Point out that slave needs /var/heimdal directory and masterkey

From: Mans Nilsson <mansaxel@sunet.se>

Fix spelling while here


git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@12353 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2003-06-06 15:43:33 +00:00
parent 93d56af0ae
commit 04f964bbdb

View File

@@ -62,12 +62,12 @@ In this manual, names of sections and bindings will be given as strings
separated by slashes (@samp{/}). The @samp{other-var} variable will thus
be @samp{section1/a-subsection/other-var}.
For in-depth information about the contents of the config file, refer to
For in-depth information about the contents of the configuration file, refer to
the @file{krb5.conf} manual page. Some of the more important sections
are briefly described here.
The @samp{libdefaults} section contains a list of library configuration
parameters, such as the default realm and the timeout for kdc
parameters, such as the default realm and the timeout for KDC
responses. The @samp{realms} section contains information about specific
realms, such as where they hide their KDC. This section serves the same
purpose as the Kerberos 4 @file{krb.conf} file, but can contain more
@@ -75,7 +75,7 @@ information. Finally the @samp{domain_realm} section contains a list of
mappings from domains to realms, equivalent to the Kerberos 4
@file{krb.realms} file.
To continue with the realm setup, you will have to create a config file,
To continue with the realm setup, you will have to create a configuration file,
with contents similar to the following.
@example
@@ -92,14 +92,19 @@ with contents similar to the following.
If you use a realm name equal to your domain name, you can omit the
@samp{libdefaults}, and @samp{domain_realm}, sections. If you have a
SRV-record for your realm, or your kerberos server has CNAME called
SRV-record for your realm, or your Kerberos server has CNAME called
@samp{kerberos.my.realm}, you can omit the @samp{realms} section too.
@node Creating the database, keytabs, Configuration file, Setting up a realm
@section Creating the database
The database library will look for the database in @file{/var/heimdal},
so you should probably create that directory.
The database library will look for the database in the directory
@file{/var/heimdal}, so you should probably create that directory.
Make sure the directory have restrictive permissions.
@example
# mkdir /var/heimdal
@end example
The keys of all the principals are stored in the database. If you
choose to, these can be encrypted with a master key. You do not have to
@@ -113,7 +118,7 @@ Master key:
Verifying password - Master key:
@end example
To initialise the database use the @code{kadmin} program, with the
To initialize the database use the @code{kadmin} program, with the
@samp{-l} option (to enable local database mode). First issue a
@kbd{init MY.REALM} command. This will create the database and insert
default principals for that realm. You can have more than one realm in
@@ -194,11 +199,11 @@ Version Type Principal
Heimdal can be configured to support 524, Kerberos 4 or kaserver. All
theses services are default turned off. Kerberos 4 support also
depends on if Kerberos 4 support is compiled in with heimdal.
depends on if Kerberos 4 support is compiled in with Heimdal.
@subsection 524
524 is a service that allows the kdc to convert Kerberos 5 tickets to
524 is a service that allows the KDC to convert Kerberos 5 tickets to
Kerberos 4 tickets for backward compatibility. See also Using 2b
tokens with AFS in @xref{Things in search for a better place}.
@@ -225,7 +230,7 @@ Kerberos 4 can be turned on by adding this to the configuration file
@subsection kaserver
Kaserver is a Kerberos 4 that is used in AFS, the protocol have some
features over plain Kerberos 4, but like kerberos 4 only use single
features over plain Kerberos 4, but like Kerberos 4 only use single
DES too.
You should only enable Kerberos 4 support if you have a need for for
@@ -253,7 +258,7 @@ kerberos-adm stream tcp nowait root /usr/heimdal/libexec/kadmind kadmin
You might need to add @samp{kerberos-adm} to your @file{/etc/services}
as 749/tcp.
Access to the admin server is controlled by an acl-file, (default
Access to the administration server is controlled by an acl-file, (default
@file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the
following syntax:
@smallexample
@@ -357,8 +362,9 @@ to the slaves, running
@pindex hpropd
@code{hpropd} processes.
Every slave needs a keytab with a principal,
@samp{hprop/@var{hostname}}. Add that with the
Every slave needs a database directory, the master key (if it was used
for the database) and a keytab with the principal
@samp{hprop/@var{hostname}}. Add the principal with the
@pindex ktutil
@code{ktutil} command and start
@pindex hpropd
@@ -366,6 +372,7 @@ Every slave needs a keytab with a principal,
@example
slave# ktutil get -p foo/admin hprop/`hostname`
slave# mkdir /var/heimdal
slave# hpropd
@end example
@@ -477,7 +484,7 @@ The syntax of @code{[kadmin]default_keys} is
@samp{[etype:]salt-type[:salt-string]}. @samp{etype} is the encryption
type (des, des3, arcfour), @code{salt-type} is the type of salt (pw-salt
or afs3-salt), and the salt-string is the string that will be used as
salt (remember that if the salt is appened/prepended, the empty salt ""
salt (remember that if the salt is appended/prepended, the empty salt ""
is the same thing as no salt at all).
Common types of salting includes