Skip Headers

Oracle Advanced Security Administrator's Guide
Release 2 (9.2)

Part Number A96573-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback

Go to previous page Go to next page

6
Configuring Kerberos Authentication

This chapter describes how to configure Oracle Advanced Security for Oracle9i for use with Kerberos authentication--and how to configure Kerberos to authenticate Oracle database users. This chapter contains the following topics:

Enabling Kerberos Authentication

To enable Kerberos authentication:

Task 1: Install Kerberos

Install Kerberos on the system that functions as the authentication server.

See Also:

Notes about building and installing Kerberos from Kerberos version 5 source distribution for information about how to install Kerberos.

Task 2: Configure a Service Principal for an Oracle Database Server

To enable the Oracle database server to validate the identity of clients that authenticate themselves using Kerberos, you must create a service principal for Oracle9i.

The name of the principal should have the following format:

kservice/kinstance@REALM

Each of the fields in the service principal specify the following values:

kservice

A case-sensitive string that represents the Oracle service; this can be the same as the database service name.

kinstance

This is typically the fully qualified name of the system on which Oracle9i is running.

REALM

The domain name of the database server. REALM must always be uppercase and is typically the DNS domain name.


Note:

The utility names in this section are executable programs. However, the Kerberos user name krbuser and the realm SOMECO.COM are examples only.


For example, if kservice is oracle, the fully qualified name of the system on which Oracle9i is running is dbserver.someco.com and the realm is SOMECO.COM. The principal name is:

oracle/dbserver.someco.com@SOMECO.COM

It is a convention to use the DNS domain name as the name of the realm. To create the service principal, run kadmin.local. On UNIX, run this command as the root user, by using the following syntax:

# cd /kerberos-install-directory/sbin
# ./kadmin.local

To add a principal named oracle/dbserver.someco.com@SOMECO.COM to the list of server principals known by Kerberos, enter the following:

kadmin.local:addprinc -randkey oracle/dbserver.someco.com@SOMECO.COM

Task 3: Extract a Service Table from Kerberos

Extract the service table from Kerberos and copy it to the Oracle database server/Kerberos client system.

For example, use the following steps to extract a service table for dbserver.someco.com:

  1. Enter the following to extract the service table:

    kadmin.local: ktadd -k /tmp/keytab oracle/dbserver.someco.com

    Entry for principal oracle/dbserver.someco.com with kvno 2, encryption DES-CBC-CRC added to the keytab WRFILE: 'WRFILE:/tmp/keytab

    kadmin.local: exit

    oklist -k -t /tmp/keytab

  2. After the service table has been extracted, verify that the new entries are in the table in addition to the old ones. If they are not, or you need to add more, use kadmin.local to append to them.

    If you do not enter a realm when using ktadd, it uses the realm of the current host and displays it in the command output, as shown in Step 1.

  3. If the Kerberos service table is on the same system as the Kerberos client, you can move it. If the service table is on a different system from the Kerberos client, you must transfer the file with a program such as FTP. If using FTP, transfer the file in binary mode.

    The following example shows how to move the service table on a UNIX platform:

    # mv /tmp/keytab /etc/v5srvtab
    
    

    The default name of the service file is /etc/v5srvtab.

  4. Verify that the owner of the Oracle database server executable can read the service table (/etc/v5srvtab in the previous example). To do so, set the file owner to the Oracle user, or make the file readable by the group to which Oracle belongs.


    Caution:

    Do not make the file readable to all users. This can cause a security breach.


Task 4: Install an Oracle Database Server and an Oracle Client

Install the Oracle database server and client software.

See Also:

Oracle9i operating system-specific installation documentation

Task 5: Install Oracle Net Services and Oracle Advanced Security

Install Oracle Net Services and Oracle Advanced Security on the Oracle database server and Oracle client systems.

See Also:

Oracle9i operating system-specific installation documentation

Task 6: Configure Oracle Net Services and Oracle9i

Configure Oracle Net Services on the Oracle database server and client.

See Also:

Task 7: Configure Kerberos Authentication

Perform these tasks to set required parameters in the Oracle database server and client sqlnet.ora files:

Step 1: Configure Kerberos on the Client and on the Database Server

Perform the following steps to configure Kerberos authentication service parameters on the client and on the database server:

  1. Start Oracle Net Manager:
    • On UNIX, run netmgr from $ORACLE_HOME/bin.
    • On Windows NT, choose Start > Programs > Oracle - HOME_NAME > Network Administration > Oracle Net Manager.
  2. In the Navigator window, expand Local > Profile.
  3. From the list in the right pane, select Oracle Advanced Security; the Oracle Advanced Security window appears (Figure 6-1):

Figure 6-1 Oracle Advanced Security Authentication Window (Kerberos)

Text description of kerb0001.gif follows.

Text description of the illustration kerb0001.gif


Go to previous page Go to next page
Oracle
Copyright © 1996, 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback