openldap/clients/ud
2000-04-26 09:21:19 +00:00
..
auth.c Initial implementation of Kerberos password verification for 2000-01-08 18:42:11 +00:00
edit.c when opening files in /tmp use O_CREAT|O_EXCL to overcome race conditions 2000-04-24 16:42:16 +00:00
etc.ud.conf Initial revision 1998-08-09 00:43:13 +00:00
find.c Don't depend error handling on exact resultCode. 2000-04-26 09:21:19 +00:00
globals.c Add print.c to handle GeneralizedTime. 2000-01-17 17:41:11 +00:00
group.c Remove lint 1999-12-13 04:53:59 +00:00
help.c Remove lint 1999-12-13 04:53:59 +00:00
main.c Don't depend error handling on exact resultCode. 2000-04-26 09:21:19 +00:00
Makefile.in Use new macros from configure.in to accomodate NT/Mingw32 environment. 1999-10-28 07:31:59 +00:00
mod.c Don't depend error handling on exact resultCode. 2000-04-26 09:21:19 +00:00
print.c Add print.c to handle GeneralizedTime. 2000-01-17 17:41:11 +00:00
README Initial revision 1998-08-09 00:43:13 +00:00
string_to_key.c Initial implementation of Kerberos password verification for 2000-01-08 18:42:11 +00:00
ud.dsp Changes to support NT single debug 1999-11-01 22:17:06 +00:00
ud.dsw Vienna Bulk Commit 1999-05-19 01:12:33 +00:00
ud.h Initial implementation of Kerberos password verification for 2000-01-08 18:42:11 +00:00
util.c Initial implementation of Kerberos password verification for 2000-01-08 18:42:11 +00:00

Users
-----
For users, see the man page on ud.

Installers
----------
For installers, see the header file.  Anything that is configurable is
listed in there as a #define, and the file is pretty well commented.

Kerberos users
--------------
If you're going to use Kerberos, be sure that you have a Kerberos config file
in /etc/krb.conf of the form:

	<realm>
	<realm> <server-for-realm> [ admin server ]

This should be the realm in which users are going to authenticate, which
is not necessarily your realm.

You can certainly have other entries in this file, but you'll need at least
these two.

Also be sure that you have the necessary entries in /etc/services so that
your client knows on which port to find a Kerberos authentication server.
An pair of entries like this:

  kerberos        750/udp         kdc             # Kerberos authentication
  kerberos        750/tcp         kdc             # Kerberos authentication

is fairly typical.