Can Kerberos keytabs be regenerated without downtime for NFSv4 shares mounted with krb5p privacy mode?
Issue
- The Microsoft Windows
ktpasscommand is used to generate User Principal Name (UPN) keytabs in Microsoft Active Directory (AD). -
The generated keytabs are copied from the Windows system where they were deposited and deployed on the RHEL servers mounting NFS shares with the Kerberos privacy mode option
sec=krb5p.[root@rhel8 ~]# grep krb5p /etc/fstab nfsserver.example.com:/app /mnt/appshare vers=4,sec=krb5p,rw 0 0 -
The NFS mount disconnects whenever the UPN password is rotated in AD.
Environment
- Red Hat Enterprise Linux (RHEL) 8
- NFSv4
- Kerberos
krb5 - Microsoft Active Directory
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.