Allow use of non-default keytab for server service authentication #390
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
by specifying a key table file path, the kerberos credentials for the server service can be acquired without the need for a password or doing"kinit" in the shell and running as root to allow access to the krb5 default keytab
The programmatically does the equivalent of
kinit -kt -c cifs/
getting initial credentials from the KDC using the key table
Then to acquire cred to accept an client connection, gss_acquire_cred_from is used with the keytab and cache path instead of the defaults. Works great.
Also adds a daily renew of credentials to the server can run continuously in kerberos world
former behavior happens if no keytab path set in server context
Benefits