Rotating Keys
Rotating a Kerberos keytab used for File Storage authentication must done carefully to avoid an availability outage.
NFS clients using Kerberos for authentication refresh tickets based on an interval specified by the KDC administrator. When rotating keytab entries, the mount target must accept both the old values and the new values until all clients have refreshed their tickets. If the old keytab entry is removed too early, clients that haven't refreshed their tickets can experience an availability outage.
To safely update a Kerberos keytab used in File Storage authentication:
- Generate a keytab from the KDC with new key versions, and convert it into Base64 format.
- Upload the keytab to OCI Vault as a new secret version of the existing keytab secret. Ensure that the selected format of the new secret version is Base64. For more information, see Overview of Vault.
- Update the mount target's Keytab Information:
- Open the navigation menu and click Storage. Under File Storage, click Mount Targets.
- In the List scope section, under Compartment, select a compartment.
- Find the mount target that you need to update Kerberos keytab versions for, click the , and then click View Details.
- Click the NFS tab to view the existing NFS settings for the mount target.
- Next to Kerberos, click Manage.
- In the Keytab Information section, update the keytabs:
- Select the new keytab version as the Current Keytab Secret Version
- Select the old keytab version as the Backup Keytab Secret Version.
- Wait until all NFS clients have refreshed their Kerberos tickets.
- Remove the Backup Keytab Secret Version from the mount target configuration.