Point out that slave needs /var/heimdal directory and masterkey

From: Mans Nilsson <mansaxel@sunet.se>

Fix spelling while here


git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@12353 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2003-06-06 15:43:33 +00:00
parent 93d56af0ae
commit 04f964bbdb

View File

@@ -62,12 +62,12 @@ In this manual, names of sections and bindings will be given as strings
separated by slashes (@samp{/}). The @samp{other-var} variable will thus separated by slashes (@samp{/}). The @samp{other-var} variable will thus
be @samp{section1/a-subsection/other-var}. be @samp{section1/a-subsection/other-var}.
For in-depth information about the contents of the config file, refer to For in-depth information about the contents of the configuration file, refer to
the @file{krb5.conf} manual page. Some of the more important sections the @file{krb5.conf} manual page. Some of the more important sections
are briefly described here. are briefly described here.
The @samp{libdefaults} section contains a list of library configuration The @samp{libdefaults} section contains a list of library configuration
parameters, such as the default realm and the timeout for kdc parameters, such as the default realm and the timeout for KDC
responses. The @samp{realms} section contains information about specific responses. The @samp{realms} section contains information about specific
realms, such as where they hide their KDC. This section serves the same realms, such as where they hide their KDC. This section serves the same
purpose as the Kerberos 4 @file{krb.conf} file, but can contain more purpose as the Kerberos 4 @file{krb.conf} file, but can contain more
@@ -75,7 +75,7 @@ information. Finally the @samp{domain_realm} section contains a list of
mappings from domains to realms, equivalent to the Kerberos 4 mappings from domains to realms, equivalent to the Kerberos 4
@file{krb.realms} file. @file{krb.realms} file.
To continue with the realm setup, you will have to create a config file, To continue with the realm setup, you will have to create a configuration file,
with contents similar to the following. with contents similar to the following.
@example @example
@@ -92,14 +92,19 @@ with contents similar to the following.
If you use a realm name equal to your domain name, you can omit the If you use a realm name equal to your domain name, you can omit the
@samp{libdefaults}, and @samp{domain_realm}, sections. If you have a @samp{libdefaults}, and @samp{domain_realm}, sections. If you have a
SRV-record for your realm, or your kerberos server has CNAME called SRV-record for your realm, or your Kerberos server has CNAME called
@samp{kerberos.my.realm}, you can omit the @samp{realms} section too. @samp{kerberos.my.realm}, you can omit the @samp{realms} section too.
@node Creating the database, keytabs, Configuration file, Setting up a realm @node Creating the database, keytabs, Configuration file, Setting up a realm
@section Creating the database @section Creating the database
The database library will look for the database in @file{/var/heimdal}, The database library will look for the database in the directory
so you should probably create that directory. @file{/var/heimdal}, so you should probably create that directory.
Make sure the directory have restrictive permissions.
@example
# mkdir /var/heimdal
@end example
The keys of all the principals are stored in the database. If you The keys of all the principals are stored in the database. If you
choose to, these can be encrypted with a master key. You do not have to choose to, these can be encrypted with a master key. You do not have to
@@ -113,7 +118,7 @@ Master key:
Verifying password - Master key: Verifying password - Master key:
@end example @end example
To initialise the database use the @code{kadmin} program, with the To initialize the database use the @code{kadmin} program, with the
@samp{-l} option (to enable local database mode). First issue a @samp{-l} option (to enable local database mode). First issue a
@kbd{init MY.REALM} command. This will create the database and insert @kbd{init MY.REALM} command. This will create the database and insert
default principals for that realm. You can have more than one realm in default principals for that realm. You can have more than one realm in
@@ -194,11 +199,11 @@ Version Type Principal
Heimdal can be configured to support 524, Kerberos 4 or kaserver. All Heimdal can be configured to support 524, Kerberos 4 or kaserver. All
theses services are default turned off. Kerberos 4 support also theses services are default turned off. Kerberos 4 support also
depends on if Kerberos 4 support is compiled in with heimdal. depends on if Kerberos 4 support is compiled in with Heimdal.
@subsection 524 @subsection 524
524 is a service that allows the kdc to convert Kerberos 5 tickets to 524 is a service that allows the KDC to convert Kerberos 5 tickets to
Kerberos 4 tickets for backward compatibility. See also Using 2b Kerberos 4 tickets for backward compatibility. See also Using 2b
tokens with AFS in @xref{Things in search for a better place}. tokens with AFS in @xref{Things in search for a better place}.
@@ -225,7 +230,7 @@ Kerberos 4 can be turned on by adding this to the configuration file
@subsection kaserver @subsection kaserver
Kaserver is a Kerberos 4 that is used in AFS, the protocol have some Kaserver is a Kerberos 4 that is used in AFS, the protocol have some
features over plain Kerberos 4, but like kerberos 4 only use single features over plain Kerberos 4, but like Kerberos 4 only use single
DES too. DES too.
You should only enable Kerberos 4 support if you have a need for for You should only enable Kerberos 4 support if you have a need for for
@@ -253,7 +258,7 @@ kerberos-adm stream tcp nowait root /usr/heimdal/libexec/kadmind kadmin
You might need to add @samp{kerberos-adm} to your @file{/etc/services} You might need to add @samp{kerberos-adm} to your @file{/etc/services}
as 749/tcp. as 749/tcp.
Access to the admin server is controlled by an acl-file, (default Access to the administration server is controlled by an acl-file, (default
@file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the @file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the
following syntax: following syntax:
@smallexample @smallexample
@@ -357,8 +362,9 @@ to the slaves, running
@pindex hpropd @pindex hpropd
@code{hpropd} processes. @code{hpropd} processes.
Every slave needs a keytab with a principal, Every slave needs a database directory, the master key (if it was used
@samp{hprop/@var{hostname}}. Add that with the for the database) and a keytab with the principal
@samp{hprop/@var{hostname}}. Add the principal with the
@pindex ktutil @pindex ktutil
@code{ktutil} command and start @code{ktutil} command and start
@pindex hpropd @pindex hpropd
@@ -366,6 +372,7 @@ Every slave needs a keytab with a principal,
@example @example
slave# ktutil get -p foo/admin hprop/`hostname` slave# ktutil get -p foo/admin hprop/`hostname`
slave# mkdir /var/heimdal
slave# hpropd slave# hpropd
@end example @end example
@@ -477,7 +484,7 @@ The syntax of @code{[kadmin]default_keys} is
@samp{[etype:]salt-type[:salt-string]}. @samp{etype} is the encryption @samp{[etype:]salt-type[:salt-string]}. @samp{etype} is the encryption
type (des, des3, arcfour), @code{salt-type} is the type of salt (pw-salt type (des, des3, arcfour), @code{salt-type} is the type of salt (pw-salt
or afs3-salt), and the salt-string is the string that will be used as or afs3-salt), and the salt-string is the string that will be used as
salt (remember that if the salt is appened/prepended, the empty salt "" salt (remember that if the salt is appended/prepended, the empty salt ""
is the same thing as no salt at all). is the same thing as no salt at all).
Common types of salting includes Common types of salting includes