[19054] in Kerberos

home help back first fref pref prev next nref lref last post

Manageability of larger networks

daemon@ATHENA.MIT.EDU (Andreas Heilwwagen)
Sun Apr 13 06:49:18 2003

Message-ID: <3E994E8A.9000405@jamba.net>
Date: Sun, 13 Apr 2003 12:48:26 +0100
From: Andreas Heilwwagen <andreas.heilwagen@jamba.net>
MIME-Version: 1.0
To: kerberos@mit.edu
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Reply-To: andreas.heilwagen@acm.org
Errors-To: kerberos-bounces@mit.edu

Hello,

I've been diving into the LDAPv3 / Kerberos V world for a
week now and there is one question on this list from
10/18/2002 without an answer which is very interesting
to me:

  How am I supposed to manage a large number of
  machines with lots of application-specific accounts
  where I would like to autorize users to services using a
  group/role concept.

Background: I have 80 physical users, 10 roles, >20
linux and solaris servers and about 12 application
users. The whole system is a high-available apache /
weblogic / oracle architecture.

The ideal solution from my point of view would be to
user expressions like */portaladmin@<MYREALM>
to authorize a group of trusted users to administrate
the java application servers.
The final list of kerberized applications should
include openssh, apache, cvs and some others
using LDAP backed by Kerberos.

Otherwise I would have to introduce 20x12x<n> entries
to .k5login or .k5users files.

What concept is usually used to manage separate
user groups in the Kerberos world?


Looking forward,

Andreas


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post