diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.sgml b/en_US.ISO8859-1/books/handbook/security/chapter.sgml index 559f04205a..8806d066cb 100644 --- a/en_US.ISO8859-1/books/handbook/security/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/security/chapter.sgml @@ -1506,7 +1506,7 @@ README krb.conf krb.realms You should now edit the krb.conf and krb.realms files to define your Kerberos realm. - In this case the realm will be EXAMPLE.COM and the + In this case the realm will be EXAMPLE.COM and the server is grunt.example.com. We edit or create the krb.conf file: @@ -1535,9 +1535,9 @@ ARC.NASA.GOV trident.arc.nasa.gov of these terms, please consult the Kerberos manual pages. Now we have to add grunt.example.com - to the EXAMPLE.COM realm and also add an entry to + to the EXAMPLE.COM realm and also add an entry to put all hosts in the .example.com - domain in the EXAMPLE.COM realm. The + domain in the EXAMPLE.COM realm. The krb.realms file would be updated as follows: @@ -1569,7 +1569,7 @@ It is important that you NOT FORGET this password. Now we have to save the key so that servers on the local machine can pick it up. Use the kstash command to do - this. + this: &prompt.root; kstash @@ -1588,7 +1588,7 @@ Master key entered. BEWARE! Two principals need to be added to the database for each system that will be secured with Kerberos. - Their names are kpasswd and rcmd + Their names are kpasswd and rcmd. These two principals are made for each system, with the instance being the name of the individual system.