Manage Kerberos KDC
In order to manage your KDC you will need to generate a keytab that can authenticate without requiring a password.
# ktadd -k /root/secure.keytab kadmin/admin kadmin/changepw
On the KDC minion you will need to add the following to the minion configuration file so Salt knows what keytab to use and what principal to authenticate as.
auth_keytab: /root/auth.keytab
auth_principal: kadmin/admin
Create keytab
CLI Example:
salt 'kdc.example.com' kerberos.create_keytab host/host1.example.com host1.example.com.keytab
Create Principal
CLI Example:
salt 'kdc.example.com' kerberos.create_principal host/example.com
Delete Principal
CLI Example:
salt 'kdc.example.com' kerberos.delete_principal host/example.com@EXAMPLE.COM
Get policy details
CLI Example:
salt 'kdc.example.com' kerberos.get_policy my_policy
Get princial details
CLI Example:
salt 'kdc.example.com' kerberos.get_principal root/admin
Current privileges
CLI Example:
salt 'kdc.example.com' kerberos.get_privs
List policies
CLI Example:
salt 'kdc.example.com' kerberos.list_policies
Get all principals
CLI Example:
salt 'kde.example.com' kerberos.list_principals
Generated on December 02, 2024 at 20:43:35 UTC.
You are viewing docs for the previous stable release, 3006.9. Switch to docs for the latest stable release, 3007.1, or to a recent doc build from the master branch.
© 2024 VMware, Inc. | Privacy Policy