prune trailing space
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@20217 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -12,23 +12,23 @@ as your Internet domain name if you do not have strong reasons for not
|
|||||||
doing so. It will make life easier for you and everyone else.
|
doing so. It will make life easier for you and everyone else.
|
||||||
|
|
||||||
@menu
|
@menu
|
||||||
* Configuration file::
|
* Configuration file::
|
||||||
* Creating the database::
|
* Creating the database::
|
||||||
* Modifying the database::
|
* Modifying the database::
|
||||||
* Checking the setup::
|
* Checking the setup::
|
||||||
* keytabs::
|
* keytabs::
|
||||||
* Serving Kerberos 4/524/kaserver::
|
* Serving Kerberos 4/524/kaserver::
|
||||||
* Remote administration::
|
* Remote administration::
|
||||||
* Password changing::
|
* Password changing::
|
||||||
* Testing clients and servers::
|
* Testing clients and servers::
|
||||||
* Slave Servers::
|
* Slave Servers::
|
||||||
* Incremental propagation::
|
* Incremental propagation::
|
||||||
* Salting::
|
* Salting::
|
||||||
* Cross realm::
|
* Cross realm::
|
||||||
* Transit policy::
|
* Transit policy::
|
||||||
* Setting up DNS::
|
* Setting up DNS::
|
||||||
* Using LDAP to store the database::
|
* Using LDAP to store the database::
|
||||||
* Providing Kerberos credentials to servers and programs::
|
* Providing Kerberos credentials to servers and programs::
|
||||||
* Setting up PK-INIT::
|
* Setting up PK-INIT::
|
||||||
@end menu
|
@end menu
|
||||||
|
|
||||||
@@ -56,7 +56,7 @@ variable extends to the end of the line.
|
|||||||
a-subsection = @{
|
a-subsection = @{
|
||||||
var = value1
|
var = value1
|
||||||
other-var = value with @{@}
|
other-var = value with @{@}
|
||||||
sub-sub-section = @{
|
sub-sub-section = @{
|
||||||
var = 123
|
var = 123
|
||||||
@}
|
@}
|
||||||
@}
|
@}
|
||||||
@@ -122,8 +122,8 @@ master key, run @samp{kstash} to create this master key:
|
|||||||
|
|
||||||
@example
|
@example
|
||||||
# kstash
|
# kstash
|
||||||
Master key:
|
Master key:
|
||||||
Verifying password - Master key:
|
Verifying password - Master key:
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
If you want to generate a random master key you can use the
|
If you want to generate a random master key you can use the
|
||||||
@@ -152,12 +152,12 @@ a default realm, you will need to explicitly include the realm.
|
|||||||
kadmin> init MY.REALM
|
kadmin> init MY.REALM
|
||||||
Realm max ticket life [unlimited]:
|
Realm max ticket life [unlimited]:
|
||||||
Realm max renewable ticket life [unlimited]:
|
Realm max renewable ticket life [unlimited]:
|
||||||
kadmin> add me
|
kadmin> add me
|
||||||
Max ticket life [unlimited]:
|
Max ticket life [unlimited]:
|
||||||
Max renewable life [unlimited]:
|
Max renewable life [unlimited]:
|
||||||
Attributes []:
|
Attributes []:
|
||||||
Password:
|
Password:
|
||||||
Verifying password - Password:
|
Verifying password - Password:
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
Now start the KDC and try getting a ticket.
|
Now start the KDC and try getting a ticket.
|
||||||
@@ -199,7 +199,7 @@ commands @samp{add}, @samp{rename}, @samp{modify}, @samp{delete}.
|
|||||||
Both interactive editing and command line flags can be used (use --help
|
Both interactive editing and command line flags can be used (use --help
|
||||||
to list the available options).
|
to list the available options).
|
||||||
|
|
||||||
There are different kinds of types for the fields in the database;
|
There are different kinds of types for the fields in the database;
|
||||||
attributes, absolute time times and relative times.
|
attributes, absolute time times and relative times.
|
||||||
|
|
||||||
@subsection Attributes
|
@subsection Attributes
|
||||||
@@ -434,7 +434,7 @@ The built-in polices are
|
|||||||
|
|
||||||
@item external-check
|
@item external-check
|
||||||
|
|
||||||
Executes the program specified by @samp{[password_quality]external_program}.
|
Executes the program specified by @samp{[password_quality]external_program}.
|
||||||
|
|
||||||
A number of key/value pairs are passed as input to the program, one per
|
A number of key/value pairs are passed as input to the program, one per
|
||||||
line, ending with the string @samp{end}. The key/value lines are of
|
line, ending with the string @samp{end}. The key/value lines are of
|
||||||
@@ -704,8 +704,8 @@ vr$ klist
|
|||||||
Credentials cache: FILE:/tmp/krb5cc_913.console
|
Credentials cache: FILE:/tmp/krb5cc_913.console
|
||||||
Principal: lha@@E.KTH.SE
|
Principal: lha@@E.KTH.SE
|
||||||
|
|
||||||
Issued Expires Principal
|
Issued Expires Principal
|
||||||
May 3 13:55:52 May 3 23:55:54 krbtgt/E.KTH.SE@@E.KTH.SE
|
May 3 13:55:52 May 3 23:55:54 krbtgt/E.KTH.SE@@E.KTH.SE
|
||||||
|
|
||||||
vr$ telnet -l lha hummel.it.su.se
|
vr$ telnet -l lha hummel.it.su.se
|
||||||
Trying 2001:6b0:5:1095:250:fcff:fe24:dbf...
|
Trying 2001:6b0:5:1095:250:fcff:fe24:dbf...
|
||||||
@@ -722,10 +722,10 @@ vr$ klist
|
|||||||
Credentials cache: FILE:/tmp/krb5cc_913.console
|
Credentials cache: FILE:/tmp/krb5cc_913.console
|
||||||
Principal: lha@@E.KTH.SE
|
Principal: lha@@E.KTH.SE
|
||||||
|
|
||||||
Issued Expires Principal
|
Issued Expires Principal
|
||||||
May 3 13:55:52 May 3 23:55:54 krbtgt/E.KTH.SE@@E.KTH.SE
|
May 3 13:55:52 May 3 23:55:54 krbtgt/E.KTH.SE@@E.KTH.SE
|
||||||
May 3 13:55:56 May 3 23:55:54 krbtgt/SU.SE@@E.KTH.SE
|
May 3 13:55:56 May 3 23:55:54 krbtgt/SU.SE@@E.KTH.SE
|
||||||
May 3 14:10:54 May 3 23:55:54 host/hummel.it.su.se@@SU.SE
|
May 3 14:10:54 May 3 23:55:54 host/hummel.it.su.se@@SU.SE
|
||||||
|
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
@@ -980,7 +980,7 @@ directory with the following command:
|
|||||||
@example
|
@example
|
||||||
kdc# ldapsearch -L -h localhost -D cn=manager \
|
kdc# ldapsearch -L -h localhost -D cn=manager \
|
||||||
-w secret -b ou=KerberosPrincipals,dc=example,dc=com \
|
-w secret -b ou=KerberosPrincipals,dc=example,dc=com \
|
||||||
'objectclass=krb5KDCEntry'
|
'objectclass=krb5KDCEntry'
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
@item
|
@item
|
||||||
@@ -1037,7 +1037,7 @@ that need it.
|
|||||||
@example
|
@example
|
||||||
host# ktutil -k /etc/krb5-service.keytab \
|
host# ktutil -k /etc/krb5-service.keytab \
|
||||||
get -p lha/admin@@EXAMPLE.ORG service-principal@@EXAMPLE.ORG
|
get -p lha/admin@@EXAMPLE.ORG service-principal@@EXAMPLE.ORG
|
||||||
lha/admin@@EXAMPLE.ORG's Password:
|
lha/admin@@EXAMPLE.ORG's Password:
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
To get a Kerberos credential file for the service, use kinit in the
|
To get a Kerberos credential file for the service, use kinit in the
|
||||||
@@ -1225,12 +1225,12 @@ get yourself tickets. One example how that can look like is:
|
|||||||
|
|
||||||
@example
|
@example
|
||||||
$ kinit -C FILE:$HOME/.certs/lha.crt,$HOME/.certs/lha.key lha@@EXAMPLE.ORG
|
$ kinit -C FILE:$HOME/.certs/lha.crt,$HOME/.certs/lha.key lha@@EXAMPLE.ORG
|
||||||
Enter your private key passphrase:
|
Enter your private key passphrase:
|
||||||
: lha@@nutcracker ; klist
|
: lha@@nutcracker ; klist
|
||||||
Credentials cache: FILE:/tmp/krb5cc_19100a
|
Credentials cache: FILE:/tmp/krb5cc_19100a
|
||||||
Principal: lha@@EXAMPLE.ORG
|
Principal: lha@@EXAMPLE.ORG
|
||||||
|
|
||||||
Issued Expires Principal
|
Issued Expires Principal
|
||||||
Apr 20 02:08:08 Apr 20 12:08:08 krbtgt/EXAMPLE.ORG@@EXAMPLE.ORG
|
Apr 20 02:08:08 Apr 20 12:08:08 krbtgt/EXAMPLE.ORG@@EXAMPLE.ORG
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
@@ -1238,7 +1238,7 @@ Using PKCS11 it can look like this instead:
|
|||||||
|
|
||||||
@example
|
@example
|
||||||
$ kinit -C PKCS11:/tmp/pkcs11/lib/soft-pkcs11.so lha@@EXAMPLE.ORG
|
$ kinit -C PKCS11:/tmp/pkcs11/lib/soft-pkcs11.so lha@@EXAMPLE.ORG
|
||||||
PIN code for SoftToken (slot):
|
PIN code for SoftToken (slot):
|
||||||
$ klist
|
$ klist
|
||||||
Credentials cache: API:4
|
Credentials cache: API:4
|
||||||
Principal: lha@@EXAMPLE.ORG
|
Principal: lha@@EXAMPLE.ORG
|
||||||
@@ -1371,18 +1371,18 @@ To use this example you have to use OpenSSL 0.9.8a or later.
|
|||||||
|
|
||||||
@example
|
@example
|
||||||
|
|
||||||
[user_certificate]
|
[user_certificate]
|
||||||
subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:princ_name
|
subjectAltName=otherName:1.3.6.1.5.2.2;SEQUENCE:princ_name
|
||||||
|
|
||||||
[princ_name]
|
[princ_name]
|
||||||
realm = EXP:0, GeneralString:MY.REALM
|
realm = EXP:0, GeneralString:MY.REALM
|
||||||
principal_name = EXP:1, SEQUENCE:principal_seq
|
principal_name = EXP:1, SEQUENCE:principal_seq
|
||||||
|
|
||||||
[principal_seq]
|
[principal_seq]
|
||||||
name_type = EXP:0, INTEGER:1
|
name_type = EXP:0, INTEGER:1
|
||||||
name_string = EXP:1, SEQUENCE:principals
|
name_string = EXP:1, SEQUENCE:principals
|
||||||
|
|
||||||
[principals]
|
[principals]
|
||||||
princ1 = GeneralString:userid
|
princ1 = GeneralString:userid
|
||||||
|
|
||||||
@end example
|
@end example
|
||||||
@@ -1390,17 +1390,17 @@ princ1 = GeneralString:userid
|
|||||||
Command usage
|
Command usage
|
||||||
|
|
||||||
@example
|
@example
|
||||||
openssl x509 -extensions user_certificate
|
openssl x509 -extensions user_certificate
|
||||||
openssl ca -extensions user_certificate
|
openssl ca -extensions user_certificate
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
|
|
||||||
@c --- ms certificate
|
@c --- ms certificate
|
||||||
@c
|
@c
|
||||||
@c [ new_oids ]
|
@c [ new_oids ]
|
||||||
@c msCertificateTemplateName = 1.3.6.1.4.1.311.20.2
|
@c msCertificateTemplateName = 1.3.6.1.4.1.311.20.2
|
||||||
@c
|
@c
|
||||||
@c
|
@c
|
||||||
@c [ req_smartcard ]
|
@c [ req_smartcard ]
|
||||||
@c keyUsage = digitalSignature, keyEncipherment
|
@c keyUsage = digitalSignature, keyEncipherment
|
||||||
@c extendedKeyUsage = msSmartcardLogin, clientAuth
|
@c extendedKeyUsage = msSmartcardLogin, clientAuth
|
||||||
|
Reference in New Issue
Block a user