Eliminating the dependency on the kadmind daemon during authentication
The KRB5 load module may fail authentication when the kadmind daemon is not available. This dependency can be eliminated by setting the kadmind parameter in the methods.cfg file.
The possible values are kadmind=no
or kadmind=false
for disabling the kadmind lookups and kadmind=yes
or kadmind=true
for enabling kadmind lookups (the default value is yes). When this option
is set to no, the kadmind daemon is not contacted during authentication.
Therefore, users can log into the system regardless of the status
of the kadmind daemon provided that the user enters the correct
password when the system prompts for one. However, AIX user administration
commands such as mkuser, chuser, or rmuser will not work to administrate Kerberos
integrated users if the daemon is not available (for example, either
the daemon is down or the machine is not accessible).
The
default value for the kadmind parameter is yes
. This means that kadmind lookups are performed during authentication.
In the default case, if the daemon is not available, the authentication
might take longer.
KRB5:
program = /usr/lib/security/KRB5
options = kadmind=no
KRB5files:
options = db=BUILTIN,auth=KRB5
When the kadmind daemon is not available, the root
user will not be able to change user passwords. In a situation such
as a forgotten password, you must make the kadmind daemon available.
Also, if a user chooses to enter a Kerberos principal name at the
login prompt, the primary name of the principal name will be truncated
according to the AIX user name length limitation. This truncated name will be used for AIX user identification
information retrieval (for example, to retrieve your home directory
value).3004-694 Error adding "krb5user": You do not have permission.
If the kadmind parameter is set to no
or
the kadmind daemon is not accessible, the system cannot validate
the principal’s existence in the Kerberos database, so it will not
retrieve Kerberos related attributes. This situation causes incomplete
or inaccurate results. For example, the lsuser command
might not report any users for the ALL query.Additionally, the chuser command will manage only AIX-related attributes and not Kerberos-related attributes. The rmuser command will not delete the Kerberos principal, and the passwd command will fail for Kerberos authenticated users.
If the network where the kadmind daemon resides is not
accessible, response time is delayed. Setting the kadmind option to no
in the methods.cfg file eliminates
the delays during authentication when the machine is not accessible.
When the kadmind daemon is down, users who have expired passwords cannot log in or change their passwords.
When you
set kadmind=no
but the kadmind daemon is running,
you can run the following commands: login, su, passwd, mkuser, chuser, and rmuser.