mirror of
https://github.com/nugaon/docker-kerberos-with-ldap.git
synced 2025-10-27 08:14:19 -04:00
Ubuntu server version of krb5kdc with augmented configuration
This commit is contained in:
34
README.md
Normal file
34
README.md
Normal file
@@ -0,0 +1,34 @@
|
||||
## Docker kerberos
|
||||
This image is for testing purposes for Kerberos/LDAP environments.
|
||||
With this Kerberos image you can initialize an Ubuntu based Kerberos server with LDAP connections.
|
||||
The whole project based on `mrenouf/docker-images` repository, but this codebase not compatible with that.
|
||||
|
||||
#### Quick start
|
||||
```
|
||||
docker run -d -v /dev/urandom:/dev/random --name kerberos nugaon/kerberos-with-ldap
|
||||
```
|
||||
The containers have a pretty bad entropy level so the KDC won't start because of this. We can overcome this by using `/dev/urandom` which is less secure but does not care about entropy.
|
||||
Obviously, this Kerberos container has to be run on the same network as the ldap container or make it possible to reach the outsider LDAP server. For the former case,
|
||||
I suggest for you to use my compatible LDAP docker with Kerberos image `nugaon/openldap-with-kerberos`,
|
||||
that you can find on [GitHub](https://github.com/nugaon/docker-openldap-with-kerberos) as well.
|
||||
|
||||
Useful environment variables:
|
||||
|
||||
| Environment variables | Description |
|
||||
| --------------------- | ----------------------------- |
|
||||
| `REALM` | the Kerberos realm |
|
||||
| `DOMAIN_REALM` | the DNS domain for the realm |
|
||||
| `KERB_MASTER_KEY` | master key for the KDC |
|
||||
| `KERB_ADMIN_USER` | administrator account name |
|
||||
| `KERB_ADMIN_PASS` | administrator's password |
|
||||
| `SEARCH_DOMAINS` | domain suffix search list |
|
||||
| `LDAP_DC` | domain suffix search list |
|
||||
| `LDAP_USER` | ldap user |
|
||||
| `LDAP_PASS` | ldap pass |
|
||||
| `LDAP_URL` | ldap url |
|
||||
|
||||
### Test
|
||||
Once kerberos is enabled you need a `ticket` to execute any job on the cluster. Here's an example to get a ticket:
|
||||
> docker exec -ti kerberos sh -c "kinit admin && klist"
|
||||
|
||||
It authenticates the LDAP associated admin user by the Kerberos server.
|
||||
Reference in New Issue
Block a user