kerberos集群安装配置(十)
2017-03-31 10:52
267 查看
Kerberos集群规划
Kerberos安装配置
一、安装KDC server
二、修改配置文件
1)/etc/krb5.conf
2)/var/kerberos/krb5kdc/kdc.conf
3)/var/kerberos/krb5kdc/kadm5.acl
三、同步/etc/krb5.conf到其他服务器
四、创建数据库
五、启动服务
六、创建Kerberos管理员
七、测试Kerberos
1、安装KDC server
[root@cdh1 yum.repos.d]# yum install krb5-server krb5-auth-dialog krb5-libs krb5-workstation krb5-devel –y
[root@cdh2 yum.repos.d]# yum install krb5-workstation krb5-devel –y
[root@cdh3 yum.repos.d]# yum install krb5-workstation krb5-devel –y
2、修改配置文件
1)/etc/krb5.conf
[root@cdh1 yum.repos.d]# vi /etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = ZGP.COM
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = true
renewable = true
[realms]
ZGP.COM = {
kdc = cdh1:88
admin_server = cdh1:749
}
[domain_realm]
.zgp.com = ZGP.COM
zgp.com = ZGP.COM
[kdc]
profile=/var/kerberos/krb5kdc/kdc.conf
2) /var/kerberos/krb5kdc/kdc.conf
[root@cdh1 krb5kdc]# vi kdc.conf
[kdcdefaults]
kdc_ports = 88
kdc_tcp_ports = 88
[realms]
ZGP.COM = {
#master_key_type = aes256-cts
acl_file = /var/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
#supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
max_life = 24h
max_renewable_life = 10d
}
3)/var/kerberos/krb5kdc/kadm5.acl
[root@cdh1 krb5kdc]# vi kadm5.acl
*/admin@ZGP.COM *
3、同步/etc/krb5.conf到其他服务器
[root@cdh1 etc]# scp krb5.conf cdh2:/etc
[root@cdh1 etc]# scp krb5.conf cdh3:/etc
4、创建数据库
[root@cdh1 etc]# kdb5_util create -r ZGP.COM –s
[root@cdh1 html]# cat /dev/sda >> /dev/urandom 《===可以加快速度,随机数的采集
[root@cdh1 etc]# kdb5_util create -r ZGP.COM -s
Loading random data
Initializing database '/var/kerberos/krb5kdc/principal' for realm 'ZGP.COM',
master key name 'K/M@ZGP.COM'
You will be prompted for the database Master Password.
It is important that you NOT FORGET this password.
Enter KDC database master key: 《====要求输入密码,我们这里是oracle
Re-enter KDC database master key to verify:
[root@cdh1 etc]#
查看创建的数据库
[root@cdh1 etc]# cd /var/kerberos/krb5kdc/
[root@cdh1 krb5kdc]# ll
total 24
-rw------- 1 root root 18 Mar 30 03:52 kadm5.acl
-rw------- 1 root root 606 Mar 30 03:43 kdc.conf
-rw------- 1 root root 8192 Mar 30 04:22 principal
-rw------- 1 root root 8192 Mar 30 04:22 principal.kadm5
-rw------- 1 root root 0 Mar 30 04:22 principal.kadm5.lock
-rw------- 1 root root 0 Mar 30 04:22 principal.ok
[root@cdh1 krb5kdc]#
5、启动服务
[root@cdh1 krb5kdc]# service krb5kdc start
Starting Kerberos 5 KDC: [ OK ]
[root@cdh1 krb5kdc]# service kadmin start
Starting Kerberos 5 Admin Server: [ OK ]
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# chkconfig krb5kdc on
[root@cdh1 krb5kdc]# chkconfig kadmin on
6、创建Kerberos管理员
[root@cdh1 krb5kdc]# kadmin.local -q "addprinc root/admin"
Authenticating as principal root/admin@ZGP.COM with password.
WARNING: no policy specified for root/admin@ZGP.COM; defaulting to no policy
Enter password for principal "root/admin@ZGP.COM":
Re-enter password for principal "root/admin@ZGP.COM":
Principal "root/admin@ZGP.COM" created.
[root@cdh1 krb5kdc]#
7、测试
[root@cdh1 krb5kdc]# kadmin
Authenticating as principal root/admin@ZGP.COM with password.
Password for root/admin@ZGP.COM:
kadmin: ?
kadmin: list_principals
K/M@ZGP.COM
kadmin/admin@ZGP.COM
kadmin/cdh1@ZGP.COM
kadmin/changepw@ZGP.COM
krbtgt/ZGP.COM@ZGP.COM
root/admin@ZGP.COM
kadmin: add_principal jack
WARNING: no policy specified for jack@ZGP.COM; defaulting to no policy
Enter password for principal "jack@ZGP.COM":
Re-enter password for principal "jack@ZGP.COM":
Principal "jack@ZGP.COM" created.
kadmin: list_principals
K/M@ZGP.COM
jack@ZGP.COM
kadmin/admin@ZGP.COM
kadmin/cdh1@ZGP.COM
kadmin/changepw@ZGP.COM
krbtgt/ZGP.COM@ZGP.COM
root/admin@ZGP.COM
kadmin: delete_principal jack
Are you sure you want to delete the principal "jack@ZGP.COM"? (yes/no): yes
Principal "jack@ZGP.COM" deleted.
Make sure that you have removed this principal from all ACLs before reusing.
kadmin:
[root@cdh1 krb5kdc]# kinit root
kinit: Client not found in Kerberos database while getting initial credentials
[root@cdh1 krb5kdc]# kinit root/admin
Password for root/admin@ZGP.COM:
[root@cdh1 krb5kdc]# klist -e
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:41:59 03/31/17 04:41:59 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:41:59, Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha1-96
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kdestroy 《===毁灭票据
[root@cdh1 krb5kdc]# klist -e
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_0)
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kinit root/admin
Password for root/admin@ZGP.COM:
[root@cdh1 krb5kdc]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:46:18 03/31/17 04:46:18 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:46:18
[root@cdh1 krb5kdc]# kinit –R 《===更新票据
[root@cdh1 krb5kdc]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:46:32 03/31/17 04:46:32 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:46:18
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kadmin.local -q "ktadd kadmin/admin"
Authenticating as principal root/admin@ZGP.COM with password.
Entry for principal kadmin/admin with kvno 4, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type arcfour-hmac added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des-hmac-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des-cbc-md5 added to keytab WRFILE:/etc/krb5.keytab.
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# klist -k /etc/krb5.keytab
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
[root@cdh1 krb5kdc]#
Kerberos安装配置
一、安装KDC server
二、修改配置文件
1)/etc/krb5.conf
2)/var/kerberos/krb5kdc/kdc.conf
3)/var/kerberos/krb5kdc/kadm5.acl
三、同步/etc/krb5.conf到其他服务器
四、创建数据库
五、启动服务
六、创建Kerberos管理员
七、测试Kerberos
1、安装KDC server
[root@cdh1 yum.repos.d]# yum install krb5-server krb5-auth-dialog krb5-libs krb5-workstation krb5-devel –y
[root@cdh2 yum.repos.d]# yum install krb5-workstation krb5-devel –y
[root@cdh3 yum.repos.d]# yum install krb5-workstation krb5-devel –y
2、修改配置文件
1)/etc/krb5.conf
[root@cdh1 yum.repos.d]# vi /etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = ZGP.COM
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = true
renewable = true
[realms]
ZGP.COM = {
kdc = cdh1:88
admin_server = cdh1:749
}
[domain_realm]
.zgp.com = ZGP.COM
zgp.com = ZGP.COM
[kdc]
profile=/var/kerberos/krb5kdc/kdc.conf
2) /var/kerberos/krb5kdc/kdc.conf
[root@cdh1 krb5kdc]# vi kdc.conf
[kdcdefaults]
kdc_ports = 88
kdc_tcp_ports = 88
[realms]
ZGP.COM = {
#master_key_type = aes256-cts
acl_file = /var/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
#supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
max_life = 24h
max_renewable_life = 10d
}
3)/var/kerberos/krb5kdc/kadm5.acl
[root@cdh1 krb5kdc]# vi kadm5.acl
*/admin@ZGP.COM *
3、同步/etc/krb5.conf到其他服务器
[root@cdh1 etc]# scp krb5.conf cdh2:/etc
[root@cdh1 etc]# scp krb5.conf cdh3:/etc
4、创建数据库
[root@cdh1 etc]# kdb5_util create -r ZGP.COM –s
[root@cdh1 html]# cat /dev/sda >> /dev/urandom 《===可以加快速度,随机数的采集
[root@cdh1 etc]# kdb5_util create -r ZGP.COM -s
Loading random data
Initializing database '/var/kerberos/krb5kdc/principal' for realm 'ZGP.COM',
master key name 'K/M@ZGP.COM'
You will be prompted for the database Master Password.
It is important that you NOT FORGET this password.
Enter KDC database master key: 《====要求输入密码,我们这里是oracle
Re-enter KDC database master key to verify:
[root@cdh1 etc]#
查看创建的数据库
[root@cdh1 etc]# cd /var/kerberos/krb5kdc/
[root@cdh1 krb5kdc]# ll
total 24
-rw------- 1 root root 18 Mar 30 03:52 kadm5.acl
-rw------- 1 root root 606 Mar 30 03:43 kdc.conf
-rw------- 1 root root 8192 Mar 30 04:22 principal
-rw------- 1 root root 8192 Mar 30 04:22 principal.kadm5
-rw------- 1 root root 0 Mar 30 04:22 principal.kadm5.lock
-rw------- 1 root root 0 Mar 30 04:22 principal.ok
[root@cdh1 krb5kdc]#
5、启动服务
[root@cdh1 krb5kdc]# service krb5kdc start
Starting Kerberos 5 KDC: [ OK ]
[root@cdh1 krb5kdc]# service kadmin start
Starting Kerberos 5 Admin Server: [ OK ]
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# chkconfig krb5kdc on
[root@cdh1 krb5kdc]# chkconfig kadmin on
6、创建Kerberos管理员
[root@cdh1 krb5kdc]# kadmin.local -q "addprinc root/admin"
Authenticating as principal root/admin@ZGP.COM with password.
WARNING: no policy specified for root/admin@ZGP.COM; defaulting to no policy
Enter password for principal "root/admin@ZGP.COM":
Re-enter password for principal "root/admin@ZGP.COM":
Principal "root/admin@ZGP.COM" created.
[root@cdh1 krb5kdc]#
7、测试
[root@cdh1 krb5kdc]# kadmin
Authenticating as principal root/admin@ZGP.COM with password.
Password for root/admin@ZGP.COM:
kadmin: ?
kadmin: list_principals
K/M@ZGP.COM
kadmin/admin@ZGP.COM
kadmin/cdh1@ZGP.COM
kadmin/changepw@ZGP.COM
krbtgt/ZGP.COM@ZGP.COM
root/admin@ZGP.COM
kadmin: add_principal jack
WARNING: no policy specified for jack@ZGP.COM; defaulting to no policy
Enter password for principal "jack@ZGP.COM":
Re-enter password for principal "jack@ZGP.COM":
Principal "jack@ZGP.COM" created.
kadmin: list_principals
K/M@ZGP.COM
jack@ZGP.COM
kadmin/admin@ZGP.COM
kadmin/cdh1@ZGP.COM
kadmin/changepw@ZGP.COM
krbtgt/ZGP.COM@ZGP.COM
root/admin@ZGP.COM
kadmin: delete_principal jack
Are you sure you want to delete the principal "jack@ZGP.COM"? (yes/no): yes
Principal "jack@ZGP.COM" deleted.
Make sure that you have removed this principal from all ACLs before reusing.
kadmin:
[root@cdh1 krb5kdc]# kinit root
kinit: Client not found in Kerberos database while getting initial credentials
[root@cdh1 krb5kdc]# kinit root/admin
Password for root/admin@ZGP.COM:
[root@cdh1 krb5kdc]# klist -e
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:41:59 03/31/17 04:41:59 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:41:59, Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha1-96
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kdestroy 《===毁灭票据
[root@cdh1 krb5kdc]# klist -e
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_0)
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kinit root/admin
Password for root/admin@ZGP.COM:
[root@cdh1 krb5kdc]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:46:18 03/31/17 04:46:18 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:46:18
[root@cdh1 krb5kdc]# kinit –R 《===更新票据
[root@cdh1 krb5kdc]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@ZGP.COM
Valid starting Expires Service principal
03/30/17 04:46:32 03/31/17 04:46:32 krbtgt/ZGP.COM@ZGP.COM
renew until 04/06/17 04:46:18
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# kadmin.local -q "ktadd kadmin/admin"
Authenticating as principal root/admin@ZGP.COM with password.
Entry for principal kadmin/admin with kvno 4, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type arcfour-hmac added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des-hmac-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal kadmin/admin with kvno 4, encryption type des-cbc-md5 added to keytab WRFILE:/etc/krb5.keytab.
[root@cdh1 krb5kdc]#
[root@cdh1 krb5kdc]# klist -k /etc/krb5.keytab
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
3 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
4 kadmin/admin@ZGP.COM
[root@cdh1 krb5kdc]#
相关文章推荐
- 【大数据安全】Kerberos集群安装配置
- 【大数据安全】Kerberos集群安装配置
- 如何安装配置基于两台服务器的MySQL集群
- PostgreSQL 数据库集群和PL/Proxy配置安装指南
- Apache Tomcat集群安装配置
- Apache+Tomcat集群和负载均衡安装配置笔记
- 在SuSE集群上安装配置HDFS
- Linux下mysql集群(mysql cluster)安装配置手记
- Apache+Tomcat集群和负载均衡安装配置笔记
- 在VMWare中配置SQLServer2005集群 Step by Step(五)——SQLServer集群安装
- 无盘集群的安装配置——内核切根文件系统篇
- RHEL下安装配置基于2台服务器的MYSQL集群
- 安装大型 Linux 集群,第 1 部分: 简介和硬件配置
- 在VMWare中配置SQLServer2005集群 Step by Step(四)——集群安装
- JBoss安装,集群配置,负载均衡和session复制配置
- [转]PostgreSQL 数据库集群和PL/Proxy配置安装指南
- MYSQL的集群的安装与配置,已更新
- 安装大型 Linux 集群,第 2 部分: 配置管理服务器和安装节点
- 在VMWare中配置SQLServer2005集群 Step by Step(四)——集群安装
- mysql集群安装配置