Index: head/en_US.ISO8859-1/books/handbook/security/chapter.xml =================================================================== --- head/en_US.ISO8859-1/books/handbook/security/chapter.xml +++ head/en_US.ISO8859-1/books/handbook/security/chapter.xml @@ -1207,12 +1207,17 @@ KDC is recommended for security reasons. - To begin setting up a KDC, add these - lines to /etc/rc.conf: + To begin, install the security/heimdal + package as follows: - kdc_enable="YES" -kadmind_enable="YES" + &prompt.root; pkg install heimdal + Next, update /etc/rc.conf using + sysrc as follows: + + &prompt.root; sysrc kdc_enable=yes +&prompt.root; sysrc kadmind_enable=yes + Next, edit /etc/krb5.conf as follows: @@ -1295,25 +1300,32 @@ Lastly, while still in kadmin, create the first principal using add. Stick to the default options for the principal for now, as these can be - changed later with modify. Type - ? at the prompt to see the available + kadmin, using the add. + Stick to the default options for the admin principal for now, + as these can be changed later with modify. + Type ? at the prompt to see the available options. - kadmin> add tillman + kadmin> add tillman Max ticket life [unlimited]: Max renewable life [unlimited]: +Principal expiration time [never]: +Password expiration time [never]: Attributes []: Password: xxxxxxxx Verifying password - Password: xxxxxxxx - Next, start the KDC services by running - service kdc start and - service kadmind start. While there will - not be any kerberized daemons running at this point, it is - possible to confirm that the KDC is - functioning by obtaining a ticket for the - principal that was just created: + Next, start the KDC services by + running: + &prompt.root; service kdc start +&prompt.root; service kadmind start + + While there will not be any kerberized daemons running at + this point, it is possible to confirm that the + KDC is functioning by obtaining a ticket + for the principle that was just created: + &prompt.user; kinit tillman tillman@EXAMPLE.ORG's Password: @@ -1380,8 +1392,9 @@ kadmin will prompt for the password to get a fresh ticket. The principal authenticating to the kadmin service must be permitted to use the kadmin - interface, as specified in kadmind.acl. - See the section titled Remote administration in + interface, as specified in + /var/heimdal/kadmind.acl. See the + section titled Remote administration in info heimdal for details on designing access control lists. Instead of enabling remote kadmin access, the administrator could @@ -1756,8 +1769,8 @@ Heimdal - Kerberos home + xlink:href="https://github.com/heimdal/heimdal/wiki">Heimdal + Kerberos project wiki page