MongoDB 配置Kerberos 認證,并用JAVA連接

Kerberos(KDC) 幾個重要的概念:

  • Principal:任何服務器所提供的用戶、計算機、服務都將被定義成Principal。本例使用user@EXAMPLE.COM
  • Instances:用于服務principals和特殊管理Principal。
  • Realms:Kerberos安裝提供的獨特的域的控制,把它想象成你的主機和用戶所屬的主機或者組。官方約定這域需要大寫。默認的,Ubuntu將把DNS域名轉換為大寫當成這里的域。 本例使用EXAMPLE.COM
  • Key Distribution Center: (KDC)由三部分組成,一是principal數(shù)據(jù)庫,認證服務器,和票據(jù)授予服務器。每個Realm至少要有一個。
  • Ticket Granting Ticket:由認證服務器(AS)簽發(fā),Ticket Granting Ticket (TGT)使用用戶的密碼加密,這個密碼只有用戶和KDC知道。
  • Ticket Granting Server: (TGS) 根據(jù)請求簽發(fā)服務的票據(jù)。
  • Tickets:確認兩個Principal的身份。一個主體是用戶,另一個是由用戶請求的服務。門票會建立一個加密密鑰,用于在身份驗證會話中的安全通信。
  • Keytab Files:從KDC主數(shù)據(jù)庫中提取的文件,并且包含的服務或主機的加密密鑰。

Kerberos 用戶和服務認證的流程

精品電影網(wǎng):手機電影迅雷下載,手機在線電影,手機高清電影,手機迅雷觀看,電影天堂

1,客戶端(像MongoDB java 驅動程序)向KDC服務器發(fā)送一個principal。
2,服務器在自己的數(shù)據(jù)庫中查找到這個用戶并用這個用戶的秘鑰(注意不是秘密)和當前時間戳加密生成一個TGT返回給客戶端。
3,客戶端用這個TGT打包要連接的服務名和服務相關信息再發(fā)送給KDC。
4,KDC驗證這個新TGT包并用服務的秘鑰和新的時間戳加密一個新的TGT返回給客戶端。
5,客戶端拿到新的TGT發(fā)送給服務service(本例中的MongoDB)
6,服務service(MongoDB用自己的私鑰進行解密TGT并驗證),如果驗證成功則返回給客戶端想要的數(shù)據(jù)。

安裝Kerberos (KDC) 服務

sudo apt install krb5-kdc krb5-admin-server
sudo krb5_newrealm
所有的配置都在/etc/krb5.conf中,可以更改這個文件后運行下面的命令
sudo dpkg-reconfigure krb5-kdc

增加一個管理員用戶principle

sudo kadmin.local
Authenticating as principal root/admin@EXAMPLE.COM with password.
kadmin.local: addprinc user

然后輸入這個用戶的密碼,這個用戶就加到kerberos中了。
在 /etc/krb5kdc/kadm5.acl 中增加這個管理員用戶: user@EXAMPLE.COM 

然后重啟kerberos:
 sudo service krb5-admin-server restart

測試用這個用戶連接下看是否成功:
kinit  user@EXAMPLE.COM 

增加一個kerberos權限的mongo用戶principal 和 mongodb服務principal

在kerberos服務器機器上運行:
kadmin.local

- 增加用戶并設置密碼
addprinc user1@EXAMPLE.COM
listprincs

- 增加mongdb服務并設置密碼
 addprinc mongodb/www.jpmovie.cn@EXAMPLE.COM
 addprinc mongod/www.jpmovie.cn@EXAMPLE.COM
 addprinc mongos/www.jpmovie.cn@EXAMPLE.COM
 addprinc mongo/www.jpmovie.cn@EXAMPLE.COM

導出keytab文件到指定目錄
ktadd -k /home/jpmovie/user1.keytab -norandkey user1@EXAMPLE.COM
ktadd -k /home/jpmovie/mongodb.keytab -norandkey mongodb/www.jpmovie.cn@EXAMPLE.COM
ktadd -k /home/jpmovie/mongod.keytab -norandkey mongod/www.jpmovie.cn@EXAMPLE.COM
ktadd -k /home/jpmovie/mongos.keytab -norandkey mongos/www.jpmovie.cn@EXAMPLE.COM
ktadd -k /home/jpmovie/mongo.keytab -norandkey mongo/www.jpmovie.cn@EXAMPLE.COM

在MongoDB 的external數(shù)據(jù)庫中增加Kerberos用戶user1

免費天貓?zhí)詢?yōu)惠券領取http://q.jpmovie.cn

在Mongodb 的機器上運行命令 : mongod
mongo

use $external
 db.getSiblingDB("$external").createUser(
   {
     user: "user1/@EXAMPLE.COM",
     roles: [ { role: "readWrite", db: "kundatabase" } ]
   }
)

在MongoDB的機器上安裝Kerberos client端

sudo apt-get install krb5-user libpam-krb5 libpam-ccreds auth-client-config libsasl2-modules-gssapi-mit
sudo dpkg-reconfigure krb5-config
- 輸入對應的realm 和 KDC server的host名字

以kerberos認證的方式啟動MongoDB服務

- 將KDC 服務器生成的mongodb.keytab 文件復制到MongoDB服務器中

- export KRB5_KTNAME=/home/hekun/KerberosData/kb5keytab/mongodb.keytab
測試從Mongodb 的服務器能不能通過kerberos連到KDC 的服務器:

kinit user1@EXAMPLE.COM
如果成功可以用 klist 來查看 TGT情況

啟動MongoDB
 mongod --auth --setParameter authenticationMechanisms=GSSAPI

測試連接
- kinit user1@EXAMPLE.COM
- mongo --host mongohost.com --authenticationMechanism=GSSAPI --authenticationDatabase='$external' --username user1@EXAMPLE.COM
- use kundatabase
- show collections

JAVA通過Kerberos 連接MongoDB

實際上有三種方式通過Kerberos認證連接MongoDB

  • Username and password
  • Key Tab files
  • kinit (或者說是local cache).

具體JAVA實現(xiàn)代碼:

  • 1,創(chuàng)建JAVA JAAS configuration

    import java.security.Security;
    import java.util.HashMap;
    import java.util.Map;

    import javax.security.auth.login.AppConfigurationEntry;
    import javax.security.auth.login.AppConfigurationEntry.LoginModuleControlFlag;
    import javax.security.auth.login.Configuration;
    import com.sun.security.auth.module.*;
    
    public class KrbConfig extends Configuration{

        private AppConfigurationEntry[] entry = new AppConfigurationEntry[1];
        
        Map paramMap = new HashMap();
        
        private AppConfigurationEntry krb5LoginModule = new AppConfigurationEntry("com.sun.security.auth.module.Krb5LoginModule", LoginModuleControlFlag.REQUIRED, paramMap);
        @Override
        public AppConfigurationEntry[] getAppConfigurationEntry(String name) {
            if(entry[0] == null){
//                paramMap.put("debug", "true");
//                //1.enter the username and passsword 
//                paramMap.put("storeKey", "true");
//                paramMap.put("doNotPrompt", "true");
//                paramMap.put("useSubjectCredsOnly", "false");
//
//                //2.use keytab file
//                paramMap.put("doNotPrompt", "false");
//                paramMap.put("useKeyTab", "true");
//                paramMap.put("keyTab", "C:\\dataprovideagent\\krb5\\user.keytab");
//                paramMap.put("principal", "user@EXAMPLE.COM");
//                
//                paramMap.put("useTicketCache", "true");
//                paramMap.put("ticketCache", "C:\\Users\\i322353\\krb5cc_I322353");
//                paramMap.put("useFirstPass", "true");
//                paramMap.put("tryFirstPass", "true");
//
//                paramMap.put("renewTGT", "true"); 
//                paramMap.put("refreshKrb5Config", "true");
//                String ticketCache = System.getenv("KRB5CCNAME");
//                System.out.println("%%%%%%%%%%%%%% "+ticketCache );
//                
//                if (ticketCache != null) { 
//                    paramMap.put("ticketCache", ticketCache); 
//                  } 
//
                
                Security.setProperty("javax.security.auth.login.name", "user");
                Security.setProperty("javax.security.auth.login.password", "123456");
                System.setProperty("javax.security.auth.login.name", "user");
                System.setProperty("javax.security.auth.login.password", "123456");
                
                paramMap.put("debug", "true");
                //1.enter the username and passsword 
               // paramMap.put("storeKey", "false");
                //paramMap.put("doNotPrompt", "true");
                //paramMap.put("useSubjectCredsOnly", "true");

                //2.use keytab file
                paramMap.put("useKeyTab", "true");
                paramMap.put("keyTab", "C:\\dataprovideagent\\krb5\\user.keytab");
                paramMap.put("principal", "user@EXAMPLE.COM");
                
                paramMap.put("useTicketCache", "false");
                //paramMap.put("ticketCache", "C:\\Users\\i322353\\krb5cc_I322353");
                paramMap.put("useFirstPass", "false");
                paramMap.put("tryFirstPass", "false");

                paramMap.put("renewTGT", "false"); 
               // paramMap.put("refreshKrb5Config", "true");
                entry[0] = krb5LoginModule;

            }
            return entry;
        }

}
  • 2,創(chuàng)建main類,然后創(chuàng)建mongoclient端連接數(shù)據(jù)庫

注意,這里是先登錄kdc,然后再寫一個action連接mongodb

package com.user.mongodb.main;

import java.io.File;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
import java.security.Security;
import java.util.Arrays;


import javax.security.auth.Subject;

import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;

import com.mongodb.MongoClient;
import com.mongodb.MongoCredential;
import com.mongodb.ServerAddress;
import com.mongodb.client.MongoCursor;
import com.mongodb.client.MongoDatabase;
import com.mongodb.client.MongoIterable;
import com.user.mongodb.util.Krb5Configuration;
import com.user.mongodb.util.KrbConfig;


public class mongodbKerberos
{

    static String user = "mongouser";
    static char[] password = "mongouser".toCharArray();
    static String database = "kundatabase";
    public static void main(String[] args)
    {
        
      MongoClient client =createKubrosConnection();
        //testKerb5();
    }
    
        
    public static MongoClient createKubrosConnection(){
        String loginModuleName = "KerberosLogin";
        Subject subject = new Subject();
        KrbConfig conf = new KrbConfig();
        try {
            String sep = File.separator;
            System.out.println("KerberosClient.main():"
                    + System.getProperty("java.home") + sep + "lib" + sep
                    + "security" + sep + "java.security");
            LoginContext context = new LoginContext("myKerberosLogin", subject,
                    null, conf);
            context.login();
            System.out.println(" %%%%%%%%%%%%%%%% "+ context.getSubject().getPrincipals());
            Subject subject2 =   context.getSubject();
            
            MongoCredential credential = MongoCredential
                    .createGSSAPICredential("user@EXAMPLE.COM");
//            PrivilegedExceptionAction<MongoClient> action1  = ()->new MongoClient(new ServerAddress("mo-51e071c98.mo.sap.corp", 27017),
//                    Arrays.asList(credential));
            PrivilegedExceptionAction<MongoClient> action1  = new PrivilegedExceptionAction<MongoClient>() {

                @Override
                public MongoClient run() throws Exception
                {
                    // TODO Auto-generated method stub
                    MongoClient result = new MongoClient(new ServerAddress("mongohost.com.corp", 27017),
                            Arrays.asList(credential));
                    MongoDatabase ssfdfd = result.getDatabase("kundatabase");
                    MongoIterable<String> aadaa = ssfdfd.listCollectionNames();
                    MongoCursor<String> itdd = aadaa.iterator();
//                    while(itdd.hasNext()){
//                        String next = itdd.next();
//                        System.out.println(next+" ********************** ");
//                    }
                    return result;
                }
                
            };
            //精品電影網(wǎng):http://www.jpmovie.cn
            //免費內部優(yōu)惠券領?。篽ttp://q.jpmovie.cn
           //免費開源工具代碼:http://blog.jpmovie.cn
            //PrivilegedExceptionAction<MongoDatabase> action = ()->mongoClient.getDatabase("kundatabase");
            MongoClient result = Subject.doAs(subject2, action1);
            MongoDatabase ssfdfd = result.getDatabase("kundatabase");
            MongoIterable<String> aadaa = ssfdfd.listCollectionNames();
            MongoCursor<String> itdd = aadaa.iterator();
            while(itdd.hasNext()){
                String next = itdd.next();
                System.out.println(next+" 222********************** ");
            }
        } catch (LoginException | PrivilegedActionException e) {
            // TODO Auto-generated catch block
            e.printStackTrace();
        }
        
//          System.setProperty("java.security.krb5.realm", "EXAMPLE.COM");
//          System.setProperty("java.security.krb5.kdc", "mo-6851b47ac.mo.sap.corp");
//          
//          System.setProperty("javax.security.auth.login.name", "user");
//          System.setProperty("javax.security.auth.login.password", "123456");
//          Security.setProperty("javax.security.auth.login.name", "user");
//          Security.setProperty("javax.security.auth.login.password", "123456");
          
//        MongoCredential credential = MongoCredential
//                .createGSSAPICredential("user@EXAMPLE.COM");
//        MongoClient  mongoClient = new MongoClient(new ServerAddress("mo-51e071c98.mo.sap.corp", 27017),
//                Arrays.asList(credential));
//        
//        MongoDatabase ssfdfd = mongoClient.getDatabase("kundatabase");
//        MongoIterable<String> aadaa = ssfdfd.listCollectionNames();
//        MongoCursor<String> itdd = aadaa.iterator();
//        while(itdd.hasNext()){
//            String next = itdd.next();
//           // System.out.println(next);
//        }
        return   null;
        
        
//        MongoClientConfiguration config = new MongoClientConfiguration("mongodb://locahost:27017/");
//        MongoCredential = 
//        config.addCredential(Credential.builder()
//                      .userName("user@EXAMPLE.COM")
//                      .password("123456".toCharArray())
//                      .kerberos());
        
    }
    
    public static void testKerb5(){
        
        System.setProperty("java.security.krb5.realm", "EXAMPLE.COM");
        System.setProperty("java.security.krb5.kdc", "mongohost.com.corp");
        System.setProperty("javax.security.auth.useSubjectCredsOnly", "false");
        
        System.setProperty(Krb5Configuration.KRB_DO_NOT_PROMPT, "true");// use true as default
        System.setProperty(Krb5Configuration.KRB_PRINC, "user@EXAMPLE.COM");
        //http://www.jpmovie.cn
        // TBD Keytab type
        System.setProperty(Krb5Configuration.KRB_USE_KEY_TAB, "true");
        System.setProperty(Krb5Configuration.KRB_KEYTAB, "C:\\dataprovideagent\\krb5\\user.keytab");
        
        File file = new File("C:\\dataprovideagent\\krb5\\user.keytab");
        System.out.println(file.getAbsolutePath());
        
        Security.setProperty("login.configuration.provider", "com.user.mongodb.util.Krb5Configuration");
        
        MongoCredential credential = MongoCredential.createGSSAPICredential("user@EXAMPLE.COM");
        
        MongoClient  mongoClient = new MongoClient(new ServerAddress("mo-51e071c98.mo.sap.corp", 27017),
                Arrays.asList(credential));
        
        MongoDatabase ssfdfd = mongoClient.getDatabase("kundatabase");
        MongoIterable<String> aadaa = ssfdfd.listCollectionNames();
        MongoCursor<String> itdd = aadaa.iterator();
        while(itdd.hasNext()){
            String next = itdd.next();
            System.out.println(next);
        }
    }
    
    private static void testMongoClient(MongoClient mongoClient)
    {
        try
        {
            MongoIterable<String> databases = mongoClient.listDatabaseNames();
            if (null == databases || databases.first() == null)
            {
                System.out.println(
                        "Can not connect to MongoDB ,please check the remote source properties");
            }
        }
        catch (Exception e)
        {
            System.out.println(
                    "Can not connect to MongoDB : " + e.getMessage());
        }
    }

}

納米蟲分布式網(wǎng)頁爬蟲:http://nanoworm.jpmovie.cn

最后編輯于
?著作權歸作者所有,轉載或內容合作請聯(lián)系作者
【社區(qū)內容提示】社區(qū)部分內容疑似由AI輔助生成,瀏覽時請結合常識與多方信息審慎甄別。
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發(fā)布,文章內容僅代表作者本人觀點,簡書系信息發(fā)布平臺,僅提供信息存儲服務。

相關閱讀更多精彩內容

友情鏈接更多精彩內容