not a computer object)

Now you will use the kpass.exe utility to create the keytab file for the your user.  (This will create the KERBROS key )

The syntax can be confusing so let’s break down the fundamentals:

Domain: mydomain.com

Realm: MYDOMAIN.COM

UNIX Hostname:  uServer1

AD User Object: uServer1 / Password:Password

With that in mind here is the syntax:

 ktpass -princ host/uServer1.mydomain.com@MYDOMAIN.COM  -mapuser uServer1 -crypto DES-CBC-MD5 +DesOnly -pass Password -ptype KRB5_NT_PRINCIPAL -out uServer1.keytab

Targeting domain controller: DC1.mydomain.com

Using legacy password setting method

Successfully mapped host/uServer1.mydomain.com to uServer1.

Key created.

Output keytab to uServer1.keytab: Keytab version: 0x502

keysize 88 host/uServer1.mydomain.com@MYDOMAIN.COM ptype 1

(KRB5_NT_PRINCIPAL) vno 3 etype 0x3 (DES-CBC-MD5) keylength 8 (0x52df3b2f100ef4dc)

Account uServer1 has been set for DES-only encryption.

Now give the keytab file to the UNIX admin.

Important SOLARIS information— once you have generated the keytab file–if you ever have to regenerate in you will notce that the VNO 3 is appended almost like a versioning.  SOLARIS systems do not understand anything other than VNO3.  So you will have to completely delete the UNIX User account from AD then re-create a new object with the same name and re-run ktpass command to generate a new keytab with VNO3 properties.