From: Jeffrey Altman
Network Identity Manager was conceived as an identity management
solution to make up for the shortcomings of Leash32 (distributed with
-MIT Kerberos for Windows) and AFSCREDS (distributed with OpenAFS).
+MIT Kerberos for Windows) and AFSCreds (distributed with OpenAFS).
@@ -33,17 +33,18 @@ source code.
-A presentation given about Khimaira at the AFS and Kerberos Best Practices
-Workshop 2005 can be found on the workshop website and . The slides can be found on the workshop website and here.
-The work on Khimaira was funded by MIT Information Services and
-Technology.
+Technology, NASA Jet Propulsion Laboratory,
+and Secure Endpoints Inc..
The change password dialog can be invoked from the Credentials menu. This is used to
+change the password for the primary credentials provider (currently
+Kerberos 5).
+ For the default identity provider (Kerberos 5), there are two input
+boxes to specify the identity for which the password is to be changed.
+The identity uniquely maps to the Kerberos principal of the same name.
+Then the current password must be entered along with the new password
+twice.
+ Note that currently, when the password for an identity is being
+changed, only the associated Kerberos 5 password is changed.
+ This action will attempt to destroy the credentials that are
+currently selected in the credentials window. How the credentials are
+destroyed is up to each credentials provider.
+ In some cases, you may need to select all the credentials of a
+specific type for the delete operation to succeed. This happens when
+the credentials provider does not support deleting individual
+credentials, but supports deleting all the credentials stored in one
+specific location.
+ The action can be invoked by selecting the credentials and then
+pressing the Delete key or by pressing Ctrl + D. You can also select the Delete credentials action from the context menu
+(available via right-clicking inside the credentials window) or the
+credentials menu.
+ Allows you to import credentials from the Windows LSA credentials
+cache into any of the caches under the control of any credentials
+provider. Currently, the only credentials provider that supports
+importing is Kerberos 5.
+ This action can be invoked via the Credentials menu or by pressing Ctrl + I. In addition, the Kerberos 5
+configuration pane accessible via the Options menu provides an options that
+control how the importing of credentials happen.
+ The new credentials dialog can be invoked from the Credentials menu, by typing Ctrl + N, using the context menu in the credentials
+window or using the context menu in the NetIDMgr icon in the system
+notification area.
+ Once invoked, you will be presented with a dialog similar to the
+following:
+
+
+Design
diff --git a/src/windows/identity/help/html/act_chpw.htm b/src/windows/identity/help/html/act_chpw.htm
index 5e39963da..40f97054a 100644
--- a/src/windows/identity/help/html/act_chpw.htm
+++ b/src/windows/identity/help/html/act_chpw.htm
@@ -1,11 +1,30 @@
- Change Password
+
+Destroy Credentials
+
+Import Credentials
+
+New Credentials
+
+
If the Kerberos 5 identity provider is used, the dialog will ask +for a username and a realm to determine the identity for which new +credentials will be obtained for. Depending on the selected identity, +you may be required to provide a password or other form of +authentication for new credentials to be obtained. +
+ +Below the prompts is the credentials summary window. This window +provides an overview of the credentals that will be obtained when the +dialog is completed. +
+ +If you click any of the hyperlinks in the credentials summary +window or select the Options >> button, +the dialog will switch to the exanded view. An example of this is +shown below: +
+ ++ + +
+ + ++The expanded view provides access to additional options available for +each credential provider. For example, the Kerberos 5 credentials +provider allows you to set the lifetime of the obtained Kerberos +ticket as well as ticket flags such as renewable or +forwardable. +
+ ++The credentials summary window provides an overview of the credentials +that will be obtained after the successful completion of the new +credentials dialog. The window contains hyperlinks that will take you +to the corresponding credentials option panels where you will be able +to set additional options for each type. +
+ ++If there is a problem with the selected identity, the credentials +window will display a message describing the problem. For example: +
+ ++ +
+ ++The above is an example of what you would see if the provided identity +is invalid. Once the identity provider (in this case, Kerberos 5) +indicates that the identity is invalid, it will be displayed as above +along with a brief description of why the identity was found to be +invalid. Here, the Kerberos 5 identity provider is reporting that the +specified principal does not exist in the Kerberos database. +
+ ++The new credentials dialog can be invoked from the command line using +the -i or --kinit + command line option. Additionally, if you specify the -a or --autoinit +command line option, the new credentials dialog will be displayed if +there are no credentials available. +
+ ++Setting the Prompt for new credentials if there +aren't any at startup option is set in the General configuration panel, then the behavior is +similar to the --autoinit option. +
+ \ No newline at end of file diff --git a/src/windows/identity/help/html/bugs.htm b/src/windows/identity/help/html/bugs.htm index a2e8d34ca..fcc563c9a 100644 --- a/src/windows/identity/help/html/bugs.htm +++ b/src/windows/identity/help/html/bugs.htm @@ -18,8 +18,9 @@ enable us to reproduce the problem.kerberos@MIT.EDU is a mailing list set up for discussing Kerberos issues. It is gatewayed to the Usenet newsgroup 'comp.protocols.kerberos'. If you -prefer to read it via mail, send a request to kerberos-request@MIT.EDU -to get added or subscribe via the web page:
+prefer to read it via mail, send a subscription request to +kerberos-request@MIT.EDU +or subscribe via the web page:diff --git a/src/windows/identity/help/html/images/screen_new_creds.bmp b/src/windows/identity/help/html/images/screen_new_creds.bmp new file mode 100755 index 000000000..7d7335ab7 Binary files /dev/null and b/src/windows/identity/help/html/images/screen_new_creds.bmp differ diff --git a/src/windows/identity/help/html/images/screen_new_creds_err01.bmp b/src/windows/identity/help/html/images/screen_new_creds_err01.bmp new file mode 100755 index 000000000..44bf0f958 Binary files /dev/null and b/src/windows/identity/help/html/images/screen_new_creds_err01.bmp differ diff --git a/src/windows/identity/help/html/images/screen_new_creds_exp.bmp b/src/windows/identity/help/html/images/screen_new_creds_exp.bmp new file mode 100755 index 000000000..b1711a70f Binary files /dev/null and b/src/windows/identity/help/html/images/screen_new_creds_exp.bmp differ diff --git a/src/windows/identity/help/html/menu_help.htm b/src/windows/identity/help/html/menu_help.htm index d95545448..bceb2a991 100644 --- a/src/windows/identity/help/html/menu_help.htm +++ b/src/windows/identity/help/html/menu_help.htm @@ -27,11 +27,8 @@ needs to be explained, we have decided to include it here just for completeness. It is bad enough that it is the last menu on the menu bar. We didn't want to pile on any more disrespect by not documenting it. We encourage you to not read this and just go ahead and click any -item on this menu. It is guaranteed that nothing bad will happen. -This is not a generalization that would extend to, say, the Credentials menu. If anything bad -happens, please file a bug report at kfw-bugs@mit.edu. +item on this menu. If anything unexpected happens, please file a bug +report at kfw-bugs@mit.edu.
diff --git a/src/windows/identity/help/html/menu_options.htm b/src/windows/identity/help/html/menu_options.htm index 4d5bea9bb..2d60f1ae3 100644 --- a/src/windows/identity/help/html/menu_options.htm +++ b/src/windows/identity/help/html/menu_options.htm @@ -43,6 +43,9 @@ Opens the identities configuration panel.