aboutsummaryrefslogtreecommitdiff
path: root/crypto/krb5/doc/admin/install_clients.rst
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/krb5/doc/admin/install_clients.rst')
-rw-r--r--crypto/krb5/doc/admin/install_clients.rst58
1 files changed, 0 insertions, 58 deletions
diff --git a/crypto/krb5/doc/admin/install_clients.rst b/crypto/krb5/doc/admin/install_clients.rst
deleted file mode 100644
index f2c87d072cb9..000000000000
--- a/crypto/krb5/doc/admin/install_clients.rst
+++ /dev/null
@@ -1,58 +0,0 @@
-Installing and configuring UNIX client machines
-===============================================
-
-The Kerberized client programs include :ref:`kinit(1)`,
-:ref:`klist(1)`, :ref:`kdestroy(1)`, and :ref:`kpasswd(1)`. All of
-these programs are in the directory |bindir|.
-
-You can often integrate Kerberos with the login system on client
-machines, typically through the use of PAM. The details vary by
-operating system, and should be covered in your operating system's
-documentation. If you do this, you will need to make sure your users
-know to use their Kerberos passwords when they log in.
-
-You will also need to educate your users to use the ticket management
-programs kinit, klist, and kdestroy. If you do not have Kerberos
-password changing integrated into the native password program (again,
-typically through PAM), you will need to educate users to use kpasswd
-in place of its non-Kerberos counterparts passwd.
-
-
-Client machine configuration files
-----------------------------------
-
-Each machine running Kerberos should have a :ref:`krb5.conf(5)` file.
-At a minimum, it should define a **default_realm** setting in
-:ref:`libdefaults`. If you are not using DNS SRV records
-(:ref:`kdc_hostnames`) or URI records (:ref:`kdc_discovery`), it must
-also contain a :ref:`realms` section containing information for your
-realm's KDCs.
-
-Consider setting **rdns** to false in order to reduce your dependence
-on precisely correct DNS information for service hostnames. Turning
-this flag off means that service hostnames will be canonicalized
-through forward name resolution (which adds your domain name to
-unqualified hostnames, and resolves CNAME records in DNS), but not
-through reverse address lookup. The default value of this flag is
-true for historical reasons only.
-
-If you anticipate users frequently logging into remote hosts
-(e.g., using ssh) using forwardable credentials, consider setting
-**forwardable** to true so that users obtain forwardable tickets by
-default. Otherwise users will need to use ``kinit -f`` to get
-forwardable tickets.
-
-Consider adjusting the **ticket_lifetime** setting to match the likely
-length of sessions for your users. For instance, if most of your
-users will be logging in for an eight-hour workday, you could set the
-default to ten hours so that tickets obtained in the morning expire
-shortly after the end of the workday. Users can still manually
-request longer tickets when necessary, up to the maximum allowed by
-each user's principal record on the KDC.
-
-If a client host may access services in different realms, it may be
-useful to define a :ref:`domain_realm` mapping so that clients know
-which hosts belong to which realms. However, if your clients and KDC
-are running release 1.7 or later, it is also reasonable to leave this
-section out on client machines and just define it in the KDC's
-krb5.conf.