Establishing generic host principals for Kerberos-protected callback paths

You can set up a callback path for IBM® Network Authentication Service (Kerberos).

The client receiving the delegation must be a full client with its own host principal. However, you can establish a generic host principal for all clients to use for callbacks.

To establish a generic host principal for all clients to use for callbacks, perform these steps:

  1. To create a service principal (for example, nfs/client) using the same method used to create a host principal, refer to Creating a Kerberos principal in Security.
  2. Create a keytab entry for that service principal.
    For example, to create a keytab called slapd_krb5.keytab, do the following:
    kadmin.local: ktadd -k /etc/security/slapd_krb5.keytab ldap/plankton.austin.ibm.com
    Entry for principal ldap/plankton.austin.ibm.com with kvno 2, 
    encryption type Triple DES cbc mode with HMAC/sha1 added to keytab 
    WRFILE:/etc/security/slapd_krb5.keytab.
    Entry for principal ldap/plankton.austin.ibm.com with kvno 2, 
    encryption type ArcFour with HMAC/md5 added to keytab WRFILE:/etc/security/slapd_krb5.keytab.
    Entry for principal ldap/plankton.austin.ibm.com with kvno 2, 
    encryption type AES-256 CTS mode with 96-bit SHA-1 HMAC added to keytab
    WRFILE:/etc/security/slapd_krb5.keytab.
    Entry for principal ldap/plankton.austin.ibm.com with kvno 2, 
    encryption type DES cbc mode with RSA-MD5 added to keytab WRFILE:/etc/security/slapd_krb5.keytab.
    kadmin.local:
    
  3. Distribute this keytab to all clients that will use it.
  4. Configure the clients with the nfshostkey command.
This process is identical to the process for configuring a server for use with Kerberos, but the generic principal cannot be used for servers; each server must have its own principal of the form nfs/hostname.