This shows that there are now a number of principals in the database. All of these are
for internal use by Kerberos.
Creating a Principal
Next, create two Kerberos principals for yourself: one normal principal for your everyday
work and one for administrative tasks relating to Kerberos. Assuming your login name
is
newbie
, proceed as follows:
kadmin.local
kadmin> ank newbie
[email protected]'s Password: <type password here>
Verifying password: <re-type password here>
Next, create another principal named
newbie/admin
by typing
ank newbie/admin
at the
kadmin
prompt. The
admin
suffixed to your username is a role. Later, use this
role when administering the Kerberos database. A user can have several roles for dif-
ferent purposes. Roles are basically completely different accounts with similar names.
Starting the KDC
Start the KDC daemon and the kadmin daemon. To start the daemons manually, enter
rckrb5kdc start
and
rckadmind start
. Also make sure that KDC and kad-
mind are started by default when the server machine is rebooted with the command
insserv krb5kdc
and
insserv kadmind
.
6.4.6 Configuring Kerberos Clients
Once the supporting infrastructure is in place (DNS, NTP) and the KDC has been
properly configured and started, configure the clients machines. You can either use
YaST to configure a Kerberos client or use one of the two manual approaches described
below.
Configuring a Kerberos Client with YaST
Rather than manually editing all relevant configuration files when configuring a Kerberos
client, let YaST do the job for you. You can either perform the client configuration
during the installation of your machine or in the installed system:
94
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......