Index: head/en_US.ISO8859-1/books/handbook/security/chapter.xml
===================================================================
--- head/en_US.ISO8859-1/books/handbook/security/chapter.xml
+++ head/en_US.ISO8859-1/books/handbook/security/chapter.xml
@@ -1207,12 +1207,17 @@
KDC is recommended for security
reasons.
- To begin setting up a KDC, add these
- lines to /etc/rc.conf:
+ To begin, install the security/heimdal
+ package as follows:
- kdc_enable="YES"
-kadmind_enable="YES"
+ &prompt.root; pkg install heimdal
+ Next, update /etc/rc.conf using
+ sysrc as follows:
+
+ &prompt.root; sysrc kdc_enable=yes
+&prompt.root; sysrc kadmind_enable=yes
+
Next, edit /etc/krb5.conf as
follows:
@@ -1295,25 +1300,32 @@
Lastly, while still in kadmin, create
the first principal using add. Stick to
the default options for the principal for now, as these can be
- changed later with modify. Type
- ? at the prompt to see the available
+ kadmin, using the add.
+ Stick to the default options for the admin principal for now,
+ as these can be changed later with modify.
+ Type ? at the prompt to see the available
options.
- kadmin> add tillman
+ kadmin> add tillman
Max ticket life [unlimited]:
Max renewable life [unlimited]:
+Principal expiration time [never]:
+Password expiration time [never]:
Attributes []:
Password: xxxxxxxx
Verifying password - Password: xxxxxxxx
- Next, start the KDC services by running
- service kdc start and
- service kadmind start. While there will
- not be any kerberized daemons running at this point, it is
- possible to confirm that the KDC is
- functioning by obtaining a ticket for the
- principal that was just created:
+ Next, start the KDC services by
+ running:
+ &prompt.root; service kdc start
+&prompt.root; service kadmind start
+
+ While there will not be any kerberized daemons running at
+ this point, it is possible to confirm that the
+ KDC is functioning by obtaining a ticket
+ for the principle that was just created:
+
&prompt.user; kinit tillman
tillman@EXAMPLE.ORG's Password:
@@ -1380,8 +1392,9 @@
kadmin will prompt for the password to get
a fresh ticket. The principal authenticating to the kadmin
service must be permitted to use the kadmin
- interface, as specified in kadmind.acl.
- See the section titled Remote administration in
+ interface, as specified in
+ /var/heimdal/kadmind.acl. See the
+ section titled Remote administration in
info heimdal for details on designing
access control lists. Instead of enabling remote
kadmin access, the administrator could
@@ -1756,8 +1769,8 @@
Heimdal
- Kerberos home
+ xlink:href="https://github.com/heimdal/heimdal/wiki">Heimdal
+ Kerberos project wiki
page