From 8cdc21ef051f43ea8dcabf42540d5cff13b5adeb Mon Sep 17 00:00:00 2001 From: Ben Kaduk Date: Thu, 13 Mar 2014 15:11:49 -0400 Subject: Mention k5login_authoritative in k5login docs In particular, it is set by default. This can lead to confusing behavior wherein adding a k5login file removes a user's remote access. Make an example more concrete to account for this case. ticket: 7876 (new) target_version: 1.12.2 tags: pullup --- doc/user/user_config/k5login.rst | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) (limited to 'doc') diff --git a/doc/user/user_config/k5login.rst b/doc/user/user_config/k5login.rst index 00f5a5a3a..90e486593 100644 --- a/doc/user/user_config/k5login.rst +++ b/doc/user/user_config/k5login.rst @@ -18,7 +18,7 @@ EXAMPLES -------- Suppose the user ``alice`` had a .k5login file in her home directory -containing the following line: +containing just the following line: :: @@ -26,7 +26,12 @@ containing the following line: This would allow ``bob`` to use Kerberos network applications, such as ssh(1), to access ``alice``'s account, using ``bob``'s Kerberos -tickets. +tickets. In a default configuration (with **k5login_authoritative** set +to true in :ref:`krb5.conf(5)`), this .k5login file would not let +``alice`` use those network applications to access her account, since +she is not listed! With no .k5login file, or with **k5login_authoritative** +set to false, a default rule would permit the principal ``alice`` in the +machine's default realm to access the ``alice`` account. Let us further suppose that ``alice`` is a system administrator. Alice and the other system administrators would have their principals -- cgit