You can configure the IdM server to use the generic security service algorithm for secret key transaction (GSS-TSIG) technology defined in RFC3645. To configure the IdM server to use the GSS-TSIG technology, you must install the IdM client on the {ProductName} base operating system.
-
You must ensure the IdM server is deployed and the host-based firewall is configured correctly.
-
You must contact the IdM server administrator to ensure that you obtain an account on the IdM server with permissions to create zones on the IdM server.
-
You should create a backup of the answer file. You can use the backup to restore the answer file to its original state if it becomes corrupted. For more information, see {InstallingServerDocURL}configuring-server_{project-context}[Configuring {ProjectServer}].
To configure dynamic DNS update with GSS-TSIG authentication, complete the following steps:
-
Obtain a Kerberos ticket for the account obtained from the IdM administrator:
# kinit idm_user
-
Create a new Kerberos principal for {ProductName} to use to authenticate on the IdM server.
# ipa service-add {smartproxy-example-com}
# ipa service-add _{smart-proxy-principal}/{foreman-example-com}_
-
On the base operating system of either the {Project} or {SmartProxy} that is managing the DNS service for your deployment, install the
ipa-client
package:# {project-package-install} ipa-client
-
Configure the IdM client by running the installation script and following the on-screen prompts:
# ipa-client-install
-
Obtain a Kerberos ticket:
# kinit admin
-
Remove any preexisting
keytab
:# rm /etc/foreman-proxy/dns.keytab
-
Obtain the
keytab
for this system:# ipa-getkeytab -p {smart-proxy-principal}/{foreman-example-com}@EXAMPLE.COM \ -s idm1.example.com -k /etc/foreman-proxy/dns.keytab
NoteWhen adding a keytab to a standby system with the same host name as the original system in service, add the
r
option to prevent generating new credentials and rendering the credentials on the original system invalid. -
For the
dns.keytab
file, set the group and owner toforeman-proxy
:# chown foreman-proxy:foreman-proxy /etc/foreman-proxy/dns.keytab
-
Optional: To verify that the
keytab
file is valid, enter the following command:# kinit -kt /etc/foreman-proxy/dns.keytab \ {smart-proxy-principal}/{foreman-example-com}@EXAMPLE.COM
-
Create and configure the zone that you want to manage:
-
Navigate to Network Services > DNS > DNS Zones.
-
Select Add and enter the zone name. For example,
example.com
. -
Click Add and Edit.
-
Click the Settings tab and in the BIND update policy box, add the following to the semi-colon separated list:
grant {smart-proxy-principal}\047{foreman-example-com}@EXAMPLE.COM wildcard * ANY;
-
Set Dynamic update to True.
-
Enable Allow PTR sync.
-
Click Save to save the changes.
-
-
Create and configure the reverse zone:
-
Navigate to Network Services > DNS > DNS Zones.
-
Click Add.
-
Select Reverse zone IP network and add the network address in CIDR format to enable reverse lookups.
-
Click Add and Edit.
-
Click the Settings tab and in the BIND update policy box, add the following to the semi-colon separated list:
grant {smart-proxy-principal}\047{foreman-example-com}@EXAMPLE.COM wildcard * ANY;
-
Set Dynamic update to True.
-
Click Save to save the changes.
-
-
Use the
{foreman-installer}
command to configure the {Project} or {SmartProxy} that manages the DNS Service for the domain:-
On {Project}, enter the following command:
# {installer-scenario} \ --foreman-proxy-dns-managed=false \ --foreman-proxy-dns-provider=nsupdate_gss \ --foreman-proxy-dns-server="idm1.example.com" \ --foreman-proxy-dns-tsig-keytab=/etc/foreman-proxy/dns.keytab \ --foreman-proxy-dns-tsig-principal="{smart-proxy-principal}/{foreman-example-com}@EXAMPLE.COM" \ --foreman-proxy-dns=true
-
On {SmartProxy}, enter the following command:
# {installer-scenario-smartproxy} \ --foreman-proxy-dns-managed=false \ --foreman-proxy-dns-provider=nsupdate_gss \ --foreman-proxy-dns-server="idm1.example.com" \ --foreman-proxy-dns-tsig-keytab=/etc/foreman-proxy/dns.keytab \ --foreman-proxy-dns-tsig-principal="{smart-proxy-principal}/{foreman-example-com}@EXAMPLE.COM" \ --foreman-proxy-dns=true
-
After you run the {foreman-installer}
command to make any changes to your {SmartProxy} configuration, you must update the configuration of each affected {SmartProxy} in the {ProjectWebUI}.
-
In the {ProjectWebUI}, navigate to Infrastructure > {SmartProxies}, locate the {ProductName}, and from the list in the Actions column, select Refresh.
-
Configure the domain:
-
In the {ProjectWebUI}, navigate to Infrastructure > Domains and select the domain name.
-
In the Domain tab, ensure DNS {SmartProxy} is set to the {SmartProxy} where the subnet is connected.
-
-
Configure the subnet:
-
In the {ProjectWebUI}, navigate to Infrastructure > Subnets and select the subnet name.
-
In the Subnet tab, set IPAM to None.
-
In the Domains tab, select the domain that you want to manage using the IdM server.
-
In the {SmartProxies} tab, ensure Reverse DNS {SmartProxy} is set to the {SmartProxy} where the subnet is connected.
-
Click Submit to save the changes.
-