Administration programs
========================
-.. note:: This document was copied from Kerberos man pages. Currently
- it is under review. Please, send your feedback, corrections
- and additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
.. toctree::
:maxdepth: 1
Backups of secure hosts
=======================
-.. note:: This document was copied from **Kerberos V5 System
- Administrator's Guide** with minor changes. Currently it is
- under review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
When you back up a secure host, you should exclude the host's keytab
file from the backup. If someone obtained a copy of the keytab from a
backup, that person could make any host masquerade as the host whose
Configuration Files
===================
-.. note:: This document was copied from **Kerberos V5 System
- Administrator's Guide** with minor changes. Currently it is
- under review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is greatly
- appreciated.
-
.. toctree::
:maxdepth: 2
Configuring Kerberos with OpenLDAP back-end
===========================================
-.. note:: This document was copied from **Kerberos V5 System
- Administrator's Guide** with minor changes. Currently it is
- under review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
.. seealso:: :ref:`ldap_be_ubuntu`
1. Set up SSL on the OpenLDAP server and client to ensure secure
Database administration
=======================
-.. note:: This document was copied from **Kerberos V5 System
- Administrator's Guide** with minor changes. Currently it is
- under review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
A Kerberos database contains all of a realm's Kerberos principals,
their passwords, and other administrative information about each
principal. For the most part, you will use the :ref:`kdb5_util(8)`
Incremental database propagation
--------------------------------
-.. note:: This document was copied from **Kerberos V5 Installation
- Guide** with minor changes. Currently it is under review.
- Please, send your feedback, corrections and additions to
- krb5-bugs@mit.edu. Your contribution is greatly
- appreciated.
-
Overview
~~~~~~~~
Installation guide
==================
-.. note:: This document was copied from **Kerberos V5 Installation
- Guide** with minor changes. Currently it is under
- review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is greatly
- appreciated.
-
-
Contents
--------
-.. note:: This document was copied from **Kerberos V5 Installation
- Guide** with minor changes. Currently it is under
- review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is greatly
- appreciated.
-
-
Installing KDCs
===============
Realm configuration decisions
=============================
-.. note:: This document was copied from **Kerberos V5 Installation
- Guide** with minor changes. Currently it is under review.
- Please, send your feedback, corrections and additions to
- krb5-bugs@mit.edu. Your contribution is greatly
- appreciated.
-
Before installing Kerberos V5, it is necessary to consider the
following issues:
Building Kerberos V5
====================
-.. note:: This document was copied from **Kerberos V5 Installation
- Guide** with minor changes. Currently it is under
- review. Please, send your feedback, corrections and
- additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
Build Requirements
------------------
For users
=========
-A collection of documents for Kerberos users
-
-.. note:: This document was copied from **Kerberos V5 UNIX User's
- Guide**. Currently it is under review. Please, send your
- feedback, corrections and additions to krb5-bugs@mit.edu.
- Your contribution is greatly appreciated.
-
-
Contents
--------
Password management
===================
-.. note:: This document was copied from **Kerberos V5 UNIX User's
- Guide**. Currently it is under review. Please, send your
- feedback, corrections and additions to krb5-bugs@mit.edu.
- Your contribution is greatly appreciated.
-
Your password is the only way Kerberos has of verifying your identity.
If someone finds out your password, that person can masquerade as
you--send email that comes from you, read, edit, or delete your files,
Ticket management
=================
-.. note:: This document was copied from **Kerberos V5 UNIX User's
- Guide**. Currently it is under review. Please, send your
- feedback, corrections and additions to krb5-bugs@mit.edu.
- Your contribution is greatly appreciated.
-
On many systems, Kerberos is built into the login program, and you get
tickets automatically when you log in. Other programs, such as ssh,
can forward copies of your tickets to a remote host. Most of these
User commands
=============
-.. note:: This document was copied from Kerberos man pages. Currently
- it is under review. Please, send your feedback, corrections
- and additions to krb5-bugs@mit.edu. Your contribution is
- greatly appreciated.
-
.. toctree::
:maxdepth: 1
===================== ============================== =================
-Report the problem
-------------------
-
-Please, provide your feedback on this document at
-krb5-bugsmit.edu?subject=Documentation___krb5_implementation_features
philosophy.rst
build_this.rst
-Please, provide your feedback on this document at
-krb5-bugs@mit.edu?subject=Documentation___relay_feedback