Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What programs/files need to go on each application server?

0
10 Posted

What programs/files need to go on each application server?

0

As a MINIMUM, on each application server, you’ll need to put:* A Kerberos configuration file (/etc/krb5.conf).* The Kerberos application server daemons (telnetd, rlogind, ftpd, etc).* At least one encryption key (usually stored in /etc/krb5.keytab).The encryption key is really the critical part; it needs to be transmittedto the application server host in a secure fashion. This is typically thekey for the host principal (host/foo.bar.org@REALM). Note that the MIT adminclient kadmin encrypts all of the transfers between it and the admin server,so using ktadd from inside of kadmin is safe, provided that you’re notsending your admin password over the network in the clear.You’ll probably want to put the Kerberos client binaries on each applicationserver as well, if you plan on having interactive user logins on yourapplication servers.

0

As a MINIMUM, on each application server, you’ll need to put: * A Kerberos configuration file (/etc/krb5.conf). * The Kerberos application server daemons (telnetd, rlogind, ftpd, etc). * At least one encryption key (usually stored in /etc/krb5.keytab). The encryption key is really the critical part; it needs to be transmitted to the application server host in a secure fashion. This is typically the key for the host principal (host/foo.bar.org-at-REALM). Note that the MIT admin client kadmin encrypts all of the transfers between it and the admin server, so using ktadd from inside of kadmin is safe, provided that you’re not sending your admin password over the network in the clear. You’ll probably want to put the Kerberos client binaries on each application server as well, if you plan on having interactive user logins on your application servers.

0
10

As a MINIMUM, on each application server, you’ll need to put: • A Kerberos configuration file (/etc/krb5.conf). • The Kerberos application server daemons (telnetd, rlogind, ftpd, etc). • At least one encryption key (usually stored in /etc/krb5.keytab). The encryption key is really the critical part; it needs to be transmitted to the application server host in a secure fashion.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123