Configure Additional Kerberos Realm for NFSv4

The remainder of this document assumes you have already established your own Kerberos realm and that you have configured your KDC to use your LDAP server. These services will be used by the NFSv4 server for user authentication and authorization.

It is also assumed that your Kerberos KDC has a cross-realm trust with the UW Kerberos realm. Contact UW Technology for more information regarding UW authentication services.

Since the Fedora™ Authentication Configuration applet does not provide an interface to configure multiple Kerberos realms, you will need to edit your /etc/krb5.conf by hand.

Here is an example:

[logging]
 default = FILE:/var/log/krb5libs.log
 kdc = FILE:/var/log/krb5kdc.log
 admin_server = FILE:/var/log/kadmind.log

[libdefaults]
 default_realm = u.washington.edu
 dns_lookup_realm = false
 dns_lookup_kdc = false
 clockskew = 120

[realms]
 MYDEPT.EXAMPLE.COM = {
  kdc = mykdc1.mydept.example.com:88
  kdc = mykdc2.mydept.example.com:88
  admin_server = myadminserver.mydept.example.com:749
  default_domain = MYDEPT.EXAMPLE.COM 
 }
 u.washington.edu = {
  kdc = k5-kdc1.u.washington.edu
  kdc = k5-kdc2.u.washington.edu
  admin_server = k5-admin.u.washington.edu
  kpasswd_server = k5-admin.u.washington.edu
  default_domain = u.washington.edu
 }

[domain_realm]
 .mydept.example.com = MYDEPT.EXAMPLE.COM
 mydept.example.com = MYDEPT.EXAMPLE.COM
 .u.washington.edu = u.washington.edu
 u.washington.edu = u.washington.edu

[kdc]
 profile = /var/kerberos/krb5kdc/kdc.conf

[appdefaults]
 pam = {
   debug = false
   ticket_lifetime = 36000
   renew_lifetime = 36000
   forwardable = true
   krb4_convert = false
   kdc_timeout = 1
   max_retries = 1
}

... where mydept.myexample.com would be replaced with your departmental subdomain.