Rotating Keys

Rotating a Kerberos keytab used for File Storage authentication must done carefully to avoid an availability outage.

NFS clients using Kerberos for authentication refresh tickets based on an interval specified by the KDC administrator. When rotating keytab entries, the mount target must accept both the old values and the new values until all clients have refreshed their tickets. If the old keytab entry is removed too early, clients that haven't refreshed their tickets can experience an availability outage.

To safely update a Kerberos keytab used in File Storage authentication:

  1. Generate a keytab from the KDC with new key versions, and convert it into Base64 format.
  2. Upload the keytab to OCI Vault as a new secret version of the existing keytab secret. Ensure that the selected format of the new secret version is Base64. For more information, see Overview of Vault.
  3. Update the mount target's Keytab Information:
    1. Open the navigation menu  and select Storage. Under File Storage, select Mount Targets.
    2. Select a Compartment.
    3. Select the mount target that you want to update.
    4. Select the Actions Menu and then select Manage kerberos.
    5. In Manage Kerberos panel, in the Keytab information section:
      • Select the new keytab version as the Current keytab secret version
      • Select the old keytab version as the Backup keytab secret version.
    6. Wait until all NFS clients have refreshed their Kerberos tickets.
    7. Remove the Backup keytab secret version from the mount target configuration.
    8. Select Update.