Introduction to SASL
444
Red Hat Directory Server Administrator’s Guide • May 2005
Realms
A
realm
is a set of users and the authentication methods for those users to access
the realm. A realm resembles a fully-qualified domain name and can be
distributed across either a single server or a single domain across multiple
machines. A single server instance can also support multiple realms.
Realms are used by the server to associate the DN of the client in the following
form, which looks like an LDAP URL:
uid=
user_name
/[
server_instance
],cn=
realm
,cn=
mechanism
,cn=auth
Mike Connors in the
engineering
realm of the European division of
example.com
would have the following association if he tried to access a different
server, such as
cyclops
:
uid=mconnors/cn=Europe.example.com,
cn=engineering,cn=gssapi,cn=auth
Babs Jensen in the
accounting
realm of
US.example.com
would not have to
specify
server_instance
:
uid=bjensen,cn=accounting,cn=gssapi,cn=auth
If realms are supported by the mechanism and the default realm was not used,
realm
must be specified; otherwise, it is omitted. Currently, only GSS-API
supports the concept of realms.
Configuring the KDC Server
To use GSS-API, the user first obtains a ticket granting ticket (TGT). The ticket and
the ticket’s lifetime are parameters in the
kdc
server configuration in the
/etc/krb5/krb5.conf
file. See “Example,” on page 445.
NOTE
Kerberos systems treat the Kerberos realm as the default realm;
other systems default to the server.
NOTE
The HP server and client are separate packages with their own
configuration. The server stores config files in
/opt/krb5
. The client
is classic MIT and uses
/etc/krb5.conf
. You need to configure
both to have a working Kerberos system.
Summary of Contents for DIRECTORY SERVER 7.1
Page 1: ...Administrator s Guide Red Hat Directory Server Version7 1 May 2005 Updated February 2009 ...
Page 20: ...20 Red Hat Directory Server Administrator s Guide May 2005 Glossary 619 Index 635 ...
Page 22: ...22 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 26: ...26 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 78: ...Maintaining Referential Integrity 78 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 200: ...Assigning Class of Service 200 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 488: ...488 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 528: ...PTA Plug in Syntax Examples 528 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 572: ...572 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 612: ...Examples of LDAP URLs 612 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 634: ...634 Red Hat Directory Server Administrator s Guide May 2005 ...