[23978] in Kerberos
Re: Using Solaris 10 kadmin with MIT 1.4.1 kadmind
daemon@ATHENA.MIT.EDU (Douglas E. Engert)
Thu Jun 2 15:53:03 2005
Message-ID: <429F6295.5060400@anl.gov>
Date: Thu, 02 Jun 2005 14:48:37 -0500
From: "Douglas E. Engert" <deengert@anl.gov>
MIME-Version: 1.0
To: Sam Hartman <hartmans@mit.edu>
In-Reply-To: <tsl64ww4kby.fsf@cz.mit.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
cc: "'kerberos@mit.edu'" <kerberos@mit.edu>
Errors-To: kerberos-bounces@mit.edu
Sam Hartman wrote:
>>>>>>"Nicolas" == Nicolas Williams <Nicolas.Williams@sun.com> writes:
>
>
> Nicolas> Known bug. Our RPCSEC_GSS APIs force us to use hostbased
> Nicolas> princs for the server, and MIT krb5, though it now
> Nicolas> implements RPCSEC_GSS, did not match this behaviour.
>
> No. If you create the hostbased principal in your kdc database it
> should work fine. The MIT code supports both kadmin/fqdn and
> kadmin/admin.
I have both, and it looks like the client kadmin is getting a ticket for
kadmin/fqdn.
>
> ________________________________________________
> Kerberos mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
>
--
Douglas E. Engert <DEEngert@anl.gov>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos