[OpenAFS] mutimaster AD model and cross-realm
knape@njit.edu
knape@njit.edu
Wed, 11 May 2005 20:50:13 -0400 (EDT)
Quoting Jeffrey Altman <jaltman@columbia.edu>:
> Dean Knape wrote:
>
> > This was Re: [OpenAFS] new infrastructure-afs home and backup
> questions
> > but so not to confuse that thread I'm starting anew.
>
> By replying to the previous thread, you are still in the previous
> thread. Changing the name of the subject does not alter what message
> thread you are in.
>
Silly me!
> > We've successfully implemented a cross-realm trust between a
> Kerberos
> > realm and single AD domain. After principal mapping, users are able
> to
> > login with their Kerberos principle at AD domain member
> workstations.
> >
> > The next thing we need to test and get working is the integration of
> a
> > Kerberos realm into a multimaster AD domain model. Here's our
> current
> > AD model:
> >
> > enterprise AD domain ....... TOP
> > | \
> > | D
> > | /
> > |--------
> > / \ |
> > / \ |
> > / \ |
> > user AD domains ......... A B |
> > |
> > |
> > |
> > resource AD domain ................. C
> >
> >
> > external Kerberos realm ( domain D floating up there )
> >
> >
> > This gives us:
> >
> > Active directory domains
> > ------------------------
> > TOP.njit.edu
> > A.TOP.njit.edu
> > B.TOP.njit.edu
> > C.TOP.njit.edu
> >
> > Kerberos realm
> > --------------
> > D.njit.edu
> >
> > Our AFS cell
> > ------------
> > D.njit.edu
> >
> > Our TOP domain contains no users (only domain admin & related). This
> is
> > the root of our AD and provides DNS, etc. to subdomains.
> >
> > Domain A & B contain user accounts and some workstation accounts.
> >
> > Domain C is resource domain and primarily for lab computer accounts
> and
> > servers providing services to both students and faculty. There are
> no
> > user accounts here either. Users from domain A and B need to have
> their
> > identities mapped in such a way so they can sit at lab workstation
> whos
> > computer account is in domain C but their user account is in either
> > domain A or domain B. We're fortunate to have user uniques user
> > accounts across user domains.
>
> If you are going to be mapping Kerberos principals from D to accounts
> in the forest, the user accounts should exist in TOP not A and not B.
> You are centrally controlling the name space at D, therefore you
> should
> not be giving the ability to create user accounts mapped to that name
> space to individual departments via the use of sub-domains.
>
Thank you. This confirms my understanding of the problem and is exactly hoping
not to hear.
> > Now for my question -
> >
> > What trust relationships and user identity mappings are needed to
> have
> > to have users from domains A & B login to workstations/servers with
> > computer accounts in domain C using their Kerberos realm identity?
> >
> > sweating ...
>
> The sub-domains should have knowledge of the existence of realm D
> but do not have to have trusts with it. The trust relationship is
> between D and TOP.
>
> Note: By using a multi-domain forest you will be making it impossible
> (due to a Microsoft bug) for you to provide roaming profiles mapped
> to AFS.
>
> Jeffrey Altman
>