Set up a Unix computer as a Kerberized application server
In Kerberos, an application server supports Kerberized access via several common internet protocols, such as telnet or rlogin. With a Kerberized client, you can connect to an application server securely; your password will not be passed over the network, and you can also encrypt your session.
Note:
To set up a Unix computer as a Kerberized application server at Indiana University:
- Download the latest version of Kerberos, available from MIT. Click the link for the latest Kerberos release, and then read the instructions on how to retrieve the Kerberos source.
- The source will be packaged in a tar archive. Enclosed in this file will be the Kerberos distribution and its PGP signature. The distribution will be a tar archive compressed with GNU Zip.
- Decompress and unpack the distribution files. This will create a directory called
krb5-[version]
, where[version]
is the patch level of the distribution (for example,1.2.5
). - To view instructions for installing Kerberos, go to the
doc
directory (located in the top-level distribution directory). The installation guide is available in several formats, including HTML and PostScript. - Create both a
/etc/krb5.conf
file and a/etc/krb5.keytab
file:- You can manually create the
krb5.conf
file following the instructions in Get a Kerberos ticket in Linux at IU. - To request a keytab file, work with your IT Pro, or contact your campus Support Center.
- You can manually create the
- To set up application services, read the installation guide. The two files you will likely need to edit are
/etc/services
and/etc/inetd.conf
. For information about how the Kerberized clients included with the distribution work, see the user guide, which is available in the same directory as the installation guide.
At Indiana University, for personal or departmental Linux or Unix systems support, see Get help for Linux or Unix at IU.
Related documents
This is document ahkb in the Knowledge Base.
Last modified on 2021-12-23 11:25:13.