Additional Resources
681
•
man kinit
— Describes how to use this command to obtain and cache a ticket-granting
ticket.
•
man kdestroy
— Describes how to use this command to destroy Kerberos credentials.
•
man klist
— Describes how to use this command to list cached Kerberos credentials.
Administrative Applications
•
man kadmin
— Describes how to use this command to administer the Kerberos V5
database.
•
man kdb5_util
— Describes how to use this command to create and perform low-level
administrative functions on the Kerberos V5 database.
Server Applications
•
man krb5kdc
— Describes available command line options for the Kerberos V5 KDC.
•
man kadmind
— Describes available command line options for the Kerberos V5
administration server.
Configuration Files
•
man krb5.conf
— Describes the format and options available within the configuration file
for the Kerberos V5 library.
•
man kdc.conf
— Describes the format and options available within the configuration file for
the Kerberos V5 AS and KDC.
43.6.10.2. Useful Websites
•
http://web.mit.edu/kerberos/www/
—
Kerberos: The Network Authentication Protocol
webpage from
MIT.
•
http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html
— The Kerberos Frequently Asked
Questions (FAQ).
•
ftp://athena-dist.mit.edu/pub/kerberos/doc/usenix.PS
— The PostScript version of
Kerberos: An
Authentication Service for Open Network Systems
by Jennifer G. Steiner, Clifford Neuman, and
Jeffrey I. Schiller. This document is the original paper describing Kerberos.
•
http://web.mit.edu/kerberos/www/dialogue.html
—
Designing an Authentication System: a Dialogue
in Four Scenes
originally by Bill Bryant in 1988, modified by Theodore Ts'o in 1997. This document
is a conversation between two developers who are thinking through the creation of a Kerberos-style
authentication system. The conversational style of the discussion make this a good starting place for
people who are completely unfamiliar with Kerberos.
•
http://www.ornl.gov/~jar/HowToKerb.html
—
How to Kerberize your site
is a good reference for
kerberizing a network.
•
http://www.networkcomputing.com/netdesign/kerb1.html
—
Kerberos Network Design Manual
is a
thorough overview of the Kerberos system.
Содержание ENTERPRISE LINUX 5 - VIRTUAL SERVER ADMINISTRATION
Страница 22: ...xxii ...
Страница 28: ......
Страница 36: ...10 ...
Страница 40: ...14 ...
Страница 96: ...70 ...
Страница 116: ...90 ...
Страница 144: ...118 ...
Страница 146: ......
Страница 158: ...132 ...
Страница 165: ...Installing and Removing Packages 139 Figure 11 7 Installing and removing packages simultaneously ...
Страница 166: ...140 ...
Страница 172: ...146 ...
Страница 178: ......
Страница 228: ...202 ...
Страница 264: ...238 ...
Страница 318: ...292 ...
Страница 330: ...304 ...
Страница 388: ...362 ...
Страница 428: ...402 ...
Страница 452: ......
Страница 458: ...432 ...
Страница 476: ...450 ...
Страница 478: ...452 ...
Страница 494: ...468 ...
Страница 498: ...472 ...
Страница 530: ...504 ...
Страница 536: ...510 ...
Страница 544: ...Chapter 36 Log Files 518 Figure 36 7 Log file contents after five seconds ...
Страница 546: ......
Страница 550: ...524 ...
Страница 576: ......
Страница 584: ...558 ...
Страница 608: ......
Страница 776: ...750 ...
Страница 796: ...770 ...
Страница 800: ...774 ...
Страница 804: ......
Страница 806: ...780 ...
Страница 808: ...782 ...
Страница 816: ...790 ...
Страница 820: ...794 ...
Страница 822: ...796 ...
Страница 830: ...804 ...
Страница 836: ...810 ...
Страница 844: ...818 ...
Страница 848: ...822 ...