admin doesn't need any keytab any longer

mention kpasswdd


git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@6905 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Assar Westerlund
1999-09-07 02:20:10 +00:00
parent ec2ad9e149
commit cf36aefd22

View File

@@ -182,8 +182,6 @@ kerberos-adm stream tcp nowait root /usr/heimdal/libexec/kadmind kadmin
You might need to add @samp{kerberos-adm} to your @file{/etc/services} You might need to add @samp{kerberos-adm} to your @file{/etc/services}
as 749/tcp. as 749/tcp.
You need to add a key for @samp{kadmin/admin} to your keytab.
Access to the admin server is controlled by an acl-file, (default Access to the admin server is controlled by an acl-file, (default
@file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the @file{/var/heimdal/kadmind.acl}.) The lines in the access file, has the
following syntax: following syntax:
@@ -197,6 +195,14 @@ The privileges you can assign to a principal are: @samp{add},
@samp{all}. All of these roughly corresponds to the different commands @samp{all}. All of these roughly corresponds to the different commands
in @samp{kadmin}. in @samp{kadmin}.
@section Password changing
To allow users to change their passwords, you should run @samp{kpasswdd}.
It is not run from @samp{inetd}.
You might need to add @samp{kpasswd} to your @file{/etc/services} as
464/udp.
@section Testing clients and servers @section Testing clients and servers
Now you should be able to run all the clients and servers. Refer to the Now you should be able to run all the clients and servers. Refer to the