04-27-2001
I have installed Kerberos security in my UNIX system but I need to disable because of an application conflict with Kerberos.
So Anybody ca tell me how can I disable it?
Thank you
10 More Discussions You Might Find Interesting
1. Solaris
i m new 2 unix world
can some body explain me abt kerberos
pls explain in detail..! (2 Replies)
Discussion started by: sriram.s
2 Replies
2. HP-UX
I am getting the following error message when trying to login to the client:
while verifying tgt
If I move the /etc/krb5.keytab out of /etc, it works fine. This is HP-UX v23
Does anyone have any ideas? (1 Reply)
Discussion started by: dhernand
1 Replies
3. AIX
I have 2 servers (lft1 and lft3) running AIX 5.3 ML 5. Both are installed with krb5.client.rte 1.4.0.4 and openssh.base.server 4.3.0.5300.
I have configured some of the users on both servers to authenticate against our Windows 2003 Active Directory. From my PC, I can use telnet to login... (1 Reply)
Discussion started by: asch337
1 Replies
4. AIX
I was wondering if any of you have used NFS4 with KERBEROS in a HACMP setup and environment with more than 1 resourcegroup that has NFS mount in them.
I Configures the host keys for an Network File System (NFS) server I get stuck with the nfshostkey
I can only add one at a time per system so... (0 Replies)
Discussion started by: ravager
0 Replies
5. UNIX for Dummies Questions & Answers
Hi,
We've configured Kerberos to authenticate AIX 5.3 users with Active Directory and I now have to port an application written in C to the new security model.
Currently, our users can login as normal and running a "klist" command reveals that they have been successfully granted a ticket. ... (2 Replies)
Discussion started by: phykell
2 Replies
6. Programming
I am in the process of developing a application that needs to be able to authenticate users details with a kerberos server, which is proving to be rather difficult. There seems to be a lack of good information on how to do this using the MIT kerberos api.
Can anyone point me in the right... (0 Replies)
Discussion started by: mshindo
0 Replies
7. AIX
Good day
I am trying to configure Kerberos and LDAP authentication on AIX 5.3 with Windows 2003 R2 but something is not quite right.
When I ran kinit username I get a ticket and I can display it using klist.
When the user login I can see the ticket request on Windows 2003, but the user... (1 Reply)
Discussion started by: mariusb
1 Replies
8. AIX
I'm fairly new to UNIX-land, and one of my first assigned tasks was to try to set up Kerberos authentication on an unused partition. Hopefully everything makes sense, but please let me know if any clarification is needed with any of it.
AIX 7.1, and while I found various docs on the subject, a... (11 Replies)
Discussion started by: PassLine
11 Replies
9. OS X (Apple)
Our Network Security folks have mandated that we "Kerberize" our systems to allow them to perform an authenticated scan. This consists of instructions to change /etc/pam.d/sshd from:
# sshd: auth account password session
auth optional pam_krb5.so use_kcminit
auth optional ... (0 Replies)
Discussion started by: jnojr
0 Replies
10. UNIX for Dummies Questions & Answers
Hi ,
I am trying to authenticate my id on client server with Kerberos and receiving below error
kinit rpagadala@BDC.soft.net
kinit: Cannot contact any KDC for realm 'BDC.soft.net' while getting initial credentials
Please find krb5.conf on the client server configuration which is... (1 Reply)
Discussion started by: Tomlight
1 Replies
KERBEROS(8) BSD System Manager's Manual KERBEROS(8)
NAME
kerberos -- introduction to the Kerberos system
DESCRIPTION
Kerberos is a network authentication system. Its purpose is to securely authenticate users and services in an insecure network environment.
This is done with a Kerberos server acting as a trusted third party, keeping a database with secret keys for all users and services (collec-
tively called principals).
Each principal belongs to exactly one realm, which is the administrative domain in Kerberos. A realm usually corresponds to an organisation,
and the realm should normally be derived from that organisation's domain name. A realm is served by one or more Kerberos servers.
The authentication process involves exchange of 'tickets' and 'authenticators' which together prove the principal's identity.
When you login to the Kerberos system, either through the normal system login or with the kinit(1) program, you acquire a ticket granting
ticket which allows you to get new tickets for other services, such as telnet or ftp, without giving your password.
For more information on how Kerberos works, and other general Kerberos questions see the Kerberos FAQ at
http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html.
For setup instructions see the Heimdal Texinfo manual.
SEE ALSO
ftp(1), kdestroy(1), kinit(1), klist(1), kpasswd(1), telnet(1)
HISTORY
The Kerberos authentication system was developed in the late 1980's as part of the Athena Project at the Massachusetts Institute of Technol-
ogy. Versions one through three never reached outside MIT, but version 4 was (and still is) quite popular, especially in the academic commu-
nity, but is also used in commercial products like the AFS filesystem.
The problems with version 4 are that it has many limitations, the code was not too well written (since it had been developed over a long
time), and it has a number of known security problems. To resolve many of these issues work on version five started, and resulted in IETF RFC
1510 in 1993. IETF RFC 1510 was obsoleted in 2005 with IETF RFC 4120, also known as Kerberos clarifications. With the arrival of IETF RFC
4120, the work on adding extensibility and internationalization have started (Kerberos extensions), and a new RFC will hopefully appear soon.
This manual page is part of the Heimdal Kerberos 5 distribution, which has been in development at the Royal Institute of Technology in Stock-
holm, Sweden, since about 1997.
HEIMDAL
September 1, 2000 HEIMDAL