From fb79d6e1f0bcef0602df7bb4ec961955c2f06563 Mon Sep 17 00:00:00 2001 From: Jason Edgecombe Date: Sun, 30 Aug 2009 18:26:10 -0400 Subject: [PATCH] Updated Chapter 2, Section 3.4 of the Admin Guide Added a bullet point explaining the use of a Kerberos cross-realm trust and PTS foreign groups to give foreign users access. Replaced a reference to Authentication Database with Kerberos Database. LICENSE BSD Reviewed-on: http://gerrit.openafs.org/381 Reviewed-by: Derrick Brashear Tested-by: Derrick Brashear --- doc/xml/AdminGuide/auagd007.xml | 25 +++++++++++++++++++++---- 1 file changed, 21 insertions(+), 4 deletions(-) diff --git a/doc/xml/AdminGuide/auagd007.xml b/doc/xml/AdminGuide/auagd007.xml index f3c4590..1bb7d90 100644 --- a/doc/xml/AdminGuide/auagd007.xml +++ b/doc/xml/AdminGuide/auagd007.xml @@ -1010,7 +1010,7 @@ user receives an AFS token when these permissions are limited to the l (lookup) and r (read) permissions. - There are two ways to grant wider access to foreign users: + There are three ways to grant wider access to foreign users: Grant additional permissions to the system:anyuser group on certain ACLs. Keep in mind, however, that all users can then access that directory in the indicated way (not just specific foreign users you @@ -1018,9 +1018,26 @@ user receives an AFS token when - Create a local authentication account for specific foreign users, by creating entries in the Protection and - Authentication Databases and local password file. It is not possible to place foreign usernames on ACLs, nor to - authenticate in a foreign cell without having an account in it. + Enable automatic registration for users in the foreign + cell. This may be done by creating a cross-realm trust in + the Kerberos Database. Then + add a PTS group + named system:authuser@FOREIGN.REALM + and give it a group quota greater than the number of foreign + users expected to be registered. After the cross-realm trust + and the PTS group are created, + the aklog + command will automatically register foreign users as + needed. Consult the documentation for + your Kerberos Server for + instructions on how to establish a cross-realm trust. + + + + + Create a local authentication account for specific + foreign users, by creating entries in the Protection Database, + the Kerberos Database, and the local password file. -- 1.9.4