Code Block |
---|
#krb5.ini
[libdefaults]
debug = true
default_realm = YOURDOMAIN.DE
dns_lookup_kdc = false
default_keytab_name = FILE:C:\Program Files\custo diagnostic server\conf\tomcat.keytab
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
[realms]
YOURDOMAIN.DE = {
kdc = tstdc01.yourdomain.de
admin_server = tstdc01.yourdomain.de
default_domain = yourdomain.de
}
[domain_realm]
.yourdomain.de = YOURDOMAIN.DE
[login]
krb4_convert = true
krb4_get_tickets = false |
Introduction
This tutorial will guide you through the configuration of Kerberos for Single Sign On.
...
Replace / Edit krb5.ini and jaas.conf file, located in your ...\custo diagnostic server\conf Directory:
Code Block |
---|
#krb5.ini |
...
[libdefaults] |
...
debug = true |
...
default_realm = YOURDOMAIN.DE |
...
dns_lookup_kdc = false |
...
default_keytab_name = FILE:C:\Program Files\custo diagnostic server\conf\tomcat.keytab |
...
krb4_config = /etc/krb.conf |
...
krb4_realms = /etc/krb.realms |
...
kdc_timesync = 1 |
...
ccache_type = 4 |
...
forwardable = true |
...
proxiable = true |
...
[realms] |
...
YOURDOMAIN.DE = { |
...
kdc = tstdc01.yourdomain.de |
...
admin_server = tstdc01.yourdomain.de |
...
default_domain = yourdomain.de |
...
} |
...
[domain_realm] |
...
. |
...
yourdomain. |
...
de = YOURDOMAIN.DE |
...
[login] |
...
krb4_convert = true |
...
krb4_get_tickets = false |
Kerberos
Kerberos lets you automatically login to the custo manager with you windows user if your user has a valid LDAP mapping. To do this you need to configure LDAP first.
...