[Previous] [Next] [Contents] [Index]
This chapter describes how to configure intercell communication in a multicell environment and contains the following sections:
F.2 Pros and Cons of Intercell Trust Relationships
F.3 Establishing Intercell Communications
F.1 Understanding Trust Relationships
Figure F-1 illustrates the concept of direct trust between two cells. Members of Cell 1 have access to services in Cell 2, on the basis of their membership in the trusted Cell 1, through the account krbtgt/cell 1. Likewise, members of Cell 2 have access to services in Cell 1 through the account krbtgt/cell 2. The trust relationship also allows users in the foreign cell to log into accounts in the local cell and vice versa.
Figure F-1: Direct Trust Relationship
F.1.1.1 User Access to the Foreign Cell
From the user's perspective, access to objects and services in the other cell is transparent and automatic. Once users log into their own cell, they also have access to the foreign cell. No additional login to the cross-cell authentication (krbtgt) account is required.
F.1.1.2 Controlling Authorization for Objects in the Cell
If you do not specifically grant a foreign cell access to a resource, foreign principals are granted the rights specified by the any_other entry (if it exists) in the ACL. You should check the any_other rights on any sensitive resources to ensure the resources are sufficiently protected.
F.2 Pros and Cons of Intercell Trust Relationships
Before configuring intercell trust, review the benefits and security implications described in this section.
F.2.1 Simplified Administration
Because the cell consists of employees of Company B, Company B is best able to manage cell membership and security (user id and password management, organizational and personnel changes).
F.2.2 Simplicity for the User
For end users, intercell trust provides transparent access between their own cell and the cell to which they have access via the trust relationship. For example, Cell B users can access services from Cell A on the basis of their membership in the trusted Cell B. They are not required to enter a login ID and password for Cell A.
F.2.3 Security Implications
In an intercell trust relationship, one organization is trusting another to manage security information. By administering DCE ACLs, Cell A is able to set access privileges for its resources based on foreign cell membership, foreign cell group membership, or for individual foreign principals (see Section F.1.1.2, Controlling Authorization for Objects in the Cell, on page 76).
However, Cell A is still relying on Cell B to properly authenticate the end user. Cell B clients present privileges to the Cell A server that were generated by the security server in Cell B. These privileges include the client's DCE identity and the groups to which the client belongs; no further challenges related to the principal's idenetity are issued by the Cell A server. Thus, setting up an intercell environment makes sense only if Cell A trusts Cell B to properly administer cell membership and security.
F.3 Establishing Intercell Communications
For intercell communication to be successful:
Establishing intercell communications requires you to do the following in the order shown:
F.3.2 Establishing Intercell Trust
F.3.3 Verifying Account Creation
F.3.4 Modifying the Account Valid Flag
F.3.5 Adding Entries for Replica Servers to DNS
F.3.1 Establishing Intercell Lookup
To establish intercell lookup, add entries for each of the two cells to the DNS server:
groucho.eng.entegrity.com
harpo.eng.entegrity.com
Here,
eng.entegrity.com
is the domain name.
show cell as dns
from the cdscp prompt.
The following example shows the output of this command for the cell
harpo.eng.entegrity.com
:
CELL /.../harpo.eng.entegrity.com
harpo.eng.entegrity.com
). Use a preference of 1 for master servers and a lower preference for replica servers.
;First Replica:
;Name TTL Class Type Preference Exchange
csq.tech.edu. 604800 IN MX 1 fox.csq.tech.edu.
;Name TTL Class Type Rdata
604800 IN TXT (1 ;version
fd3328c4-2a4b-11ca-af85-09002b1c89bb ;ns uuid
Master ;Replica1 type
/.../csq.tech.edu/cs1_ch ;ch name
fd3328c5-2a4b-11ca-af85-09002b1c89bb ;ch uuid
fox.csq.tech.edu) ;host
;Second Replica:
604800 IN MX 2
rox.csq.tech.edu.
604800 IN TXT (1 ;version
fd3328c4-2a4b-11ca-af85-09002b1c89bb ;ns uuid
Read-only ;Replica2 type
/.../cqs.tech.edu/cs2_ch ;ch name
fd3429c4-2a4b-11ca-af87-09002b1c89bb ;ch uuid
rox.csq.tech.edu)
;host
harpo
).
Supply the following parameters with these rgy_edit or dcecp registry connect:
Foreign account's current password
Foreign group name Group name to be associated with the account in
the foreign cell.
Foreign organization name Organization to be associated with the
account in the foreign cell.
The following example shows the same procedure using dcecp registry_connect:
dcecp>
registry connect /.../harpo.eng.entegrity.com -facct cell_admin
\
-facctpw -dce- -group none -fgroup none -org none -forg none -mypwd -dce-
dcecp>
F.3.2.1 What Happens When You Create an Account for the Foreign Cell
Entering the rgy_edit or registry connect command does the following:
The new accounts have the default account attributes except for the following differences:
These attributes apply to all foreign principals when they access objects in the local cell. Similarly, the attributes of the account created in the foreign cell for the local cell apply to all principals in the local cell when they access objects in the foreign cell.
F.3.3 Verifying Account Creation
dcecp>
principal catalog
/.../harpo.eng.entegrity.com/nobody
/.../harpo.eng.entegrity.com/root
/.../harpo.eng.entegrity.com/daemon
/.../harpo.eng.entegrity.com/sys
/.../harpo.eng.entegrity.com/bin
/.../harpo.eng.entegrity.com/uucp
/.../harpo.eng.entegrity.com/who
/.../harpo.eng.entegrity.com/mail
/.../harpo.eng.entegrity.com/tcb
/.../harpo.eng.entegrity.com/dce-ptgt
/.../harpo.eng.entegrity.com/dce-rgy
/.../harpo.eng.entegrity.com/cell_admin
/.../harpo.eng.entegrity.com/krbtgt/harpo.eng.entegrity.com
/.../harpo.eng.entegrity.com/hosts/harpo/self
/.../harpo.eng.entegrity.com/hosts/harpo/cds-server
/.../harpo.eng.entegrity.com/hosts/harpo/gda
/.../harpo.eng.entegrity.com/krbtgt/groucho.eng.entegrity.com
F.3.4 Modifying the Account Valid Flag
For accounts that represent foreign cells, the account valid flag is set to no by default.
c:\
To verify that the account valid flag has been changed to yes:
dce_login cell_admin -dce-
Password must be changed!
c:\dcecp
dcecp> account modify krbtgt/harpo.eng.entegrity.com -acctvalid yes
dcecp>
account show krbtgt/harpo.eng.entegrity.com
{acctvalid yes}
{client no}
{created /.../groucho.eng.entegrity.com/cell_admin\
2000-07-02-10:12:11.000-04:00I-----}
{description {}}
{dupkey yes}
{expdate none}
{forwardabletkt yes}
{goodsince 2000-07-02-10:11:53.000-04:00I-----}
{group none}
{home {}}
{lastchange /.../groucho.eng.entegrity.com/cell_admin\
2000-07-02-10:12:13.000-04:00I-----}
{organization none}
{postdatedtkt yes}
{proxiabletkt yes}
{pwdvalid yes}
{renewabletkt yes}
{server yes}
{shell {}}
{stdtgtauth yes}
F.3.5 Adding Entries for Replica Servers to DNS
After you have verified that intercell communication has been successfully established, use the information in Section F.3.1, Establishing Intercell Lookup, on page 78 to add entries for replica servers to DNS.
[Previous] [Next] [Contents] [Index]
To make comments or ask for help, contact support@entegrity.com.