Kerberos And Pam; Additional Resources - Red Hat LINUX 7.2 Reference Manual

Hide thumbs Also See for LINUX 7.2:
Table of Contents

Advertisement

Section 8.6:Additional Resources

8.5 Kerberos and PAM

Currently, kerberized services do not make use of Pluggable Authentication Modules (PAM) at all — a
kerberized server bypasses PAM completely. Applications that use PAM can make use of Kerberos for
password checking if the pam_krb5 module (provided in the pam_krb5 package) is installed. The
pam_krb5 package contains sample configuration files that will allow services like login and gdm
to authenticate users and obtain initial credentials using their passwords. If access to network servers
is always done using kerberized services (or services that use GSS-API, like IMAP), the network can
be considered reasonably safe.
Careful system administrators will not add Kerberos password checking to all network services, be-
cause most of the protocols used by these services do not encrypt the password before sending it over
the network — obviously something to avoid.

8.6 Additional Resources

Kerberos can be a challenge for new users to understand, implement and configure. For more examples
and instructions on using Kerberos, refer to the following sources of information:
8.6.1 Installed Documentation
/usr/share/doc/krb5-server- <version-number> — The Kerberos V5 Installation
Guide and the Kerberos V5 System Administrator's Guide, in PostScript and HTML formats, are
installed by the krb5-server RPM.
/usr/share/doc/krb5-workstation- <version-number> — The Kerberos V5
UNIX User's Guide, in PostScript and HTML formats, is installed by the krb5-workstation
RPM.
8.6.2 Useful Websites
http://web.mit.edu/kerberos/www — The Kerberos home page on MIT's website.
http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html — The Kerberos Frequently Asked
Questions (FAQ).
ftp://athena-dist.mit.edu/pub/kerberos/doc/usenix.PS — Link to a PostScript version of Kerberos:
An Authentication Service for Open Network Systems by Jennifer G. Steiner, Clifford Neuman, and
Jeffrey I. Schiller. This document is the original paper describing Kerberos.
http://web.mit.edu/kerberos/www/dialogue.html — Designing an Authentication System: a Dia-
logue in Four Scenes originally by Bill Bryant in 1988, modified by Theodore Ts'o in 1997. This
document is a conversation between two developers who are thinking through the creation of a
143

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX 7.2 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Linux 7.2

Table of Contents