source: postlfs/security/mitkrb.xml@ 47be189b

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 12.2 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gimp3 gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/for-12.3 xry111/intltool xry111/llvm18 xry111/soup3 xry111/spidermonkey128 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 47be189b was 47be189b, checked in by Bruce Dubbs <bdubbs@…>, 12 years ago

Update to autofs-5.0.6

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@10009 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 23.3 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY mitkrb-download-http "http://web.mit.edu/kerberos/www/dist/krb5/1.10/krb5-&mitkrb-version;-signed.tar">
8 <!ENTITY mitkrb-download-ftp " ">
9 <!ENTITY mitkrb-md5sum "43d6a2f6f4f96fbf8423732065b49f0f">
10 <!ENTITY mitkrb-size "10 MB">
11 <!ENTITY mitkrb-buildsize "100 MB">
12 <!ENTITY mitkrb-time "1.0 SBU">
13]>
14
15<sect1 id="mitkrb" xreflabel="MIT Kerberos V5-&mitkrb-version;">
16 <?dbhtml filename="mitkrb.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>MIT Kerberos V5-&mitkrb-version;</title>
24
25 <indexterm zone="mitkrb">
26 <primary sortas="a-MIT-Kerberos">MIT Kerberos V5</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to MIT Kerberos V5</title>
31
32 <para><application>MIT Kerberos V5</application> is a free implementation
33 of Kerberos 5. Kerberos is a network authentication protocol. It
34 centralizes the authentication database and uses kerberized
35 applications to work with servers or services that support Kerberos
36 allowing single logins and encrypted communication over internal
37 networks or the Internet.</para>
38
39 &lfs70_checked;
40
41 <bridgehead renderas="sect3">Package Information</bridgehead>
42 <itemizedlist spacing="compact">
43 <listitem>
44 <para>Download (HTTP): <ulink url="&mitkrb-download-http;"/></para>
45 </listitem>
46 <listitem>
47 <para>Download (FTP): <ulink url="&mitkrb-download-ftp;"/></para>
48 </listitem>
49 <listitem>
50 <para>Download MD5 sum: &mitkrb-md5sum;</para>
51 </listitem>
52 <listitem>
53 <para>Download size: &mitkrb-size;</para>
54 </listitem>
55 <listitem>
56 <para>Estimated disk space required: &mitkrb-buildsize;</para>
57 </listitem>
58 <listitem>
59 <para>Estimated build time: &mitkrb-time;</para>
60 </listitem>
61 </itemizedlist>
62
63 <bridgehead renderas="sect3">MIT Kerberos V5 Dependencies</bridgehead>
64
65 <bridgehead renderas="sect4">Optional</bridgehead>
66 <para role="optional"><xref linkend="keyutils"/>,
67 <xref linkend="openldap"/>, and
68 <xref linkend="dejagnu"/> (required to run the test suite)</para>
69
70 <note>
71 <para>Some sort of time synchronization facility on your system (like
72 <xref linkend="ntp"/>) is required since Kerberos won't authenticate if
73 there is a time difference between a kerberized client and the
74 KDC server.</para>
75 </note>
76
77 <para condition="html" role="usernotes">User Notes:
78 <ulink url="&blfs-wiki;/mitkrb"/></para>
79
80 </sect2>
81
82 <sect2 role="installation">
83 <title>Installation of MIT Kerberos V5</title>
84
85 <para><application>MIT Kerberos V5</application> is distributed in a
86 TAR file containing a compressed TAR package and a detached PGP
87 <filename class="extension">ASC</filename> file. You'll need to unpack
88 the distribution tar file, then unpack the compressed tar file before
89 starting the build.</para>
90
91 <para>After unpacking the distribution tarball and if you have
92 <xref linkend="gnupg"/> installed, you can
93 authenticate the package with the following command:</para>
94
95<screen><userinput>gpg - -verify krb5-&mitkrb-version;.tar.gz.asc</userinput></screen>
96
97 <para>Build <application>MIT Kerberos V5</application> by running the
98 following commands:</para>
99
100<screen><userinput>cd src &amp;&amp;
101./configure CPPFLAGS="-I/usr/include/et -I/usr/include/ss" \
102 --prefix=/usr \
103 --localstatedir=/var/lib \
104 --with-system-et \
105 --with-system-ss \
106 --enable-dns-for-realm &amp;&amp;
107make</userinput></screen>
108
109 <para>The regression test suite is designed to be run after the
110 installation has been completed.</para>
111
112 <para>Now, as the <systemitem class="username">root</systemitem> user:</para>
113
114<screen role="root"><userinput>make install &amp;&amp;
115
116mv -v /usr/bin/ksu /bin &amp;&amp;
117chmod -v 755 /bin/ksu &amp;&amp;
118mv -v /usr/lib/libkrb5.so.3* /lib &amp;&amp;
119mv -v /usr/lib/libk5crypto.so.3* /lib &amp;&amp;
120mv -v /usr/lib/libkrb5support.so.0* /lib &amp;&amp;
121
122ln -v -sf ../../lib/libkrb5.so.3.3 /usr/lib/libkrb5.so &amp;&amp;
123ln -v -sf ../../lib/libk5crypto.so.3.1 /usr/lib/libk5crypto.so &amp;&amp;
124ln -v -sf ../../lib/libkrb5support.so.0.1 /usr/lib/libkrb5support.so &amp;&amp;
125
126install -m644 -v ../doc/*.info /usr/share/info &amp;&amp;
127for INFOFILE in 5-admin 5-install 5-user; do
128 install-info --info-dir=/usr/share/info \
129 /usr/share/info/krb$INFOFILE.info
130 rm ../doc/krb$INFOFILE.info
131done &amp;&amp;
132
133install -m755 -v -d /usr/share/doc/krb5-&mitkrb-version; &amp;&amp;
134cp -Rv ../doc/* /usr/share/doc/krb5-&mitkrb-version;</userinput></screen>
135
136<!-- Remove this for now as portmap cannot be built until upstream fixes it
137
138 <para>To test the installation, you must have
139 <xref linkend="dejagnu"/> installed and issue: <command>make
140 check</command>. The RPC layer tests will require a portmap daemon
141 (see <xref linkend="portmap"/>) running and configured to listen on the
142 regular network interface (not localhost). See the <quote>Testing the
143 Build</quote> section of the <filename>krb5-install.html</filename> file
144 in the <filename class='directory'>../doc</filename> directory for complete
145 information on running the regression tests.</para>
146-->
147 </sect2>
148
149 <sect2 role="commands">
150 <title>Command Explanations</title>
151
152 <para><parameter>--enable-dns-for-realm</parameter>: This parameter allows
153 realms to be resolved using the DNS server.</para>
154
155 <para><parameter>--with-system-et</parameter>: This parameter causes the
156 build to use the system-installed versions of the error-table support
157 software.</para>
158
159 <para><parameter>--with-system-ss</parameter>: This parameter causes the
160 build to use the system-installed versions of the subsystem command-line
161 interface software.</para>
162
163 <para><parameter>--localstatedir=/var/lib</parameter>: This parameter is
164 used so that the Kerberos variable run-time data is located in
165 <filename class='directory'>/var/lib</filename> instead of
166 <filename class='directory'>/usr/var</filename>.</para>
167
168 <para><command>mv -v /usr/bin/ksu /bin</command>: Moves the
169 <command>ksu</command> program to the
170 <filename class="directory">/bin</filename> directory so that it is
171 available when the <filename class="directory">/usr</filename>
172 filesystem is not mounted.</para>
173
174 </sect2>
175
176 <sect2 role="configuration">
177 <title>Configuring MIT Kerberos V5</title>
178
179 <sect3 id="krb5-config">
180 <title>Config Files</title>
181
182 <para><filename>/etc/krb5.conf</filename> and
183 <filename>/var/lib/krb5kdc/kdc.conf</filename></para>
184
185 <indexterm zone="mitkrb krb5-config">
186 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
187 </indexterm>
188
189 <indexterm zone="mitkrb krb5-config">
190 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
191 </indexterm>
192
193 </sect3>
194
195 <sect3>
196 <title>Configuration Information</title>
197
198 <sect4>
199 <title>Kerberos Configuration</title>
200
201 <tip>
202 <para>You should consider installing some sort of password checking
203 dictionary so that you can configure the installation to only
204 accept strong passwords. A suitable dictionary to use is shown in
205 the <xref linkend="cracklib"/> instructions. Note that only one
206 file can be used, but you can concatenate many files into one. The
207 configuration file shown below assumes you have installed a
208 dictionary to <filename>/usr/share/dict/words</filename>.</para>
209 </tip>
210
211 <para>Create the Kerberos configuration file with the following
212 commands issued by the <systemitem class="username">root</systemitem>
213 user:</para>
214
215<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
216<literal># Begin /etc/krb5.conf
217
218[libdefaults]
219 default_realm = <replaceable>&lt;LFS.ORG&gt;</replaceable>
220 encrypt = true
221
222[realms]
223 <replaceable>&lt;LFS.ORG&gt;</replaceable> = {
224 kdc = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
225 admin_server = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
226 dict_file = /usr/share/dict/words
227 }
228
229[domain_realm]
230 .<replaceable>&lt;lfs.org&gt;</replaceable> = <replaceable>&lt;LFS.ORG&gt;</replaceable>
231
232[logging]
233 kdc = SYSLOG[:INFO[:AUTH]]
234 admin_server = SYSLOG[INFO[:AUTH]]
235 default = SYSLOG[[:SYS]]
236
237# End /etc/krb5.conf</literal>
238EOF</userinput></screen>
239
240 <para>You will need to substitute your domain and proper hostname
241 for the occurrences of the <replaceable>&lt;belgarath&gt;</replaceable> and
242 <replaceable>&lt;lfs.org&gt;</replaceable> names.</para>
243
244 <para><option>default_realm</option> should be the name of your
245 domain changed to ALL CAPS. This isn't required, but both
246 <application>Heimdal</application> and MIT recommend it.</para>
247
248 <para><option>encrypt = true</option> provides encryption of all
249 traffic between kerberized clients and servers. It's not necessary
250 and can be left off. If you leave it off, you can encrypt all traffic
251 from the client to the server using a switch on the client program
252 instead.</para>
253
254 <para>The <option>[realms]</option> parameters tell the client
255 programs where to look for the KDC authentication services.</para>
256
257 <para>The <option>[domain_realm]</option> section maps a domain to
258 a realm.</para>
259
260 <para>Create the KDC database:</para>
261
262<screen role="root"><userinput>kdb5_util create -r <replaceable>&lt;LFS.ORG&gt;</replaceable> -s</userinput></screen>
263
264 <para>Now you should populate the database with principles
265 (users). For now, just use your regular login name or
266 <systemitem class="username">root</systemitem>.</para>
267
268<screen role="root"><userinput>kadmin.local
269<prompt>kadmin:</prompt> add_policy dict-only
270<prompt>kadmin:</prompt> addprinc -policy dict-only <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
271
272 <para>The KDC server and any machine running kerberized
273 server daemons must have a host key installed:</para>
274
275<screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
276
277 <para>After choosing the defaults when prompted, you will have to
278 export the data to a keytab file:</para>
279
280<screen role='root'><userinput><prompt>kadmin:</prompt> ktadd host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
281
282 <para>This should have created a file in
283 <filename class="directory">/etc</filename> named
284 <filename>krb5.keytab</filename> (Kerberos 5). This file should
285 have 600 (<systemitem class="username">root</systemitem> rw only)
286 permissions. Keeping the keytab files from public access is crucial
287 to the overall security of the Kerberos installation.</para>
288
289 <para>Exit the <command>kadmin</command> program (use
290 <command>quit</command> or <command>exit</command>) and return
291 back to the shell prompt. Start the KDC daemon manually, just to
292 test out the installation:</para>
293
294<screen role='root'><userinput>/usr/sbin/krb5kdc</userinput></screen>
295
296 <para>Attempt to get a ticket with the following command:</para>
297
298<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
299
300 <para>You will be prompted for the password you created. After you
301 get your ticket, you can list it with the following command:</para>
302
303<screen><userinput>klist</userinput></screen>
304
305 <para>Information about the ticket should be displayed on the
306 screen.</para>
307
308 <para>To test the functionality of the keytab file, issue the
309 following command:</para>
310
311<screen><userinput>ktutil
312<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
313<prompt>ktutil:</prompt> l</userinput></screen>
314
315 <para>This should dump a list of the host principal, along with
316 the encryption methods used to access the principal.</para>
317
318 <para>At this point, if everything has been successful so far, you
319 can feel fairly confident in the installation and configuration of
320 the package.</para>
321
322 <para>Install the <filename>/etc/rc.d/init.d/kerberos</filename> init
323 script included in the <xref linkend="bootscripts"/>
324 package.</para>
325
326<screen role="root"><userinput>make install-kerberos</userinput></screen>
327
328 </sect4>
329
330 <sect4>
331 <title>Additional Information</title>
332
333 <para>For additional information consult <ulink
334 url="http://web.mit.edu/kerberos/www/krb5-1.10/#documentation">
335 Documentation for krb-&mitkrb-version;</ulink> on which the above
336 instructions are based.</para>
337
338 </sect4>
339
340 </sect3>
341
342 </sect2>
343
344 <sect2 role="content">
345 <title>Contents</title>
346 <para></para>
347
348 <segmentedlist>
349 <segtitle>Installed Programs</segtitle>
350 <segtitle>Installed Libraries</segtitle>
351 <segtitle>Installed Directories</segtitle>
352
353 <seglistitem>
354 <seg>gss-client, gss-server, k5srvutil, kadmin, kadmin.local,
355 kadmind, kdb5_ldap_util, kdb5_util, kdestroy, kinit, klist,
356 kpasswd, kprop, kpropd, krb5-config, krb5kdc, krb5-send-pr,
357 ksu, kswitch, ktutil, kvno, sclient, sim_client, sim_server,
358 sserver, uuclient, and uuserver</seg>
359 <seg>libgssapi_krb5.so, libgssrpc.so, libk5crypto.so,
360 libkadm5clnt.so, libkadm5srv.so, libkdb5.so, libkdb_ldap.so,
361 libkrb5.so, libkrb5support.so, libverto-k5ev.so and
362 libverto.so</seg>
363 <seg>/usr/include/{gssapi,gssrpc,kadm5,krb5}, /usr/lib/krb5,
364 /usr/share/{doc/krb5-&mitkrb-version;,examples/krb5,gnats}
365 and /var/lib/krb5kdc</seg>
366 </seglistitem>
367 </segmentedlist>
368
369 <variablelist>
370 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
371 <?dbfo list-presentation="list"?>
372 <?dbhtml list-presentation="table"?>
373
374 <varlistentry id="k5srvutil">
375 <term><command>k5srvutil</command></term>
376 <listitem>
377 <para>is a host keytable manipulation utility.</para>
378 <indexterm zone="mitkrb k5srvutil">
379 <primary sortas="b-k5srvutil">k5srvutil</primary>
380 </indexterm>
381 </listitem>
382 </varlistentry>
383
384 <varlistentry id="kadmin-mitkrb">
385 <term><command>kadmin</command></term>
386 <listitem>
387 <para>is an utility used to make modifications
388 to the Kerberos database.</para>
389 <indexterm zone="mitkrb kadmin-mitkrb">
390 <primary sortas="b-kadmin">kadmin</primary>
391 </indexterm>
392 </listitem>
393 </varlistentry>
394
395 <varlistentry id="kadmind-mitkrb">
396 <term><command>kadmind</command></term>
397 <listitem>
398 <para>is a server for administrative access
399 to a Kerberos database.</para>
400 <indexterm zone="mitkrb kadmind-mitkrb">
401 <primary sortas="b-kadmind">kadmind</primary>
402 </indexterm>
403 </listitem>
404 </varlistentry>
405
406 <varlistentry id="kdb5_util">
407 <term><command>kdb5_util</command></term>
408 <listitem>
409 <para>is the KDC database utility.</para>
410 <indexterm zone="mitkrb kdb5_util">
411 <primary sortas="b-kdb5_util">kdb5_util</primary>
412 </indexterm>
413 </listitem>
414 </varlistentry>
415
416 <varlistentry id="kdestroy-mitkrb">
417 <term><command>kdestroy</command></term>
418 <listitem>
419 <para>removes the current set of tickets.</para>
420 <indexterm zone="mitkrb kdestroy-mitkrb">
421 <primary sortas="b-kdestroy">kdestroy</primary>
422 </indexterm>
423 </listitem>
424 </varlistentry>
425
426 <varlistentry id="kinit-mitkrb">
427 <term><command>kinit</command></term>
428 <listitem>
429 <para>is used to authenticate to the Kerberos server as a
430 principal and acquire a ticket granting ticket that can
431 later be used to obtain tickets for other services.</para>
432 <indexterm zone="mitkrb kinit-mitkrb">
433 <primary sortas="b-kinit">kinit</primary>
434 </indexterm>
435 </listitem>
436 </varlistentry>
437
438 <varlistentry id="klist-mitkrb">
439 <term><command>klist</command></term>
440 <listitem>
441 <para>reads and displays the current tickets in
442 the credential cache.</para>
443 <indexterm zone="mitkrb klist-mitkrb">
444 <primary sortas="b-klist">klist</primary>
445 </indexterm>
446 </listitem>
447 </varlistentry>
448
449 <varlistentry id="kpasswd-mitkrb">
450 <term><command>kpasswd</command></term>
451 <listitem>
452 <para>is a program for changing Kerberos 5 passwords.</para>
453 <indexterm zone="mitkrb kpasswd-mitkrb">
454 <primary sortas="b-kpasswd">kpasswd</primary>
455 </indexterm>
456 </listitem>
457 </varlistentry>
458
459 <varlistentry id="kprop">
460 <term><command>kprop</command></term>
461 <listitem>
462 <para>takes a principal database in a specified format and
463 converts it into a stream of database records.</para>
464 <indexterm zone="mitkrb kprop">
465 <primary sortas="b-kprop">kprop</primary>
466 </indexterm>
467 </listitem>
468 </varlistentry>
469
470 <varlistentry id="kpropd">
471 <term><command>kpropd</command></term>
472 <listitem>
473 <para>receives a database sent by <command>kprop</command>
474 and writes it as a local database.</para>
475 <indexterm zone="mitkrb kpropd">
476 <primary sortas="b-kpropd">kpropd</primary>
477 </indexterm>
478 </listitem>
479 </varlistentry>
480
481 <varlistentry id="krb5-config-prog2">
482 <term><command>krb5-config</command></term>
483 <listitem>
484 <para>gives information on how to link programs against
485 libraries.</para>
486 <indexterm zone="mitkrb krb5-config-prog2">
487 <primary sortas="b-krb5-config">krb5-config</primary>
488 </indexterm>
489 </listitem>
490 </varlistentry>
491
492 <varlistentry id="krb5kdc">
493 <term><command>krb5kdc</command></term>
494 <listitem>
495 <para>is a Kerberos 5 server.</para>
496 <indexterm zone="mitkrb krb5kdc">
497 <primary sortas="b-krb5kdc">krb5kdc</primary>
498 </indexterm>
499 </listitem>
500 </varlistentry>
501
502 <varlistentry id="ksu">
503 <term><command>ksu</command></term>
504 <listitem>
505 <para>is the super user program using Kerberos protocol.
506 Requires a properly configured
507 <filename class="directory">/etc/shells</filename> and
508 <filename>~/.k5login</filename> containing principals
509 authorized to become super users.</para>
510 <indexterm zone="mitkrb ksu">
511 <primary sortas="b-ksu">ksu</primary>
512 </indexterm>
513 </listitem>
514 </varlistentry>
515
516 <varlistentry id="kswitch">
517 <term><command>kswitch</command></term>
518 <listitem>
519 <para>makes the specified credential cache the
520 primary cache for the collection, if a cache
521 collection is available.</para>
522 <indexterm zone="mitkrb kswitch">
523 <primary sortas="b-kswitch">kswitch</primary>
524 </indexterm>
525 </listitem>
526 </varlistentry>
527
528 <varlistentry id="ktutil-mitkrb">
529 <term><command>ktutil</command></term>
530 <listitem>
531 <para>is a program for managing Kerberos keytabs.</para>
532 <indexterm zone="mitkrb ktutil-mitkrb">
533 <primary sortas="b-ktutil">ktutil</primary>
534 </indexterm>
535 </listitem>
536 </varlistentry>
537
538 <varlistentry id="kvno">
539 <term><command>kvno</command></term>
540 <listitem>
541 <para>prints keyversion numbers of Kerberos principals.</para>
542 <indexterm zone="mitkrb kvno">
543 <primary sortas="b-kvno">kvno</primary>
544 </indexterm>
545 </listitem>
546 </varlistentry>
547
548 <varlistentry id="sclient">
549 <term><command>sclient</command></term>
550 <listitem>
551 <para>used to contact a sample server and authenticate to it
552 using Kerberos version 5 tickets, then display the server's
553 response.</para>
554 <indexterm zone="mitkrb sclient">
555 <primary sortas="b-sclient">sclient</primary>
556 </indexterm>
557 </listitem>
558 </varlistentry>
559
560 <varlistentry id="sserver">
561 <term><command>sserver</command></term>
562 <listitem>
563 <para>sample Kerberos version 5 server.</para>
564 <indexterm zone="mitkrb sserver">
565 <primary sortas="b-sserver">sserver</primary>
566 </indexterm>
567 </listitem>
568 </varlistentry>
569
570 <varlistentry id="libgssapi_krb5-mitkrb">
571 <term><filename class='libraryfile'>libgssapi_krb5.so</filename></term>
572 <listitem>
573 <para>contain the Generic Security Service Application
574 Programming Interface (GSSAPI) functions which provides security
575 services to callers in a generic fashion, supportable with a range of
576 underlying mechanisms and technologies and hence allowing source-level
577 portability of applications to different environments.</para>
578 <indexterm zone="mitkrb libgssapi_krb5-mitkrb">
579 <primary sortas="c-libgssapi_krb5">libgssapi_krb5.so</primary>
580 </indexterm>
581 </listitem>
582 </varlistentry>
583
584 <varlistentry id="libkadm5clnt-mitkrb">
585 <term><filename class='libraryfile'>libkadm5clnt.so</filename></term>
586 <listitem>
587 <para>contains the administrative authentication and password
588 checking functions required by Kerberos 5 client-side programs.</para>
589 <indexterm zone="mitkrb libkadm5clnt-mitkrb">
590 <primary sortas="c-libkadm5clnt">libkadm5clnt.so</primary>
591 </indexterm>
592 </listitem>
593 </varlistentry>
594
595 <varlistentry id="libkadm5srv-mitkrb">
596 <term><filename class='libraryfile'>libkadm5srv.so</filename></term>
597 <listitem>
598 <para>contain the administrative authentication and password
599 checking functions required by Kerberos 5 servers.</para>
600 <indexterm zone="mitkrb libkadm5srv-mitkrb">
601 <primary sortas="c-libkadm5srv">libkadm5srv.so</primary>
602 </indexterm>
603 </listitem>
604 </varlistentry>
605
606 <varlistentry id="libkdb5">
607 <term><filename class='libraryfile'>libkdb5.so</filename></term>
608 <listitem>
609 <para>is a Kerberos 5 authentication/authorization database
610 access library.</para>
611 <indexterm zone="mitkrb libkdb5">
612 <primary sortas="c-libkdb5">libkdb5.so</primary>
613 </indexterm>
614 </listitem>
615 </varlistentry>
616
617 <varlistentry id="libkrb5-mitkrb">
618 <term><filename class='libraryfile'>libkrb5.so</filename></term>
619 <listitem>
620 <para>is an all-purpose Kerberos 5 library.</para>
621 <indexterm zone="mitkrb libkrb5-mitkrb">
622 <primary sortas="c-libkrb5">libkrb5.so</primary>
623 </indexterm>
624 </listitem>
625 </varlistentry>
626
627 </variablelist>
628
629 </sect2>
630
631</sect1>
Note: See TracBrowser for help on using the repository browser.