diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.xml b/en_US.ISO8859-1/books/handbook/security/chapter.xml index 294b1e74cb..ae57beb9b0 100644 --- a/en_US.ISO8859-1/books/handbook/security/chapter.xml +++ b/en_US.ISO8859-1/books/handbook/security/chapter.xml @@ -1207,11 +1207,16 @@ sendmail : PARANOID : deny KDC is recommended for security reasons. - To begin setting up a KDC, add these - lines to /etc/rc.conf: + To begin, install the security/heimdal + package as follows: - kdc_enable="YES" -kadmind_enable="YES" + &prompt.root; pkg install heimdal + + Next, update /etc/rc.conf using + sysrc as follows: + + &prompt.root; sysrc kdc_enable=yes +&prompt.root; sysrc kadmind_enable=yes Next, edit /etc/krb5.conf as follows: @@ -1295,24 +1300,31 @@ Realm max ticket life [unlimited]: Lastly, while still in kadmin, create the first principal using add. Stick to the default options for the principal for now, as these can be - changed later with modify. Type - ? at the prompt to see the available + kadmin, using the add. + Stick to the default options for the admin principal for now, + as these can be changed later with modify. + Type ? at the prompt to see the available options. - kadmin> add tillman + kadmin> add tillman Max ticket life [unlimited]: Max renewable life [unlimited]: +Principal expiration time [never]: +Password expiration time [never]: Attributes []: Password: xxxxxxxx Verifying password - Password: xxxxxxxx - Next, start the KDC services by running - service kdc start and - service kadmind start. While there will - not be any kerberized daemons running at this point, it is - possible to confirm that the KDC is - functioning by obtaining a ticket for the - principal that was just created: + Next, start the KDC services by + running: + + &prompt.root; service kdc start +&prompt.root; service kadmind start + + While there will not be any kerberized daemons running at + this point, it is possible to confirm that the + KDC is functioning by obtaining a ticket + for the principle that was just created: &prompt.user; kinit tillman tillman@EXAMPLE.ORG's Password: @@ -1380,8 +1392,9 @@ Aug 27 15:37:58 2013 Aug 28 01:37:58 2013 krbtgt/EXAMPLE.ORG@EXAMPLE.ORGkadmin will prompt for the password to get a fresh ticket. The principal authenticating to the kadmin service must be permitted to use the kadmin - interface, as specified in kadmind.acl. - See the section titled Remote administration in + interface, as specified in + /var/heimdal/kadmind.acl. See the + section titled Remote administration in info heimdal for details on designing access control lists. Instead of enabling remote kadmin access, the administrator could @@ -1756,8 +1769,8 @@ kadmind_enable="YES" Heimdal - Kerberos home + xlink:href="https://github.com/heimdal/heimdal/wiki">Heimdal + Kerberos project wiki page