Kerberos is often the preferred authentication method for managing Windows servers in a domain environment. Red Hat Ansible Automation Platform has allowed customers to leverage Kerberos authentication for a number of years now.
We can map the Kerberos client configuration into the running execution environment from automation controller.
In order to map the file into the execution environment, let’s write the configuration to the Kerberos client configuration directory on our automation controller server called /etc/krb5.conf.d/DEMOLAB.LOCAL.conf # cat /etc/krb5.conf.d/DEMOLAB.LOCAL.conf [libdefaults] rdns = false default_realm = DEMOLAB.LOCAL [realms] kdc = ms-ad.demolab.local admin_server = ms-ad.demolab.local }
On the automation controller server we can switch to the awx user and list the execution environment images.