Point out that slave needs /var/heimdal directory and masterkey
From: Mans Nilsson <mansaxel@sunet.se> Fix spelling while here git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@12353 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
		| @@ -62,12 +62,12 @@ In this manual, names of sections and bindings will be given as strings | ||||
| separated by slashes (@samp{/}). The @samp{other-var} variable will thus | ||||
| be @samp{section1/a-subsection/other-var}. | ||||
|  | ||||
| For in-depth information about the contents of the config file, refer to | ||||
| For in-depth information about the contents of the configuration file, refer to | ||||
| the @file{krb5.conf} manual page. Some of the more important sections | ||||
| are briefly described here. | ||||
|  | ||||
| The @samp{libdefaults} section contains a list of library configuration | ||||
| parameters, such as the default realm and the timeout for kdc | ||||
| parameters, such as the default realm and the timeout for KDC | ||||
| responses. The @samp{realms} section contains information about specific | ||||
| realms, such as where they hide their KDC. This section serves the same | ||||
| purpose as the Kerberos 4 @file{krb.conf} file, but can contain more | ||||
| @@ -75,7 +75,7 @@ information. Finally the @samp{domain_realm} section contains a list of | ||||
| mappings from domains to realms, equivalent to the Kerberos 4 | ||||
| @file{krb.realms} file. | ||||
|  | ||||
| To continue with the realm setup, you will have to create a config file, | ||||
| To continue with the realm setup, you will have to create a configuration file, | ||||
| with contents similar to the following. | ||||
|  | ||||
| @example | ||||
| @@ -92,14 +92,19 @@ with contents similar to the following. | ||||
|  | ||||
| If you use a realm name equal to your domain name, you can omit the | ||||
| @samp{libdefaults}, and @samp{domain_realm}, sections. If you have a | ||||
| SRV-record for your realm, or your kerberos server has CNAME called | ||||
| SRV-record for your realm, or your Kerberos server has CNAME called | ||||
| @samp{kerberos.my.realm}, you can omit the @samp{realms} section too. | ||||
|  | ||||
| @node Creating the database, keytabs, Configuration file, Setting up a realm | ||||
| @section Creating the database | ||||
|  | ||||
| The database library will look for the database in @file{/var/heimdal}, | ||||
| so you should probably create that directory. | ||||
| The database library will look for the database in the directory | ||||
| @file{/var/heimdal}, so you should probably create that directory. | ||||
| Make sure the directory have restrictive permissions. | ||||
|  | ||||
| @example | ||||
| # mkdir /var/heimdal | ||||
| @end example | ||||
|  | ||||
| The keys of all the principals are stored in the database.  If you | ||||
| choose to, these can be encrypted with a master key.  You do not have to | ||||
| @@ -113,7 +118,7 @@ Master key: | ||||
| Verifying password - Master key:  | ||||
| @end example | ||||
|  | ||||
| To initialise the database use the @code{kadmin} program, with the | ||||
| To initialize the database use the @code{kadmin} program, with the | ||||
| @samp{-l} option (to enable local database mode). First issue a | ||||
| @kbd{init MY.REALM} command. This will create the database and insert | ||||
| default principals for that realm. You can have more than one realm in | ||||
| @@ -194,11 +199,11 @@ Version  Type             Principal | ||||
|  | ||||
| Heimdal can be configured to support 524, Kerberos 4 or kaserver. All | ||||
| theses services are default turned off. Kerberos 4 support also | ||||
| depends on if Kerberos 4 support is compiled in with heimdal. | ||||
| depends on if Kerberos 4 support is compiled in with Heimdal. | ||||
|  | ||||
| @subsection 524 | ||||
|  | ||||
| 524 is a service that allows the kdc to convert Kerberos 5 tickets to | ||||
| 524 is a service that allows the KDC to convert Kerberos 5 tickets to | ||||
| Kerberos 4 tickets for backward compatibility. See also Using 2b | ||||
| tokens with AFS in @xref{Things in search for a better place}. | ||||
|  | ||||
| @@ -225,7 +230,7 @@ Kerberos 4 can be turned on by adding this to the configuration file | ||||
| @subsection kaserver | ||||
|  | ||||
| Kaserver is a Kerberos 4 that is used in AFS, the protocol have some | ||||
| features over plain Kerberos 4, but like kerberos 4 only use single | ||||
| features over plain Kerberos 4, but like Kerberos 4 only use single | ||||
| DES too. | ||||
|  | ||||
| You should only enable Kerberos 4 support if you have a need for for | ||||
| @@ -253,7 +258,7 @@ kerberos-adm stream     tcp     nowait  root /usr/heimdal/libexec/kadmind kadmin | ||||
| You might need to add @samp{kerberos-adm} to your @file{/etc/services} | ||||
| as 749/tcp. | ||||
|  | ||||
| Access to the admin server is controlled by an acl-file, (default | ||||
| Access to the administration server is controlled by an acl-file, (default | ||||
| @file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the | ||||
| following syntax: | ||||
| @smallexample | ||||
| @@ -278,7 +283,7 @@ The patters are of the same type as those used in shell globbing, see | ||||
| In the example below @samp{lha/admin} can change every principal in the | ||||
| database. @samp{jimmy/admin} can only modify principals that belong to | ||||
| the realm @samp{E.KTH.SE}. @samp{mille/admin} is working at the | ||||
| helpdesk, so he should only be able to change the passwords for single | ||||
| help desk, so he should only be able to change the passwords for single | ||||
| component principals (ordinary users). He will not be able to change any | ||||
| @samp{/admin} principal. | ||||
|  | ||||
| @@ -357,8 +362,9 @@ to the slaves, running | ||||
| @pindex hpropd | ||||
| @code{hpropd} processes. | ||||
|  | ||||
| Every slave needs a keytab with a principal, | ||||
| @samp{hprop/@var{hostname}}.  Add that with the | ||||
| Every slave needs a database directory, the master key (if it was used | ||||
| for the database) and a keytab with the principal | ||||
| @samp{hprop/@var{hostname}}.  Add the principal with the | ||||
| @pindex ktutil | ||||
| @code{ktutil} command and start | ||||
| @pindex hpropd | ||||
| @@ -366,6 +372,7 @@ Every slave needs a keytab with a principal, | ||||
|  | ||||
| @example | ||||
| slave# ktutil get -p foo/admin hprop/`hostname` | ||||
| slave# mkdir /var/heimdal | ||||
| slave# hpropd | ||||
| @end example | ||||
|  | ||||
| @@ -477,7 +484,7 @@ The syntax of @code{[kadmin]default_keys} is | ||||
| @samp{[etype:]salt-type[:salt-string]}. @samp{etype} is the encryption | ||||
| type (des, des3, arcfour), @code{salt-type} is the type of salt (pw-salt | ||||
| or afs3-salt), and the salt-string is the string that will be used as | ||||
| salt (remember that if the salt is appened/prepended, the empty salt "" | ||||
| salt (remember that if the salt is appended/prepended, the empty salt "" | ||||
| is the same thing as no salt at all). | ||||
|  | ||||
| Common types of salting includes | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Love Hörnquist Åstrand
					Love Hörnquist Åstrand