in order to authenticate to a kerberos realm, the krb5-user and libpam-krb5 packages are needed, along with a few others that are not strictly necessary but make life easier. to install the packages enter the following in a terminal prompt:
sudo apt-get install krb5-user libpam-krb5 libpam-ccreds auth-client-config
the auth-client-config package allows simple configuration of pam for authentication from multiple sources, and the libpam-ccreds will cache authentication credentials allowing you to login in case the key distribution center (kdc) is unavailable. this package is also useful for laptops that may authenticate using kerberos while on the corporate network, but will need to be accessed off the network as well.
to configure the client in a terminal enter:
sudo dpkg-reconfigure krb5-config
you will then be prompted to enter the name of the kerberos realm. also, if you don't have dns configured with kerberos srv records, the menu will prompt you for the hostname of the key distribution center (kdc) and realm administration server.
the dpkg-reconfigure adds entries to the /etc/krb5.conf
file for your realm. you should have entries similar to the following:
[libdefaults] default_realm = example.com ... [realms] example.com = } kdc = 192.168.0.1 admin_server = 192.168.0.1 }
you can test the configuration by requesting a ticket using the kinit utility. for example:
kinit steve@example.com password for steve@example.com:
when a ticket has been granted, the details can be viewed using klist:
klist ticket cache: file:/tmp/krb5cc_1000 default principal: steve@example.com valid starting expires service principal 07/24/08 05:18:56 07/24/08 15:18:56 krbtgt/example.com@example.com renew until 07/25/08 05:18:57 kerberos 4 ticket cache: /tmp/tkt1000 klist: you have no tickets cached
next, use the auth-client-config to configure the libpam-krb5 module to request a ticket during login:
sudo auth-client-config -a -p kerberos_example
you will should now receive a ticket upon successful login authentication.