Next: Programming Manual, Previous: Administration Manual, Up: Top [Contents][Index]
This chapter discuss the underlying assumptions of Kerberos, contain a glossary to Kerberos concepts, give you background information on choosing realm and principal names, and describe all parameters and configuration file syntaxes for the Shishi tools.
• Environmental Assumptions | Kerberos 5 assumptions about your system. | |
• Glossary of terms | Glossary of Kerberos related terminology. | |
• Realm and Principal Naming | How to name your realm and principals. | |
• Shishi Configuration | Explains the Core Shishi configuration file. | |
• Shisa Configuration | Explains the Shisa database definition file. | |
• Parameters for shishi | Command line parameters for ’shishi’. | |
• Parameters for shishid | Command line parameters for ’shishid’. | |
• Parameters for shisa | Command line parameters for ’shisa’. | |
• Environment variables | Overriding compile-time defaults at run-time. | |
• Date input formats | Details of the understood date formats. |