Red Hat Linux 7.2: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 8. Using Kerberos 5 on Red Hat Linux | Next |
Kerberos can be a challenge for new users to understand, implement and configure. For more examples and instructions on using Kerberos, refer to the following sources of information:
/usr/share/doc/krb5-server-<version-number> — The Kerberos V5 Installation Guide and the Kerberos V5 System Administrator's Guide, in PostScript and HTML formats, are installed by the krb5-server RPM.
/usr/share/doc/krb5-workstation-<version-number> — The Kerberos V5 UNIX User's Guide, in PostScript and HTML formats, is installed by the krb5-workstation RPM.
http://web.mit.edu/kerberos/www — The Kerberos home page on MIT's website.
http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html — The Kerberos Frequently Asked Questions (FAQ).
ftp://athena-dist.mit.edu/pub/kerberos/doc/usenix.PS — Link to a PostScript version of Kerberos: An Authentication Service for Open Network Systems by Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. This document is the original paper describing Kerberos.
http://web.mit.edu/kerberos/www/dialogue.html — Designing an Authentication System: a Dialogue in Four Scenes originally by Bill Bryant in 1988, modified by Theodore Ts'o in 1997. This document is a conversation between two developers who are thinking through the creation of a Kerberos-style authentication system. The conversational style of the discussion make this a good starting place for people who are completely unfamiliar with Kerberos.
http://www.ornl.gov/~jar/HowToKerb.html — Practical advice on kerberizing your network.