Setup dynamc DNS updates with Active Directory DNS to be used by Smart Proxy of Katello/Foreman
Both BIND as configured in FreeIPA and Microsoft AD DNS servers can accept DNS updates using GSS-TSIG authentication. This uses Kerberos principals to authenticate to the DNS server. Under Microsoft AD, this is known as "Secure Dynamic Update". Pre-requisites Kerberos principal in the realm/domain that Smart Proxy can use Kerberos keytab for the above principal Setup krb5.conf cat > /etc/krb5.conf << "EOF" [logging] default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server = FILE:/var/log/kadmind.log [libdefaults] default_realm = EXAMPLE.COM dns_lookup_realm = true dns_lookup_kdc = true ticket_lifetime = 24h renew_lifetime = 7d forwardable = true [realms] EXAMPLE.COM = { kdc = dc01.example.com admin_server = dc01.example.com } [domain_realm] example.com = EXAMPLE.COM .example.com = EXAMPLE.COM...