Navigation

  • index
  • next |
  • previous |
  • The JHU ACM Systems 0.2 documentation »
  • JHU ACM Systems’ Documentation: Sysadmin Edition »
  • Core ACM Systems »

ACM Authorization Mechanisms¶

In addition to our root passwords, we use kerberos and ldap for user (and administrator) authentication. These are described here.

  • Administrator Credentials
    • How to make an admin hat
      • Kerberos
      • LDAP
      • AFS
      • SSH
  • LDAP
    • Data in LDAP
    • Poking at LDAP
    • Setting up an LDAP Server
      • Installing Software
      • Setting the Right Host Address
      • Landing a Keytab
      • Creating a jhuacmKerberosInstance DN for the Replica
      • Adjusting and Landing the Configuration
      • Non-SASL Auth
    • Non-Default Bits of LDAP Configuration
      • Kerberos and GSSAPI
      • Access Control
      • TLS
      • Replication
  • Kerberos KDC
    • Dependencies
    • Using Kadmin
      • Common kadmin tasks: changing a password.
    • Using Multiple Instances
      • Creating an Instance
      • How to use an alternate hat
    • Configuration
    • Replication
      • Creating a new replica
    • Cross-Realming
      • Incoming
      • Outgoing
      • Cross-realming with someone using a Samba 4 KDC
  • ACM OID Definitions
    • LDAP
      • LDAP for Plan 9
      • LDAP for Door Control
      • LDAP for OpenStack Integration
      • LDAP Group Fixup
      • Kerberos Instance
    • SNMP
    • Experimental and temporary OIDs

Previous topic

Core ACM Systems

Next topic

Administrator Credentials

This Page

  • Show Source

Quick search

Navigation

  • index
  • next |
  • previous |
  • The JHU ACM Systems 0.2 documentation »
  • JHU ACM Systems’ Documentation: Sysadmin Edition »
  • Core ACM Systems »
© Copyright 2014-2016, admins@acm.jhu.edu. Created using Sphinx 1.6.7.