User guide

Chapter 13: Command Line Interface
192
Kerberos and Dominion SX
The Dominion SX can use Kerberos authentication with the following
steps and as a result, Kerberos-based network mutual authentication,
and symmetric, also called private/secret, key cryptography can be
achieved in the CLI and GUI of the Dominion SX for remote user
authentication.
See the MIT Kerberos website for information about Kerberos, KDC,
kadmin, client machine setup, and the FAQs related to these topics.
1. Set your krb5.conf stanzas and ftp it using getkrbconfig
[configuration settings available in:
http://www.faqs.org/faqs/kerberos-faq/general/section-38.html]
2. Get a ticket using kinit.
3. Use kadmin to add the keys to /etc/krb5.keytab for
HTTP/FQDN@REALM and host/FQDN@REALM. These keys are
consistent across boots.
4. Remote authentication and authorization can be set up along with
Kerberos authentication. HTTP and telnet access will prompt you to
enter username and password. Currently Kerberos does not
automatically map to local or remote usernames.
5. Enable Kerberos.
6. After a reboot, the Dominion SX is ready for secure telnet and HTTP
protocol remote access.