Home
last modified time | relevance | path

Searched refs:Kerberos (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/linux/net/sunrpc/
H A DKconfig20 tristate "Secure RPC: Kerberos V mechanism"
27 Choose Y here to enable Secure RPC using the Kerberos version 5
30 Secure RPC calls with Kerberos require an auxiliary user-space
33 Kerberos support should be installed.
38 bool "Enable Kerberos enctypes based on AES and SHA-1"
45 Choose Y to enable the use of Kerberos 5 encryption types
51 bool "Enable Kerberos encryption types based on Camellia and CMAC"
57 Choose Y to enable the use of Kerberos 5 encryption types
63 bool "Enable Kerberos enctypes based on AES and SHA-2"
70 Choose Y to enable the use of Kerberos 5 encryption types
[all …]
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DOpenVision4 WARNING: Retrieving the OpenVision Kerberos Administration system
7 not retrieve the OpenVision Kerberos administration system.
28 OpenVision Technologies, Inc. has donated this Kerberos
29 Administration system to MIT for inclusion in the standard Kerberos
31 continuing Kerberos technology development and our gratitude for
32 the valuable work which has been performed by MIT and the Kerberos
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/
H A Dkrb5_1.21.3.bb2 DESCRIPTION = "Kerberos is a system for authenticating users and services on a network. \
3 Kerberos is a trusted third-party service. That means that there is a \
4 third party (the Kerberos server) that is trusted by all the entities on \
7 This is the MIT reference implementation of Kerberos V5. \
9 This package contains the Kerberos key server (KDC). The KDC manages all \
10 authentication credentials for a Kerberos realm, holds the master keys \
14 HOMEPAGE = "http://web.mit.edu/Kerberos/"
/openbmc/qemu/
H A Dqemu.sasl16 # added to the Kerberos server for each host running QEMU.
33 # was created on the Kerberos v5 server. If switching to a non-gssapi
/openbmc/linux/fs/smb/server/
H A DKconfig44 establishment via Kerberos or NTLMv2.
71 bool "Support for Kerberos 5"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/
H A Dkrb5-kdc.service2 Description=MIT Kerberos KDC
H A Dkrb5-admin-server.service2 Description=MIT Kerberos KDC administrative daemon
H A Ddebian-suppress-usr-lib-in-krb5-config.patch25 echo " krb5 Kerberos 5 application"
/openbmc/linux/Documentation/filesystems/nfs/
H A Dclient-identifier.rst175 If NFS with Kerberos is not configured, a Linux NFSv4 client uses
183 When a Kerberos keytab is present on a Linux NFS client, the client
187 Kerberos principal can use that principal in place of the client's
190 Using Kerberos for this purpose enables the client and server to
193 flavor with Kerberos and the integrity QOS to prevent in-transit
H A Drpc-server-gss.rst57 In some Kerberos deployment GSSAPI tokens can be quite big, up and
59 the Kerberos tickets, that needs to be sent through the GSS layer in
/openbmc/qemu/docs/system/
H A Dvnc-security.rst120 GSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more. The
182 This says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol,
184 the administrator of your KDC must generate a Kerberos principal for the
187 running QEMU, and 'EXAMPLE.COM' with the Kerberos Realm.
/openbmc/linux/fs/smb/client/
H A DKconfig44 establishment via Kerberos or NTLMv2, RDMA (smbdirect), advanced
85 bool "Kerberos/SPNEGO advanced session setup"
89 utilities to provide SPNEGO packaged (RFC 4178) Kerberos tickets
91 secure Kerberos authentication is required). If unsure, say Y.
H A Dsess.c1296 case Kerberos: in cifs_select_sectype()
1305 return Kerberos; in cifs_select_sectype()
1976 case Kerberos: in select_sec()
H A Dcifs_swn.c143 case Kerberos: in cifs_swn_send_register_message()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/msktutil/
H A Dmsktutil_1.2.1.bb3 creates Kerberos keytabs on Unix/Linux systems, adds and removes \
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
/openbmc/linux/security/keys/
H A DKconfig47 primarily aimed at Kerberos key storage. The keyrings are persistent
66 (for example Kerberos ticket caches). The data may be stored out to
/openbmc/linux/net/rxrpc/
H A DKconfig58 bool "RxRPC Kerberos security"
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_config66 # Kerberos options
/openbmc/linux/Documentation/security/keys/
H A Drequest-key.rst104 Kerberos TGT key). It just requests the appropriate key, and the keyring
113 Kerberos server using the TGT) and then instantiates key U.
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/
H A Dopenssh_9.9p1.bb34 # and when running in a Kerberos environment. As such it is not relevant to OpenEmbedded
36 Red Hat Enterprise Linux 7 and when running in a Kerberos environment"
/openbmc/linux/Documentation/admin-guide/cifs/
H A Dauthors.rst47 - Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
H A Dusage.rst671 Use Kerberos version 5 authentication
673 Use Kerberos authentication and packet signing
739 may use Kerberos security (krb5) 0x00008
740 must use Kerberos 0x08008
818 Enabling Kerberos (extended security) works but requires version 1.2 or later
823 cifs.upcall helper program), instead of using Kerberos, is sufficient for
835 To use cifs Kerberos and DFS support, the Linux keyutils package should be

12