/openbmc/linux/net/sunrpc/ |
H A D | Kconfig | 20 tristate "Secure RPC: Kerberos V mechanism" 27 Choose Y here to enable Secure RPC using the Kerberos version 5 30 Secure RPC calls with Kerberos require an auxiliary user-space 33 Kerberos support should be installed. 38 bool "Enable Kerberos enctypes based on AES and SHA-1" 45 Choose Y to enable the use of Kerberos 5 encryption types 51 bool "Enable Kerberos encryption types based on Camellia and CMAC" 57 Choose Y to enable the use of Kerberos 5 encryption types 63 bool "Enable Kerberos enctypes based on AES and SHA-2" 70 Choose Y to enable the use of Kerberos 5 encryption types [all …]
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | OpenVision | 4 WARNING: Retrieving the OpenVision Kerberos Administration system 7 not retrieve the OpenVision Kerberos administration system. 28 OpenVision Technologies, Inc. has donated this Kerberos 29 Administration system to MIT for inclusion in the standard Kerberos 31 continuing Kerberos technology development and our gratitude for 32 the valuable work which has been performed by MIT and the Kerberos
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/ |
H A D | krb5_1.21.3.bb | 2 DESCRIPTION = "Kerberos is a system for authenticating users and services on a network. \ 3 Kerberos is a trusted third-party service. That means that there is a \ 4 third party (the Kerberos server) that is trusted by all the entities on \ 7 This is the MIT reference implementation of Kerberos V5. \ 9 This package contains the Kerberos key server (KDC). The KDC manages all \ 10 authentication credentials for a Kerberos realm, holds the master keys \ 14 HOMEPAGE = "http://web.mit.edu/Kerberos/"
|
/openbmc/qemu/ |
H A D | qemu.sasl | 16 # added to the Kerberos server for each host running QEMU. 33 # was created on the Kerberos v5 server. If switching to a non-gssapi
|
/openbmc/linux/fs/smb/server/ |
H A D | Kconfig | 44 establishment via Kerberos or NTLMv2. 71 bool "Support for Kerberos 5"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
H A D | krb5-kdc.service | 2 Description=MIT Kerberos KDC
|
H A D | krb5-admin-server.service | 2 Description=MIT Kerberos KDC administrative daemon
|
H A D | debian-suppress-usr-lib-in-krb5-config.patch | 25 echo " krb5 Kerberos 5 application"
|
/openbmc/linux/Documentation/filesystems/nfs/ |
H A D | client-identifier.rst | 175 If NFS with Kerberos is not configured, a Linux NFSv4 client uses 183 When a Kerberos keytab is present on a Linux NFS client, the client 187 Kerberos principal can use that principal in place of the client's 190 Using Kerberos for this purpose enables the client and server to 193 flavor with Kerberos and the integrity QOS to prevent in-transit
|
H A D | rpc-server-gss.rst | 57 In some Kerberos deployment GSSAPI tokens can be quite big, up and 59 the Kerberos tickets, that needs to be sent through the GSS layer in
|
/openbmc/qemu/docs/system/ |
H A D | vnc-security.rst | 120 GSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more. The 182 This says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol, 184 the administrator of your KDC must generate a Kerberos principal for the 187 running QEMU, and 'EXAMPLE.COM' with the Kerberos Realm.
|
/openbmc/linux/fs/smb/client/ |
H A D | Kconfig | 44 establishment via Kerberos or NTLMv2, RDMA (smbdirect), advanced 85 bool "Kerberos/SPNEGO advanced session setup" 89 utilities to provide SPNEGO packaged (RFC 4178) Kerberos tickets 91 secure Kerberos authentication is required). If unsure, say Y.
|
H A D | sess.c | 1296 case Kerberos: in cifs_select_sectype() 1305 return Kerberos; in cifs_select_sectype() 1976 case Kerberos: in select_sec()
|
H A D | cifs_swn.c | 143 case Kerberos: in cifs_swn_send_register_message()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/msktutil/ |
H A D | msktutil_1.2.1.bb | 3 creates Kerberos keytabs on Unix/Linux systems, adds and removes \
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
|
/openbmc/linux/security/keys/ |
H A D | Kconfig | 47 primarily aimed at Kerberos key storage. The keyrings are persistent 66 (for example Kerberos ticket caches). The data may be stored out to
|
/openbmc/linux/net/rxrpc/ |
H A D | Kconfig | 58 bool "RxRPC Kerberos security"
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | sshd_config | 66 # Kerberos options
|
/openbmc/linux/Documentation/security/keys/ |
H A D | request-key.rst | 104 Kerberos TGT key). It just requests the appropriate key, and the keyring 113 Kerberos server using the TGT) and then instantiates key U.
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/ |
H A D | openssh_9.9p1.bb | 34 # and when running in a Kerberos environment. As such it is not relevant to OpenEmbedded 36 Red Hat Enterprise Linux 7 and when running in a Kerberos environment"
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | authors.rst | 47 - Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
|
H A D | usage.rst | 671 Use Kerberos version 5 authentication 673 Use Kerberos authentication and packet signing 739 may use Kerberos security (krb5) 0x00008 740 must use Kerberos 0x08008 818 Enabling Kerberos (extended security) works but requires version 1.2 or later 823 cifs.upcall helper program), instead of using Kerberos, is sufficient for 835 To use cifs Kerberos and DFS support, the Linux keyutils package should be
|