openldap/clients/ud
Kurt Zeilenga efe39c999f modify ldap_dn2ufn() to return completely typeless UFNs
hide rest of UFN code behind #ifdef LDAP_UFN in preparation
for eventual removal.
2000-09-16 04:33:52 +00:00
..
auth.c Fix kbind typo (ITS#717) 2000-09-06 21:25:28 +00:00
edit.c Do not include <lber.h> 2000-06-26 01:24:03 +00:00
etc.ud.conf Initial revision 1998-08-09 00:43:13 +00:00
find.c modify ldap_dn2ufn() to return completely typeless UFNs 2000-09-16 04:33:52 +00:00
globals.c Y2k copyright update 2000-05-13 02:25:54 +00:00
group.c remove unused var 'actions' 2000-09-15 02:49:27 +00:00
help.c Do not include <lber.h> 2000-06-26 01:24:03 +00:00
main.c init output_string to NULL, and check in printbase() to make sure we don't pass garbage 2000-09-13 21:44:37 +00:00
Makefile.in Round one of LDAP_F() macro changes. In this round we rename 2000-06-18 19:48:07 +00:00
mod.c Do not include <lber.h> 2000-06-26 01:24:03 +00:00
print.c s/SAFEMEMCPY/AC_MEMCPY/ 2000-07-28 01:07:07 +00:00
README Initial revision 1998-08-09 00:43:13 +00:00
string_to_key.c s/SAFEMEMCPY/AC_MEMCPY/ 2000-07-28 01:07:07 +00:00
ud.dsp New indexer/filter codes (test suite works) with cheats 2000-06-04 22:59:38 +00:00
ud.h Y2k copyright update 2000-05-13 02:25:54 +00:00
util.c missed newline in printf 2000-09-13 23:32:06 +00:00

Users
-----
For users, see the man page on ud.

Installers
----------
For installers, see the header file.  Anything that is configurable is
listed in there as a #define, and the file is pretty well commented.

Kerberos users
--------------
If you're going to use Kerberos, be sure that you have a Kerberos config file
in /etc/krb.conf of the form:

	<realm>
	<realm> <server-for-realm> [ admin server ]

This should be the realm in which users are going to authenticate, which
is not necessarily your realm.

You can certainly have other entries in this file, but you'll need at least
these two.

Also be sure that you have the necessary entries in /etc/services so that
your client knows on which port to find a Kerberos authentication server.
An pair of entries like this:

  kerberos        750/udp         kdc             # Kerberos authentication
  kerberos        750/tcp         kdc             # Kerberos authentication

is fairly typical.