openldap/clients/ud
1998-08-09 02:33:01 +00:00
..
auth.c Initial revision 1998-08-09 00:43:13 +00:00
edit.c Initial revision 1998-08-09 00:43:13 +00:00
etc.ud.conf Initial revision 1998-08-09 00:43:13 +00:00
find.c Initial revision 1998-08-09 00:43:13 +00:00
globals.c Initial revision 1998-08-09 00:43:13 +00:00
group.c Initial revision 1998-08-09 00:43:13 +00:00
help.c Initial revision 1998-08-09 00:43:13 +00:00
main.c Initial revision 1998-08-09 00:43:13 +00:00
Make-template LDAPworld P3: SLAPD LDBM Generation with Multiple Backends 1998-08-09 02:33:01 +00:00
mod.c Initial revision 1998-08-09 00:43:13 +00:00
print.c Initial revision 1998-08-09 00:43:13 +00:00
README Initial revision 1998-08-09 00:43:13 +00:00
string_to_key.c Initial revision 1998-08-09 00:43:13 +00:00
ud.h Initial revision 1998-08-09 00:43:13 +00:00
util.c LDAPworld P1: DEC and other portability issues 1998-08-09 02:28:45 +00:00
Version.c Initial revision 1998-08-09 00:43:13 +00:00

Users
-----
For users, see the man page on ud.

Installers
----------
For installers, see the header file.  Anything that is configurable is
listed in there as a #define, and the file is pretty well commented.

Kerberos users
--------------
If you're going to use Kerberos, be sure that you have a Kerberos config file
in /etc/krb.conf of the form:

	<realm>
	<realm> <server-for-realm> [ admin server ]

This should be the realm in which users are going to authenticate, which
is not necessarily your realm.

You can certainly have other entries in this file, but you'll need at least
these two.

Also be sure that you have the necessary entries in /etc/services so that
your client knows on which port to find a Kerberos authentication server.
An pair of entries like this:

  kerberos        750/udp         kdc             # Kerberos authentication
  kerberos        750/tcp         kdc             # Kerberos authentication

is fairly typical.