For More Information - Novell LINUX ENTERPRISE SERVER 10 SP2 - INSTALLATION AND ADMINISTRATION Installation Manual

Hide thumbs Also See for LINUX ENTERPRISE SERVER 10 SP2 - INSTALLATION AND ADMINISTRATION:
Table of Contents

Advertisement

• rsh, rcp, rshd
• ftp, ftpd
• ksu
You no longer have to enter your password for using these applications because Kerberos
has already proven your identity. ssh, if compiled with Kerberos support, can even
forward all the tickets acquired for one workstation to another one. If you use ssh to
log in to another workstation, ssh makes sure that the encrypted contents of the tickets
are adjusted to the new situation. Simply copying tickets between workstations is not
sufficient because the ticket contains workstation-specific information (the IP address).
XDM, GDM, and KDM offer Kerberos support, too. Read more about the Kerberos
network applications in Kerberos V5 UNIX User's Guide at
kerberos

45.4 For More Information

The official site of the MIT Kerberos is http://web.mit.edu/kerberos. There,
find links to any other relevant resource concerning Kerberos, including Kerberos in-
stallation, user, and administration guides.
ftp://athena-dist.mit.edu/pub/kerberos/doc/usenix
The paper at
.PS
gives quite an extensive insight to the basic principles of Kerberos without being
too difficult to read. It also provides a lot of opportunities for further investigation and
reading about Kerberos.
The official Kerberos FAQ is available at
people/kenh/kerberos-faq.html. The book Kerberos—A Network Authenti-
cation System by Brian Tung (ISBN 0-201-37924-4) offers extensive information.
http://web.mit.edu/
http://www.nrl.navy.mil/CCS/
Network Authentication—Kerberos
847

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise server 10 sp3

Table of Contents